
The value of this textbox is used in every encryption/decryption operations. The first group box is titled “Common section” and contains a single textbox. The very first thing you need to do is to download the source code that goes with this article. This demo is using a textbox (titled Pass Phrase) for you to try different combination. Symmetric encryption is used (a single key used to encrypt and decrypt). This method is using the registry (the CurrentUser section) to store encrypted information to keep track of everything.

It also provides a mean of generating a key from a client name.

This method, all coded in a single form for the sake of demoing it, lets the user use the application as a trial for a given number of days (30 days in the demo application). I wouldn’t use that method if thousands of users were to use it because they will each contact you to receive their key. It is just enough to stop everyone from copying it all over the place.

The method presented here is very simple. If you built something that will be used by geeks, then your protection (if you still decide to use one) must be solid.Īgain, if you really don’t want anyone ever using it without permission, better delete it from your hard drive right now! For them, the installation and the registration must be easy and must work the first time they try it. If you built something that will be used by professionals in office, you have more chances that they will buy your product. The thing here is to know your target population. Some are more difficult than others to hack but everyone is breakable. Many ways of achieving that are available and even components can help you. At the same time, you want to be able to distribute it freely but as a trial that expires in a given number of days.

After you passed many days or maybe months creating the latest killer application, you just don’t want to see it all over the place used by unauthorized users (used that haven’t paid their due to you).
