Re: AW: security code number generation

2011-07-18 Thread Chipp Walters
Our own home rolled scheme relies on the customers email address as the first part of the key. So, a customer has to enter their email address, then the regcode. If they want to share the app, they need to share their email address. This has a couple of intended consequences. First, I think a custo

Re: AW: security code number generation

2011-07-18 Thread Pete
Thanks to everyone for the thoughts on this. I agree that you can never 100% prevent piracy from those who are determined enough and can waste a lot of time and effort trying to do so. I guess that's a plus for Zygodact - I buy the product, spend perhaps a couple of hours doing whatever customisa

Re: AW: security code number generation

2011-07-18 Thread J. Landman Gay
On 7/18/11 2:43 AM, Tiemo Hollmann TB wrote: As I understand Zygodact, or Peters or Shaos approach the user can pass on his "name, etc." and the generated code to everyone else to unlock the software. How do you handle this issue? Is it just something "as is", is this scenario so negligible in y

Re: AW: security code number generation

2011-07-18 Thread Peter Brigham MD
You could include (without telling the user) the contents of $user as part of what is inputted to generate the code. This would make it more secure but cause problems with portability, etc. I agree with the later posts pointing out the trade-offs between security and user-frendliness. Consider y

AW: security code number generation

2011-07-18 Thread Tiemo Hollmann TB
Gosh! Sorry Sean for having put you into the wrong country, should have had a look on google maps :) Nevertheless the Japanese women showed a great contest here in germany... Tiemo > -Ursprüngliche Nachricht- > Von: use-livecode-boun...@lists.runrev.com [mailto:use-livecode- > boun...@list

AW: security code number generation

2011-07-18 Thread Tiemo Hollmann TB
First: Congratulations to Shao to the winner of the FIFA womens soccer world championship: Japan! As I understand Zygodact, or Peters or Shaos approach the user can pass on his "name, etc." and the generated code to everyone else to unlock the software. How do you handle this issue? Is it just som