home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!seismo!darwin.sura.net!spool.mu.edu!agate!doc.ic.ac.uk!warwick!pavo.csi.cam.ac.uk!cl.cam.ac.uk!crj10
- From: crj10@phx.cam.ac.uk (Clive Jones)
- Newsgroups: comp.sys.acorn
- Subject: Software protection, was Re: Acorn news release: Advance
- Message-ID: <1993Jan24.181932.2266@infodev.cam.ac.uk>
- Date: 24 Jan 93 18:19:32 GMT
- References: <1993Jan22.120539.19118@cs.nott.ac.uk> <1993Jan22.131726.21494@cs.nott.ac.uk> <1993Jan22.151636.24153@cs.nott.ac.uk> <1jrjskINNg5k@flipper.pvv.unit.no>
- Sender: news@infodev.cam.ac.uk (USENET news)
- Organization: U of Cambridge, England
- Lines: 33
- Telephone-Messages: +44 223 33 4900
- Address: Christ's College, Cambridge CB2 3BU, ENGLAND.
- Nntp-Posting-Host: ashton.cl.cam.ac.uk
-
- In article <1jrjskINNg5k@flipper.pvv.unit.no> dhmyrdal@flipper.pvv.unit.no (Dag H}kon Myrdal) writes:
- >In article <1993Jan22.151636.24153@cs.nott.ac.uk> rsxdp@unicorn.nott.ac.uk (D.Pead) writes:
- >[...]
- >>I think the best form of protection is to have a serial number encoded
- >>in each piece of software so that it can be traced, and to offer an
- >>incentive for purchasers to send in a registration form (an extra
- >>manual, free upgrades, a cashback offer). A real possibility of
- >>pirate software being traced back to the original offender is a
- >>pretty good deterrent.
- >
- >The *best* form of protection is:
- >1) Produce good manuals
- >2) Give excellent after-sales service, with free upgrades
- >
- >I should know. This is why I bought Impression :-)
-
- For some reason, Impression seems to be the one package people I know
- invariably buy rather than "obtain". I agree entirely with the
- sentiments expressed above.
-
- My next software package is having the serial number of each release
- deeply embedded in the software. To my delight, a friend of mine who
- has not yet failed to eliminate keying information and/or protection
- from any BBC/Archimedes package, refused to even try to remove this
- embedded serial number, once I'd explained my algorithm to him.
-
- I don't feel inclined to reveal the exact method I'm using, but,
- assuming conjecture that people won't give away copies of software
- which has their name written all over it in red neon tubes is correct,
- there is plenty of scope for anti-piracy measures which are completely
- portable, and need no hardware dongles.
-
- --Clive.
-