that restrict copying and reuse. So what i am think is i create a file with my key (used to actiavted) and create a hash out of FILE CONTENT and DATE MODIFIED , I ll save the HASH KEY in the DATABASE verify each time . will that work?
How far do you want to go preventing unauthorized people from running your software?
Обсуждают сегодня