home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!spool.mu.edu!yale.edu!ira.uka.de!uka!s_titz
- From: s_titz@ira.uka.de (Olaf Titz)
- Newsgroups: comp.sys.mac.programmer
- Subject: An Euphemism (was Re: Uniquely identifying a Mac? How?)
- Date: 28 Dec 1992 15:09:12 GMT
- Organization: Fachschaft math/inf, Uni Karlsruhe, FRG
- Lines: 47
- Message-ID: <1hn5aoINNvb@iraul1.ira.uka.de>
- References: <1992Dec17.105813.18407@jarvis.csri.toronto.edu> <de19-171292172316@mac19-pg2.umd.edu> <bobert.725145303@godzilla>
- NNTP-Posting-Host: irau31.ira.uka.de
-
- In article <bobert.725145303@godzilla> bobert@informix.com (Robert Murphy) writes:
-
- >...
- >the program on one machine at a time. Second, and more of interest to
- >pirates, is the possibility of duplicating the PROM chips. I'm sure there
- >would be ways to prevent this, though, such as adding some extra functionality
- >to the PROM chips so that they do more than act as PROMs, and so you
- >couldn't just go out and buy blank PROMs and put a serial number in them
- >and expect them to work.
-
- Read: a builtin dongle. And, as you state below, you have experience
- with these things, you know that it is only a question of time when
- these additional functionalities will be cracked and duplicated too.
- Especially when the device is standardized as the built-in scheme
- would require.
-
- >...
- >it can find out if the dongle is attached to the computer it's running on,
- >and refuse to execute if the dongle is missing. You can copy such programs
- >onto 4,000,000 floppies if you want, but they'll only RUN on a computer with
- >the correct dongle attached. That's why it's called "execution control",
- >not "copy protection".) By the way, none of these programs have been the
-
- I think the incentive for renaming this scheme was that "copy
- protection" sounds bad in many ears now. Many people refuse to write
- the words without quotation marks around them, as they know that this
- kind of "protection" protects nothing and nobody.
-
- >sort of thing college students would likely want to pirate; rather, they've
- >been vertical market applications in the $3,000-$15,000 price range that
- >are aimed at corporations with enough money that they shouldn't need to
- >pirate software - but nonetheless, some of them have tried...
-
- The other way around: a company that pays thousands of dollars for one
- piece of software doesn't expect to be treated like a thief in the
- first place, and doesn't want to get another item for their dongle
- collection - another piece of incompatibility with something else that
- the developers didn't know. The best piracy protection is IMHO good
- documentation, support and reasonable pricing.
-
- Olaf
-
- --
- | Olaf Titz - comp.sc.student | o | uknf@dkauni2.bitnet | old address |
- | univ. of karlsruhe - germany | _>\ _ | s_titz@ira.uka.de | is still |
- | +49-721-60439 | (_)<(_) | praetorius@irc | valid |
- "My heart is human - my blood is boiling - my brain IBM" - Mr. Roboto
-