The number that is generated (which from now on I will call the ‘key’), is then converted to Base-36 (e.g. I won't discuss bases or how I did the conversion here, but you can look at the demo source if you are interested. After using this key, I then created a base-36 conversion system (you might know its relatives, hexadecimal (e.g. This means there are 60466176 unique codes! This number was chosen for the simple fact that it is 36^5: the highest number of possibilities if you have five characters that are anywhere from A-Z or 0-9. The TheoryĮach key is generated from a random number between 6175. Please note that this system is not the best choice if your users are downloading the application: a signed XML licence or an activation based licence are better choices in this case. I'm not going to talk about what you should and shouldn't do (which is covered in an excellent article, Piracy and Unconventional Wisdom), but rather demonstrate an unobtrusive but effective system to distribute protected software through CDs. Anti-piracy is a major part of any commercial software design cycle.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |