home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!cs.utexas.edu!sun-barr!olivea!gossip.pyramid.com!pyramid!infmx!godzilla!bobert
- From: bobert@informix.com (Robert Murphy)
- Newsgroups: comp.sys.mac.programmer
- Subject: Re: Uniquely identifying a Mac? How?
- Message-ID: <bobert.725667782@godzilla>
- Date: 29 Dec 92 22:23:02 GMT
- References: <01050023.lbu8j5@chinchilla.cars.com>
- Sender: news@informix.com (Usenet News)
- Organization: Informix Software, Inc.
- Lines: 44
-
- niel@cars.com (Niel Bornstein) writes:
-
-
- >In article <9235010.4295@mulga.cs.mu.OZ.AU> (comp.sys.mac.programmer), mtc@mundil.cs.mu.OZ.AU (Michael Trevor CUTTER) writes:
- >>We are looking for a way to uniquely identify a Mac, probably one on a network,
- >>but not necessarily. Is the serial number or similar available somewhere in the
- >>ROMs or parameter RAM? (Highly unlikely, I know - specially since PRAM can be
- >>reset)
-
-
- >How about the AppleTalk address? I know, they are assigned dynamically,
- >but if the network is mature it will stabilize. Are machines being
- >added to or taken off the network a lot?
-
- A Mac's AppleTalk address can potentially change every time the machine is
- booted.
-
- >Or if it's a TCP/IP network, there's the IP address.
-
- If you're serious about uniquely identifying the Mac (e.g. tying program
- execution to a particular Mac), this is a very ineffective way of doing
- it. All you have to do is change the IP address of the Mac. If it would
- conflict with another Mac on the network, pull your Mac off the network.
-
- A client of mine has a product with execution control tied to an IP
- address. (This is on a Sun, by the way.) You get the program, call in
- with the invoice number and IP number, and get an authorization code.
- At one of their customers, somebody called in with IP number
- 129.blah.blah.blah and got an auth code. Then somebody else called in
- with the same invoice number and a different IP number. Big fireworks!
- "Why, 129.blah.blah.blah isn't even on our network!" Turned out it was
- one of IP numbers you get on out-of-the-box Suns. As best as they can
- tell, somebody intercepted the software in the customer's mailroom, called
- and got the auth code, and then put the software back in the mailroom.
- The pirate can run their Sun normally on the company's network, and when
- they want to run this software, they unhook the ethernet connector,
- change the IP number, and reboot the Sun. My client got ripped off for
- a $10,000 software package.
-
- Needless to say, this client has changed his procedure for issuing auth
- codes.
-
- Regards,
- Bob Murphy
-