Requirements:
enterprise has since adult products were not subject to usage time, or is restricted to the date coded inside the program, each time a new program and then compiled to the customer, is very convenient. So the enterprise to I wrote a module, the requirements are as usual:
1, regardless of which program at all times the call to the newly developed module can control the validity of
2, behind the expiration of the software we need to cater a valid registration code the software to continue using
3,
sale christian louboutin shoes, the customer to modify the computer's time or the software to move to the other computer still can control
4,
buy air max 90, if the access the registry is not allowed when the customers know the registry, modify the registry can persist to use the case of
5, the control ought not be also complicated
Analysis:
1, was my first repercussion was to dll, so I used the dll way to do.
2, this can be a RI .
3, I began to want to use the web time of authentication, but not necessarily the customer's computer web, it is not the way to use network time.
4, if the registry, reinstall the system or get other computer software, or can not control, so equitable do not have the registry.
5, the software traits that necessitate registration only need to reference dll and modify the Program.cs file as you can, simple ample, right RegDLL.RegClass reg = new RegDLL.RegClass ( System.IO.File.GetLastWriteTime (System.Reflection.Assembly.GetAssembly (typeof (Form1)). Location). ToShortDateString ()); if (reg.MiStart_Infos () & & reg.MiEnd_Infos ()) Application.EnableVisualStyles (); / / Application.SetCompatibleTextRenderingDefault (true); / / sentence to comment, as a program which can only occur word, dll which has been 1,
best amount mbt shoes 艺术家用四千颗糖果拼出英国地, so here to remark Application.Run (new Form1 ()); else Application.Exit ();
realize the idea:
actually quite simple, I use the software to log two files are the registered time (secret documents said below) and the breath of the time (mentioned below to the registration documents), these two documents you can use Notepad, document the needful coerce as a software file is missing, you can not run the software, of course, the file can be encrypted for more safe,
Depressive illness girl raped by male nurses plead for each other after marriage, but I do not have to do.
dll module functions It��s about time:
one, check whether there is a secret file (Eng.k)
1. exists, read the ciphertext, the ciphertext is empty dates will be written to compile the program (phone this module the software the premier run needs to enrol once)
2. ciphertext is not blank then compared with the current computer time to validate the validity of computer period,
discount jordan shoes, the telling time of manuscript secluded documents ambition be microcomputer
3. This time the effectiveness of That time can not be fewer than the computer software registratiin due time, which made validation
Second, retard the registration documents the existence of (Engi.p)
1. exists, the software reads the ciphertext validity
2. If the ciphertext and the secret documents valid for space information is correct, the generated registration code, and write effective date
3. then likened the current date namely the appointment at which the 2 documents namely the software effectively, alternatively software The registration code namely ineffective, need to re-register a legal prerogative key
three, RI implementation
1. of way, is generated along to the date of registration code slightly
2. the registration code to the customer registration, as to if effective dll needs to be done is four friends
, this approach has a flaw,
alexander mcqueen shoes for sale, if the customer knows the principles of registration, clever and can crack, so surely can not say O (c_c) O ~
source
source code written is not enough to feel beauteous, I do not attempt here, but offer my dll files, RI, and sample projects download address: http://files.cnblogs.com/linyc/REGDLL.rar
Ps: want to discern the source code can decompile the software, peruse the source code that is secondhand to point Disclaimer: This software is merely as a communication technology use, no for mercantile intentions, as a outcome of valid issues arising from other responsibilities, I shall no be responsible.
http://www.cnblogs.com/linyc/archive/2011/03/ 26/1996397.html radioactive stuff approximately the world to Baidu Vs fifty writers: Law is not responsible for you? select Firefox 4 reasons Google introduced the four petitions Disco Short Message Baidu, analysts said the new browser will push the latent of Silverlight to improve its multi- thread capacity (below) the use of the MySQL data charts Myisamchk medicinal Silverlight 2.5D RPG gaming capabilities and effects processing: (vii) Animated Feature Tour VS2010 test function: coded UI test (4) - along jotting test code, ways to construct UI test (beneath) for extra Knowledge Base s
tory ... China-pub computer paperbacks online cache! 65,000 varieties of 2-8 off,
nike zoom! China-Pub-demand typography services, computer print writings uncomplicated C # implementation of the software is valid up】 【original 2011 In March (17) September 2010 (1) July 2010 (2) August 2009 (1) June 2009 (21) 1. Re: C # simple software is valid up to accomplish 【original】 2. Re: C # simple software is valid up to achieve 【original】 3. Re: c # Welcome screen approach 【original】 4. Re: c # Welcome screen approach 【original】 5. Re: regarding treeview control, how to press the root knot of the txt is to distend / collapse the child nodes collection】 【6. Re: how to click the root node ashore the treeview control, the txt can distend / shorten the baby nodes collection】 【7. Re: how to click aboard the treeview control to expand the root of the word / synopsis of child nodes collection】 【8. Re: how to click the root node on the treeview control, the text can expand / shorten the child nodes collection】 【9. Re: c # Welcome to the train of the interface of the original】 【10. Re: How to make Webform and Winform MD5 encryption obtain the same MD5 worth 【order】 1. winform data control is jump under the comboBox and set its merit 【order】 (1279) 2. c # debugging problems Dispose (bool) does not ascertain a suitable way to rewrite 【 ],[collection of child nodes shorten 【】 (634) 1. click on the treeview control how the text can be the root node expand / shrink collection】 【child nodes (6) 2. c # Welcome screen original】 【practice (5) 3. C # simple software implementation phase of up】 【original (2) 4. How Webform and Winform MD5 encryption to get the same MD5 value 【order】 (2) 5. winform data control is jump under the comboBox and set its value 【order】 ( 2) 1. C # simple software is valid up to achieve 【original】 (64) 2. C # Winform occupy fashions minimize and aggrandize the event,
富婆组团海外整容归国 面缠纱布难住边检人员, the near clasp accident 【order】 (45) 3. C # Winform consumer experience finishing 【original 】 (40) 4. C # test is yet running a current collection program 【】 (38) 5. Asp.net page, conceal the column when amending the value of how to get the original】 【(26)