Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • SEARCH
  • Home
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 61737
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 10, 20262026-05-10T18:21:58+00:00 2026-05-10T18:21:58+00:00

How do you protect your commercial application from being installed on multiple computers from

  • 0

How do you protect your commercial application from being installed on multiple computers from people who only own one license?

Do you think it’s a good idea to have more than just a serial based scheme?

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. 2026-05-10T18:21:58+00:00Added an answer on May 10, 2026 at 6:21 pm

    The following method works well, as long as you have a public server at your disposal:

    • Serial based protection, user must enter a serial before using the program
    • On first serial entry, bind the serial to the MAC address and create an auth code generated from both of these values.
    • Check with your server to make sure the serial and MAC can be bound to eachother. Register the MAC on the server.
    • On each subsequent run, never contact the server again, but each time make sure the serial + MAC address matches their auth code.
    • If the user has no MAC address, allow them to run the program as long as they have a serial.

    This gives you protection against someone simply copying the registry from one computer to another.

    If the user tries to install with the same serial on another computer, the server will not allow you to bind the serial number to the MAC address because it is already bound.

    It is not a perfect solution but it protects you 99% of the time.

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Ask A Question

Stats

  • Questions 100k
  • Answers 100k
  • Best Answers 0
  • User 1
  • Popular
  • Answers
  • Editorial Team

    How to approach applying for a job at a company ...

    • 7 Answers
  • Editorial Team

    How to handle personal stress caused by utterly incompetent and ...

    • 5 Answers
  • Editorial Team

    What is a programmer’s life like?

    • 5 Answers
  • Editorial Team
    Editorial Team added an answer Here's the solution I took. Up votes for the recommendation… May 11, 2026 at 7:54 pm
  • Editorial Team
    Editorial Team added an answer Optimisations: invoke getThreadCPUTime inside a thread pool, since it seems… May 11, 2026 at 7:54 pm
  • Editorial Team
    Editorial Team added an answer Change it to a VARCHAR(max) - it will make life… May 11, 2026 at 7:54 pm

Related Questions

For our software we use hardware dongles to protect the software. No protection is
I am curious about how do you protect your software against cracking, hacking etc.
I'm stuck on a portion of the Java tutorial, specifically this exercise . The
I'm currently working on a project which will support multiple file writing specifications (imagine

Trending Tags

analytics british company computer developers django employee employer english facebook french google interview javascript language life php programmer programs salary

Top Members

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.