From: | G.A.Griggs |
Date: | 17 Aug 2000 at 20:20:22 |
Subject: | Re: Amiga Piracy |
Hello Gerald
On 16-Aug-00, you wrote:
>GM Hi Garry, on 16-Aug-00, you wrote:
>GM
>GM>> GP I am curious as to what people think would be the appropriate
>GM>> approach GP to piracy (theft)?
>GM>
>GM> The only way that I can see to stamp down on piracy would be some
>GM> sort of web based computer fingerprint system (the computers, not
>GM> your fingers) meaning that a copied program could only run on
>GM> another computer exactly identical to the original. after all these
>GM> pirates would hardly be likely to disseminate the contents of their
>GM> harddrives to all and sundry.
>GM
>GM I don't think I like the sound of where this is heading. But I'm
>GM curious to know exactly what you mean. So, what do you mean? Can you
>GM explain it a little better? :)
>GM
>GM Regards
>GM Gerry
>GM
Well when you install the program it looks at your system and makes a few
notes of what hardware and software you have got and uses that to generate a
keycode. Then as part of the registration process it sends that keycode back
to the author. Then when ever you run the program as part as the start up
process it regenerates that keycode. if it fails it offers you the choice of
reregistring or running only in demo mode. Reregistring will only generate a
new owner file if the program has been passed on. therefore meaning that
anyone who purchases a pirate copy still has to pay the orignal author his
money so that pairate copy in the end will cost more than a official copy.
Also if an author is determined he can also make life a lot more difficult
for the crackers by having a combination of keycode routines and runtime
routines which will only be made available as part of the registration
process.
Regards
PS I'm off for a long dirty weekend, So I wont be able to reply to any
responses until Tuesday eve. Bye
Success is like a fart - only your own smells nice.
-- James P. Hogan
Quote carefully and read all ADMIN:README mails