Learning, Thinking & Researching

shimmer's nest

  博客园 :: 首页 :: 博问 :: 闪存 :: 新随笔 :: 联系 :: 订阅 订阅 :: 管理 ::

2004年12月1日

摘要: Introduction In this article, we’ll show a way to implement a simple software key that could be useful for protecting software components (e.g., EXE, DLL, COM, etc.) against misuse and for keeping track of installations. We want to highlight that this is just an example. We are aware that it is quite simple by-passing the protection offered by the software key presented in this article. However, we think that this article could be useful in allowing us to better understand the mechanisms 阅读全文
posted @ 2004-12-01 14:29 shimmer.rkfang 阅读(437) 评论(0) 推荐(0) 编辑