- I have written a program, I want people to pay for it
- It is a type of program I don't expect hackers to have motivation to hack (it's a recipe program)
- If the program doesn't receive a valid activation key, it goes into limited trial mode
- The activation key is the SHA1 hash of the installation key + a guid I picked. They must enter this key to get out of trial mode.
- The installation key is the SHA1 hash of the hard drive model + serial number. They get this and must email it to me with money.
- I don't expect typical users of this program to know how to spoof the HD serial number (lol females).
- Did I do this right? Suggestions?
Name:
Anonymous2008-11-07 10:07
- I will probably also accept pictures of tits as payment in exchange for a key.
Name:
Anonymous2008-11-07 10:18
Lame.
Name:
Anonymous2008-11-07 10:44
la-a-a-ame
Name:
Anonymous2008-11-07 11:24
>>1
You will piss users off when they get a new PC / HD or when they reformat (if you use the file system serial number (most likely)).
Are you really scared that some housewife shares the key with her friends? If a key gets on warez websites somehow (how many housewifes use warez websites?), you can always blacklist it in later versions. You should at least give users virtually unlimited new keys.
Also, crackers are likely to crack any crapware that they come across (usually on sites like download.com), especially if it's really easy like your program. It's not really worth fighting though.
Name:
Anonymous2008-11-07 12:05
I will crack your crap. And then I will sell it to the Kenyans.
You do know that unless you employ an array of complicated measures to prevent your program from being disassembled/modified, every programmer with two weeks worth of assembly experience can simply override any key validation you code, right?
>>10
Are you fucking kidding me? You better be fucking kidding me. There are tools which can let you view and edit the bytecode, they can even get you back the source code. If an obfuscator is used, there are libraries (http://jakarta.apache.org/bcel/) to modify and step through classes at runtime.
I might just ask you to GTFO, if that's okay with you.
>>10
Java is even more bidirectional because it's bytecodes are so high-level, and near-perfect decompilers exist.
For C and C++ there are decompilers which can produce equivalent code (actually C++ is decompiled from C), but not for any arbitrary binary.
But you're not trying to understand the program, you're trying to change one little flow path.
Name:
Anonymous2008-11-07 16:38
Forget it, it's NP-complete.
damn /prog/ newbies, don't you know the proper response?
Name:
Anonymous2008-11-07 16:45
- It is a type of program I don't expect people to have the motivation to pay for (it's a recipe program)
Also, if you insist on making your crap shareware, don't bother with anything but a simple serial number. If you think any kind of online or hardware based validation is not fundamentally a fucking stupid idea, I suggest killing yourself.
>>5
It's the hard drive model + serial number, which doesn't change during reformats or any filesystem activity at all. Actually, I think it would be more than totally unlikely that a housewife would share her key with a friend.
I know crackers aren't worth fighting. I'd probably open-source it at some point in the future.
>>9
Which is NOT your typical housewife. Also, do you think a person with that ability will even be interested in this program? I think it is unlikely. If this was something gamers/hackers/programmers/4channers would typically want, then yeah I would expect it to be hacked to bits and hung out to dry in all warez realms. I don't think such would waste their time with this.
>>15
You are in the gamer/hacker/programmer/4channer category and that is why you don't want to pay for it. Me too. I wouldn't pay for this program when I can (gasp?) write it myself, which I did. But I'm seeking to exploit others that are not in this group. Help me help you to help me not help others, okay?
Name:
Anonymous2008-11-07 18:45
I will, from this day forward, index all proprietary recipe programs and release hacks for each one.
Srs guys, I need 2k monies to feed my starving family
Name:
Anonymous2008-11-07 19:50
Your stupid housewives probably know about virtualization and the enterprise benefits it gives, so they will install it onto a VM and quickly defeat your carefully crafted scalable protection scheme (and by scheme, I don't mean the programming language).
Also, try explaining your typical housewife what a "per-hard drive license" is. These people buy a new computer every 3 months when the old one dies of AIDS.
Name:
Anonymous2008-11-07 20:07
>>1, I will replicate your proprietary functionality in a cheapass .NET program and steal your customers.
>>24
I meant, as Free Software. Then no one will buy your crapware.
Name:
152008-11-08 5:27
>>18
No, I've actually paid for all the non-free programs I have. It's just that there are billions of free recipe programs out there, and you will have a hard time getting paid for yours.
Name:
Anonymous2008-11-08 8:42
Dear >>1,
Your idiocy has provided me with several minutes of cheap entertainment and for that i thank you
Name:
Anonymous2008-11-08 8:50
An open source one will come along and be better than yours.
Name:
Anonymous2008-11-08 9:14
>>17
You might want to look at threads from 2007 or earlier
(it's a recipe program)
If you used my proud and noble Algorithmic Language Scheme to make some retarded program for housewives I'm going to shove a cdr down your throat so hard that the recursion will rip you a new haxed anus.
Name:
Anonymous2008-11-08 20:32
Cunts like it rough. Use a USB dongle.
Name:
Anonymous2008-11-08 20:36
>>34
That's not enough! Use a license server. THAT will teach 'em.
Name:
Anonymous2008-11-08 23:06
Software does not want to be protected.
Information wants to be free.
Name:
Anonymous2008-11-09 7:23
OP here. My girlfriend says you guys are all people who would be willing to work at Media Play for six dollars an hour.
OP here. Let me tell you what really justifies me charging for this program. Honestly, it's just a front end to manipulate and change a recipe database in realtime. I have the database persisted to a plaintext format for easy parsing and processing using external utilites. I didn't even store it in XML format so perl and unix commands like grep can process it easily. I plan to make the specification for this format publicly known so anyone can develop programs to manipulate this database (known as a workspace in the program).
There are no secret or proprietary algorithms or anything. It's just a manipulator and it computes costs of things, which are all trivial stuff. Indeed anyone is free to develop a competing manipulator of said data. Therefore by charging for this program I am not encroaching on the freedom of the community at all. All they are paying for really is a polished front end.
Name:
Anonymous2008-11-09 19:44
>>45
Buy http://c.uisi.nr/, make it a free USER-GENERATED CONTENT AGILE WEB 2.0 PLATFORM, then live off PG's money with a buddy for a few years.
Protect it with the GNU GENERAL PUBLIC LICENSE. This way you protect FREEDOM.
Name:
Anonymous2008-11-10 11:33
OP here. Let me tell you what really justifies me charging for this program. Honestly, its just a front end to manipulate and change a recipe database in realtime. I have the database persisted to a plaintext format for easy parsing and processing using external utilites. I didnt even store it in XML format so perl and unix commands like grep can process it easily. I plan to make the specification for this format publicly known so anyone can develop programs to manipulate this database (known as a workspace in the program).
Name:
Anonymous2008-11-10 11:35
OP here. Let me tell you what really justifies me charging for this program. Honestly, it's just a front end to manipulate and change a recipe database in realtime. I have the database persisted to a plaintext format for easy parsing and processing using external utilites. I didn't even store it in XML format so perl and unix commands like grep can process it easily. I plan to make the specification for this format publicly known so anyone can develop programs to manipulate this database (known as a workspace in the program).
They banged against the bars of the cell, lusting for my flesh. I saw against the rear wall and waited. After days the bars had bent forward, the pressure from bodies pressed to it had become too much. Tired and starving I was beginning to hear the rotting corpses speak. "shori you can?" and "hey doh ken" the meaning behind these phrases was lost on me. The zombies against the bars had gotten pressed through the bars like a grinder. I felt sick and would have wretched if there were anything in my stomach to expel. The bars creaked and the walls groaned. The cell collapse forward and a flood began to pour forward. Gnashing teeth, jagged claws, empty eyes, and dead souls. I stood my back against the cool jail cell wall. "shor you ken?" I responded "Tiger."