- I have written a program, I want people to pay for it
- It is a type of program I don't expect hackers to have motivation to hack (it's a recipe program)
- If the program doesn't receive a valid activation key, it goes into limited trial mode
- The activation key is the SHA1 hash of the installation key + a guid I picked. They must enter this key to get out of trial mode.
- The installation key is the SHA1 hash of the hard drive model + serial number. They get this and must email it to me with money.
- I don't expect typical users of this program to know how to spoof the HD serial number (lol females).
- Did I do this right? Suggestions?
Name:
Anonymous2008-11-09 9:28
>>40
Did you mean to post ``>>39
Get out of here, Christopher.''?
OP here. Let me tell you what really justifies me charging for this program. Honestly, it's just a front end to manipulate and change a recipe database in realtime. I have the database persisted to a plaintext format for easy parsing and processing using external utilites. I didn't even store it in XML format so perl and unix commands like grep can process it easily. I plan to make the specification for this format publicly known so anyone can develop programs to manipulate this database (known as a workspace in the program).
There are no secret or proprietary algorithms or anything. It's just a manipulator and it computes costs of things, which are all trivial stuff. Indeed anyone is free to develop a competing manipulator of said data. Therefore by charging for this program I am not encroaching on the freedom of the community at all. All they are paying for really is a polished front end.
Name:
Anonymous2008-11-09 19:44
>>45
Buy http://c.uisi.nr/, make it a free USER-GENERATED CONTENT AGILE WEB 2.0 PLATFORM, then live off PG's money with a buddy for a few years.
Protect it with the GNU GENERAL PUBLIC LICENSE. This way you protect FREEDOM.
Name:
Anonymous2008-11-10 11:33
OP here. Let me tell you what really justifies me charging for this program. Honestly, its just a front end to manipulate and change a recipe database in realtime. I have the database persisted to a plaintext format for easy parsing and processing using external utilites. I didnt even store it in XML format so perl and unix commands like grep can process it easily. I plan to make the specification for this format publicly known so anyone can develop programs to manipulate this database (known as a workspace in the program).
Name:
Anonymous2008-11-10 11:35
OP here. Let me tell you what really justifies me charging for this program. Honestly, it's just a front end to manipulate and change a recipe database in realtime. I have the database persisted to a plaintext format for easy parsing and processing using external utilites. I didn't even store it in XML format so perl and unix commands like grep can process it easily. I plan to make the specification for this format publicly known so anyone can develop programs to manipulate this database (known as a workspace in the program).
They banged against the bars of the cell, lusting for my flesh. I saw against the rear wall and waited. After days the bars had bent forward, the pressure from bodies pressed to it had become too much. Tired and starving I was beginning to hear the rotting corpses speak. "shori you can?" and "hey doh ken" the meaning behind these phrases was lost on me. The zombies against the bars had gotten pressed through the bars like a grinder. I felt sick and would have wretched if there were anything in my stomach to expel. The bars creaked and the walls groaned. The cell collapse forward and a flood began to pour forward. Gnashing teeth, jagged claws, empty eyes, and dead souls. I stood my back against the cool jail cell wall. "shor you ken?" I responded "Tiger."