摘要:
Introduction
In this article, we’ll show a way to implement a simple software key that could be useful for protecting software components (e.g., EXE, DLL, COM, etc.) against misuse and for keeping track of installations.
We want to highlight that this is just an example. We are aware that it is quite simple by-passing the protection offered by the software key presented in this article.
However, we think that this article could be useful in allowing us to better understand the mechanisms 阅读全文