From ygingras@eclipsys.qc.ca Tue Sep 3 17:20:22 2002 Return-Path: Delivered-To: yyyy@localhost.example.com Received: from localhost (jalapeno [127.0.0.1]) by jmason.org (Postfix) with ESMTP id A3EC416F56 for ; Tue, 3 Sep 2002 17:20:21 +0100 (IST) Received: from jalapeno [127.0.0.1] by localhost with IMAP (fetchmail-5.9.0) for jm@localhost (single-drop); Tue, 03 Sep 2002 17:20:21 +0100 (IST) Received: from webnote.net (mail.webnote.net [193.120.211.219]) by dogma.slashnull.org (8.11.6/8.11.6) with ESMTP id g83G5AZ26175 for ; Tue, 3 Sep 2002 17:05:10 +0100 Received: from outgoing.securityfocus.com (outgoing2.securityfocus.com [66.38.151.26]) by webnote.net (8.9.3/8.9.3) with ESMTP id RAA02213 for ; Tue, 3 Sep 2002 17:05:24 +0100 Received: from lists.securityfocus.com (lists.securityfocus.com [66.38.151.19]) by outgoing.securityfocus.com (Postfix) with QMQP id 145628F2CC; Tue, 3 Sep 2002 09:00:05 -0600 (MDT) Mailing-List: contact secprog-help@securityfocus.com; run by ezmlm Precedence: bulk List-Id: List-Post: List-Help: List-Unsubscribe: List-Subscribe: Delivered-To: mailing list secprog@securityfocus.com Delivered-To: moderator for secprog@securityfocus.com Received: (qmail 13052 invoked from network); 29 Aug 2002 21:32:02 -0000 Content-Type: text/plain; charset="iso-8859-15" From: Yannick Gingras To: secprog@securityfocus.com Subject: Secure Sofware Key Date: Thu, 29 Aug 2002 17:46:27 -0400 X-Mailer: KMail [version 1.3.2] MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Message-Id: <20020829204345.91D1833986@LINPDC.eclipsys.qc.ca> X-Spam-Status: No, hits=-0.5 required=7.0 tests=KNOWN_MAILING_LIST,PGP_MESSAGE,SPAM_PHRASE_00_01 version=2.41-cvs X-Spam-Level: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, I am wondering if there are any techniques to make a CD-Key of the like unbreakable. Either by giving it a cancelation date and a periodic renewal from a server or just by using self md5 signature on the resulting executable. I know it must not be easy because the whole software piracy problem would be resolved but there must be some way to make it really hard to break it. Anyone have hints on this issue ? Thanks - -- Yannick Gingras Network Programer ESC:wq -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE9bpYzuv7G0DNFO+QRAqBhAKChTeKXwD8zDMwf+okAKJXnnpknwACgtXZ7 v3bBABue0VX/Uy86Fhn9Ifs= =Uwqj -----END PGP SIGNATURE-----