Introducing the “Welcome to Xojo” Bundle!

New to Xojo and looking for guidance? We've put together a terrific bundle to welcome you! Xojo Bundle

This bundle includes six back issues of the magazine -- all of year 14 in printed book and digital formats -- plus a one-year subscription so you'll be learning all about Xojo for the next year. It's the perfect way to get started programming with Xojo. And you save as much as $35 over the non-bundle price!

This offer is only available for a limited time as supplies are limited, so hurry today and order this special bundle before the offer goes away!

Article Preview

Buy Now



Creating A Registration Algorithm

(or How To Protect Your Program In Three Easy Steps)

Issue: 3.5 (May/June 2005)
Author: Dana Chaffin
Author Bio: Dana Chaffin is the author of several ESL teaching books. He discovered RB and instantly started developing ESL programs for teachers and students alike.
Article Description: No description available.
Article Length (in bytes): 17,974
Starting Page Number: 23
RBD Number: 3511
Resource File(s):

Download Icon 3511.sit Updated: Wednesday, May 18, 2005 at 11:40 AM
Download Icon 3511.zip Updated: Wednesday, May 18, 2005 at 11:40 AM

Related Link(s): None
Known Limitations: None

Excerpt of article text...

You've just finished developing your best application ever. It took you months of coding. The beta tests went without a hitch and you are now ready to release the software into the world and make your fortune. Suddenly, you realize that you don't have a way to prevent people from just copying the program without paying.

You need to make a software registration algorithm. Before we get to the gory details of how to make your own algorithm, you need to know what you are up against.

There are people out there that will do their best to steal your program. These software crackers have many tools at their disposal and they don't give up easily. On top of that, once they break into your program and steal the registration formula, they put the code, patch, or other ways to break into your program on bulletin boards and web pages. And, as if things couldn't get any grimmer, there is one more fact you must face. You can't stop it from happening. If these thieves really want your code, they will get it.

...End of Excerpt. Please purchase the magazine to read the full article.

Article copyrighted by REALbasic Developer magazine. All rights reserved.




Weblog Commenting and Trackback by HaloScan.com