How to Copy Protect an Abap Solution ?

Hi guys !
We have developed a Solution sold to several companies and we would like to "copy protect" it against the re-selling.
Have you got any idea of a way that I can implement?
I thought about something like a Key Activation. I mean, when the Solution is sold and implemented into the customer system, the customer provides me his Number Version of SAP System and I provide him back the key activation ... like the Windows Licenses.
Have you got some idea, in that way ?
Thank for you help.
Rachid.

Hi Glen !
yes, I have seen this topic a couple of days ago. Thank you very much.
Otherwise, I have several ideas to implement this need via Web Services/Mail and Algorithms based on cryptology to generate and check the keys... but unfortunately there is full specific. I am looking for a standard way, preferably...
Rachid.

Similar Messages

  • How to copy/download  all ABAP programs in a text with a single report  ?

    How to copy/download  all ABAP programs in a text format with a single report/TC  ?
    How to copy/download  ABAP source code with all include programs ?....
    we need to search & copy all include programs everytime....

    Hi,
    check this link
    downloading programs
    Regards

  • How to copy wd for abap program?

    Hi SAP GEARS!
    I'm developing a program (wd) in Minisap when i have not a net connection. How can i copy the wd program from this minisap to a real workplace?
    A solution is caching  data and cofile files but in standard minisap instalation the transport layers are not configured
    so, there is someone with enough goodness to help me with this thread?
    Tanks!

    Hello,
    If you want to download a Web Dynpro Component to your PC for moving between systems that aren't connected via transport, then I suggest that you look at SAPLink: http://saplink.org
    SAPLink is an Open Source community project for downloading and uploading ABAP development objects in XML format via simple report instead of the transport system. There is a plug-in for SAPLink that supports Web Dynpro Components.
    Hope this helps!
    Regards,
    Srilatha M

  • How to copy and paste the solution files of SharePoint 2010 from one machine to another machine?

    Hi,
    I was working with SharePoint 2010  in one of my Virtual machines.Now that the lease for my Virtual Machine is going to expire, I want to shift the entire contents of the project to another machine (local) with SharePoint 2010. Also, I want the pages
    in the other machine to be editable. 
    How can I copy the solution files to the other machine? And I want the exact path where the files are located, so that I can shift them to the other machine.
    Thanks in advance. 

    ...that's not a good approach.
    Deploying customisations can be as simple as files being copied onto the file system. Most of the time however there is a lot more happening behind the scenes and simply copying the files won't work.
    Also that is assuming that you mean solutions rather than the pages themselves (or the contents of document libraries) in which case you want to copy databases, not just files.
    SharePoint isn't a simple thing to move, you may need to look at this a bit harder.

  • I'm new to lightroom and beginning digital photography --just installed Lr 3 (I had purchased some time ago). How do I best copy  protect my photgraphs--I am ready to lauch an online exhibition on my new website. Thank you for any advise. `karendyn

    Re: Lightroom 3 & photo protection
    Hi Lightroom  Forum,
    Would appreciate your advise on the above--especially how to copy protect my copyrighted images.
    Thanks for any help with this--would love to launch my website by the week-end--today would be so great, if I could only pull it off!
    ~Karen

    There is no bullet-proof way of stopping viewers of your images copying them from the web, but you can prevent total loss by either using a large visible watermark right across the width of them ( of course this may obscure too much or be aesthetically unappealing ), or, possible the best, only put low resolution versions of your images on your site. These look acceptable at the small sizes commonly used on the web, but when enlarged to normal sizes, such as A4 or A5, look too grainy.

  • I have a document that in Word required a password to open. I copied and pasted it to Pages. Put the password protection on. Now if I click on that filename in Finder it automatically opens.Why. Anyone can read it. How do I protect it again?

    I have a document that in Word required a password to open. I copied and pasted it to Pages. Put the password protection on. Now if I click on that filename in Finder it automatically opens.Why. Anyone can read it. How do i protect it again?

    You saved it after setting the Password? :
    Inspector > Document > Document > Require Password to Open
    I just tested it and it shows up ijn The Finder with a padlock on the file icon and does require a password to open.
    Peter

  • How can I copy protect a Labview application?

    We have a high value Labview 7.1 application that we want to copy protect.  Are there any third party software solutions available that work with Labview and provide hardware locked copy protection?  We want to prevent a single license key from being shared to allow installation of our application on multiple machines. 
    We looked into Software Passport / Armadillo but Software Passport does not support Labview.  We would prefer to use a third party solution as opposed to coding something ourselves.  We are not experienced with writing software security applications but if third party solutions are not available I guess we'll need to get our feet wet.  Thanks.

    I can imagine that a direct API implementation might be better.
    My personal experience of such implemtnations has been that under these circumstances it is critical that: -
      The implementation is solid.
      Trust and security are correctly established.
    It has been my experience that the above are quite difficult to assure. Where it works the EXE approach is probably better although the exposure to an attack by a sotware kit might be greater.
    The above are why I indicated my alternate technique, not using a donlge but my own system. It is almost certainly weaker than a commercial implementation in some possibly many ways. But has the advantage that I change the implementation and techniques and whoever wants to access it has to start from zero. There are no kits because there aren't a million copies available.
    I guess the right thing to do is to issue a challenge............perhaps with a reward........
    But my experience of encryption is that it can always be broken by someone somwhere. The real questions are by who and when.
    Message Edited by Conseils on 11-03-2007 12:07 PM

  • How can I protect DVDs I create in PE from being copied?

    How can I protect DVDs I create in PE from being copied? I know that I can't prevent 100%, but would like to stop a majority. Can I apply MACROVISION to my DVDs?

    >cycle redundancy failure
    Optical discs are prone to read errors, particularly when finger prints, fluff, etc. get on the reading surface, so redundant information is added in such a way that minor errors can be corrected. If the disc is damaged sufficiently seriously, e.g. a deep scratch running around a track, the error correction system fails to correct the error, and you will be unable to read that file on a computer by normal means. Note that only the last .VOB file that was scratched would be unreadable.
    I bought a cheap commercial DVD that had a serious pressing error, causing the movie to jump. Windows explorer failed to read the DVD but I did find a program (forgotten which) which made 10 attempts to read the faulty sector before carrying on. The copied movie then played perfectly (well there must have been a minor glitch where the error was, but I couldn't see it).

  • How can I unlock the copy protection of songs that I've acquired some years ago with an old - and non existing anymore - account? Can I link the songs to my new account or do I have to purchase them again?

    How can I unlock the copy protection of songs that I've acquired some years ago with an old - and non existing anymore - account? Can I link the songs to my new account or do I have to purchase them again?

    If you're in the US, you will be able to use iTunes Match for $25 a year to remove copy protection in a few months: http://www.apple.com/icloud/features/
    If you're not, you can't.  You can authorise iTunes with the old account in addition to your current account, so all your songs will play, but I'm not sure what will happen if you try to sync them to an iPod.

  • How did my own video become copy protected?

    I just copied some AVI files that I'd recorded with a Canon S60 digital camera. I opened the files using QuickTime Player (QuickTime Pro 7.0.4), trimmed some of them, and saved them as .mov files.
    I then attempted to place the newly-saved movies into iDVD and received a message that I couldn't do so because this was "copy protected video."
    Now, when I open the converted files with QuickTime Player, the Save, Save As.., Export, Copy, and Trim to Selection options are all dimmed.
    To make matters worse, I uninstalled Flip4Mac, in case that was interfering, and now when I open the files in QT Player, the video is blank. (It still shows and plays properly when previewed in the Finder, however.)
    I can't go back to the original files, because I deleted them from the camera card and from my hard drive once I had "clean" QuickTime versions.
    I'd appreciate any suggestions.
    Thanks...

    Hi Eustace,
    Thanks for the suggestion but it doesn't work. I go to Users/myself/Library and there is only a file named Preference Panes and that file is empty. There is no plain Preferences file.
    I then did a search in my Finder for "mouse" in the file name and no .plist files came up. Here's what did:
    DOMMouseEvent.h (haven't a clue what this is but it originates in the Developer files and there's 2 identical files)
    mouse_preferences.html (this originates in the Audacity program and I've never touched it)
    preferences_mouse_extended.png (originates in Audacity too, doesn't open)
    mouseevt.tex (looks like a blank page and doesn't open. Originates in the Developer files.)
    and
    XF86MiscGetMouseSettings.3 (both of these originate in the Developer files)
    XF86MiscSetMouseSettings.3
    I have restarted my computer, my mouse, my keyboard. This is really driving me nuts! lol It is also grabbing files on my desktop and moving as I move the cursor...which is NOT good at all. If it's not grabbing a file and in a blank space on my desktop, it grabs like it wants me to select a portion of the screen for a screenshot! Truly bizarre.
    Could it be that my wireless mouse is simply "kaput" and I have to buy a new one? It never dawned on me that it could happen but...
    Thanks again for your help. I'll keep trying things.

  • How to copy and paste text from one photo book page to another.

    hello,i downloaded this software 2days ago,and i've been having so much fun with it. pls i need help on how to copy and paste text from one photo book page to another. Secondly how to copy my completed photo book pages project to another laptop for printing. thanks
    This question was solved.
    View Solution.

    Hi DG.
    The easiest way to copy an HP Photo Creations project to another computer is to click the Share button. That will upload the project to the Web and give you a link you can paste into an email. Clicking the link on the other computer allows you to download the project and personalize it. This quick video shows the process. (The screen looks slightly different now, but the concept is the same.)
    Another way to share a project is copy the project folder to a thumb drive. Look in Documents/HP Photo Creations/My Things to find your saved projects.
    Our customer support team would be happy to walk you through the process. Contact them at [email protected]
    Hope this helps,
    RocketLife 
    RocketLife, developer of HP Photo Creations
    » Visit the HP Photo Creations Facebook page — news, tips, and inspiration
    » See the HP Photo Creations video tours — cool tips in under 2 minutes
    » Contact Customer Support — get answers from the experts

  • How we can see the abap memory data

    How we can see the abap-memory data
    fine the code below
    import lsind
             report_title
             table_name
             report_field
             change_display
             show_hide
             conversion_exits
             table_description
             form_program
             select_form
             update_form
             line_size
             line_count
             records[]
             fields[]
             header_fields[]
             select_fields[]
             xrep[]
             from memory id 'LZUT5U11'.
    Regards
    santhosh
    mail-id : [email protected]

    Dear Santosh,
    ABAP MEMORY:
    A logical memory model illustrates how the main memory is distributed from the view of executable programs. A distinction is made here between external sessions and internal sessions .
    An external session is usually linked to an R/3 window. You can create an external session by choosing System/Create session, or by entering /o in the command field. An external session is broken down further into internal sessions. Program data is only visible within an internal session. Each external session can include up to 20 internal sessions (stacks).
    Every program you start runs in an internal session.
    All "squares" with rounded "corners" displayed in the status diagram represent a set of data objects in the main memory.
    The data in the main memory is only visible to the program concerned.
    CALL TRANSACTION and SUBMIT AND RETURN open a new internal session that forms a new program context. The internal sessions in an external session form a memory stack. The new session is added to the top of the stack.
    When a program has finished running, the top internal session in the stack is removed, and the calling program resumes processing.
    The same occurs when the system processes a LEAVE PROGRAM statement.
    LEAVE TO TRANSACTION removes all internal sessions from the stack and opens a new one containing the program context of the calling program.
    The ABAP memory is initialized after the program is called. In other words, you cannot transfer any data to a program called with LEAVE TO TRANSACTION via the ABAP memory.
    SUBMIT replaces the internal session of the program performing the call with the internal session of the program that has been called. The new internal session contains the program context of the called program with which it is performed.
    When a function module is called, the following steps are executed:
    A check is made to establish whether your program has called a function module of the same function group previously.
    If this is not the case, the system loads the associated function group to the internal session of the calling program as an additional program group. This initializes its global data.
    If your program used a function module of the same function group before the current call, the function module that you have called up at present can access the global data of the function group. The function group is not reloaded.
    Within the internal session, all of the function modules that you call from the same group access the global data of that group.
    If, in a new internal session, you call a function module from the same function group as in internal session 1, a new set of global data is initialized for the second internal session. This means that the data accessed by function modules called in session 2 may be different from that accessed by the function modules in session 1.
    You can call function modules asynchronously as well as synchronously. To do so, you must extend the function module call using the addition STARTING NEW TASK ''. Here, '' is a symbolic name in the calling program that identifies the external session, in which the called program is executed.
    Function modules that you call using the addition STARTING NEW TASK '' are executed independently of the calling program. The calling program is not interrupted.
    To make function modules available for local asynchronous calls, you must identify them as executable remotely (processing type: Remote-enabled module).
    There are various ways of transferring data between programs that are running in different program contexts (internal sessions). You can use:
    (1) The interface of the called program (standard selection screen, or interface of a
    subroutine, function module, or dialog module)
    (2) ABAP memory
    (3) SAP memory
    (4) Database tables
    (5) Local files on your presentation server.
    For further information about transferring data between an ABAP program and your presentation server, refer to the documentation for the function modules WS_UPLOAD and WS_DOWNLOAD.
    Function modules have an interface, which you can use to pass data between the calling program and the function module itself (there is also a comparable mechanism for ABAP subroutines). If a function module supports RFC, certain restrictions apply to its interface.
    If you are calling an ABAP program that has a standard selection screen, you can pass values to the input fields. There are two options here:
    By using a variant of the standard selection screen in the program call
    By passing actual values for the input fields in the program call
    If you want to call a report program without displaying its selection screen (default setting), but still want to pass values to its input fields, there is a variety of techniques that you can use.
    The WITH addition allows you to assign values to the parameters and select-options fields on the standard selection screen.
    If the selection screen is to be displayed when the program is called, use the addition: VIA SELECTION-SCREEN.
    Use the pattern button in the ABAP Editor to insert a program call via SUBMIT. The structure shows you the names of data objects that you can complete with the standard selection screen.
    For further information on working with variants and further syntax variants for the WITH addition, see the key word documentation in the ABAP Editor for SUBMIT.
    You can use SAP memory and ABAP memory to pass data between different programs.
    The SAP memory is a user-specific memory area for storing field values. It is available in all of the open sessions in a user's terminal session, and is reset when the terminal session ends. You can use its contents as default values for screen fields. All external sessions can access SAP memory. This means that it is only of limited use for passing data between internal sessions.
    The ABAP memory is also user-specific, and is local to each external session. You can use it to pass any ABAP variables (fields, structures, internal tables, complex objects) between the internal sessions of a single external session.
    Each external session has its own ABAP memory. When you end an external session (/i in the command field), the corresponding ABAP memory is released automatically.
    To copy a set of ABAP variables and their current values (data cluster) to the ABAP memory, use the EXPORT TO MEMORY ID statement. The (up to 32 characters) is used to identify the different data clusters.
    If you repeat an EXPORT TO MEMORY ID statement to an existing data cluster, the new data overwrites the old.
    To copy data from ABAP memory to the corresponding fields of an ABAP program, use the IMPORT FROM MEMORY ID statement.
    The fields, structures, internal tables, and complex objects in a data cluster in ABAP memory must be declared identically in both the program from which you exported the data and the program into which you import it.
    To release a data cluster, use the FREE MEMORY ID statement.
    You can import just parts of a data cluster with IMPORT, since the objects are named in the cluster.
    In the SAP memory, you can define memory areas (SET/GET parameters, or parameter IDs), which you can then address by a name of up to 20 characters.
    You can fill these memory areas either using the contents of input/output fields on screens, or using the ABAP statement:
    SET PARAMETER ID '' FIELD .
    The memory area with the name now has the value .
    You can use the contents of a memory area to display a default value in an input field on a screen.
    You can also read the memory areas from the SAP memory using the ABAP statement GET PARAMETER ID FIELD . The field then contains the value from parameter .
    The link between an input/output field and a memory area in SAP memory is inherited from the data element on which the field is based. You can enable the set parameter or get parameter attributes in the input/output field attributes.
    Once you have set the Set parameter attribute for an input/output field, you can fill it with default values from SAP memory. This is particularly useful for transactions that you call from another program without displaying the initial screen. For this purpose, you must activate the Set parameter functionality for the input fields of the first screen of the transaction.
    You can:
    (1) Copy the data that is to be used for the first screen of the transaction to be called to the parameter ID in the SAP memory. To do so, use the statement SET PARAMETER immediately before calling the transaction.
    (2) Start the transaction using CALL TRANSACTION or LEAVE TO
    TRANSACTION . If you do not want to display the initial screen, use the AND
    SKIP FIRST SCREEN addition.
    (3) The system program that starts the transaction fills the input fields that do not already have default values and for which the Get parameter attribute has been set with values from SAP memory.
    The Technical information for the input fields in the transaction you want to call contains the names of the parameter IDs that you need to use.
    Parameter IDs should be entered in table TPARA. This happens automatically if you create them via the Object navigator.
    Programs that you call using the statements SUBMIT , LEAVE TO TRANSACTION , SUBMIT AND RETURN, or CALL TRANSACTION run in their own SAP LUW, and update requests receive their own update key.
    When you use SUBMIT and LEAVE TO TRANSACTION , the SAP LUW of the calling program ends. If no COMMIT WORK statement occurred before the program call, the update requests in the log table remain incomplete and cannot be processed. They can no longer be executed. The same applies to inline changes that you make using PERFORM … ON COMMIT.
    Data that you have written to the database using inline changes is committed the next time a new screen is displayed.
    If you use SUBMIT AND RETURN or CALL TRANSACTION to insert a program and then return to the calling program, the SAP LUW of the calling program is resumed when the called program ends. The LUW processing of calling and called programs is independent.
    In other words, inline changes are committed the next time a new screen is displayed. Update requests and calls using PERFORM ... ON COMMIT require an independent COMMIT WORK statement in the SAP LUW in which they are running.
    Function modules run in the same SAP LUW as the program that calls them.
    If you call transactions with nested calls, each transaction needs its own COMMIT WORK, since each transaction maps its own SAP LUW.
    The same applies to calling executable programs, which are called using SUBMIT AND RETURN.
    The statement CALL TRANSACTION allows you to
    Shorten the user dialog when calling using CALL TRANSACTION USING .
    Determine the type of update (asynchronous, local, or synchronous) for the transaction called. For this purpose, use the addition CALL TRANSACTION USING UPDATE 'update_mode', where update_mode can have the values a (asynchronous), L (local), or S (synchronous).
    Combining the two options enables you to call several transactions in sequence (logical chain), to reduce their screen sequence, and to postpone processing of the SAP LUW 2 until processing of the SAP LUW 1 has been completed.
    When you call a function module asynchronously using the CALL FUNCTION STARTING NEW TASK ' ' statement, it runs in its own SAP LUW.
    Programs that are executed with a SUBMIT AND RETURN or CALL
    TRANSACTION statement starts their own LUW processing. You can use these to perform nested (complex) LUW processing.
    You can use function modules as modularization units within an SAP LUW.
    Function modules that are called asynchronously are suitable for programs that allow parallel processing of some of their components.
    All techniques are suitable for including programs with purely display functions.
    Note that a function module called with CALL FUNCTION STARTING NEW TASK is executed as a new logon. It, therefore, sees a separate SAP memory area. You can use the interface of the function module for data transfers.
    Example: In your program, you want to call a display transaction that is displayed in a separate window (amodal). To do so, you encapsulate the transaction call in a function module, which you set as to Remote-enabled module. You use the function module interface to accept values that you write to the SAP memory. You then call up the transaction in the function module using CALL TRANSACTION AND SKIP FIRST SCREEN. You call the function module itself asynchronously.
    Type ‘E' locks for nested program calls may be requested more than once from the same object. This behavior can be described as follows:
    Lock entries from function modules called synchronously increment the cumulative counter, And are therefore successful.
    Lock entries from programs called with CALL TRANSACTION or SUBMIT
    AND
    RETURN is refused. The object to be locked by the called program is displayed as already Locked by another user.
    Programs that you call using SUBMIT or LEAVE TO TRANSACTION cannot come into conflict with lock entries from the calling program, since the old program ends when the call is made. When a program ends, the system deletes all of the lock entries that it had set.
    Lock requests belonging to the same user from different R/3 windows or logons are treated as lock requests from other users.
    Regards,
    Rajesh.
    Please reward points if found helpful.

  • Fillable forms question - FrameMaker to PDF - Without losing copy protection options

    Hello,
    I'm looking for a solution that will allow us to integrate fields in a Chapter Review-style question area where users can comment their answers (instead of using StickyNotes). It must disallow printing/copying etc to meet content protection requirements. I've dug through all of my options and can't seem to find any viable method without allowing the "Edit Content" option which allows users to copy the content.
    We're currently using FrameMaker 9 but will be jumping to TCS5 soon.
    As an example, we would want something like the following question, which exists in a FrameMaker document, to be commented on:
    2. Which DID/DNIS mapping is recommended for mapping a single extension?
    Thank you in advance for any assistance with this.

    > It must disallow printing/copying etc to meet content protection requirements.
    ebook format copy protection is largely an illusion. Leaving aside the availability of euphemistically named "password recovery" software, the widespread availability of low-cost (often bundled free) OCR software means: If you can see it, you can recover the text, unless it's heavily CAPTCHA'd.
    Even if the user is blocked from reading the computer's frame buffer (i.e., prevented from using the PrintScreen key on Windows), most cell phones now have cameras with more than sufficient resolution for full text recovery. Some users even know how to turn off the flash .
    If the supposedly eyes-only document is available on the web, I would not be the least bit surprised to learn that one or more search engines has already OCR'd and indexed every word in it (you can be sure that the NSA's has).
    Managers asking for copy protection need to realize that they are making the authoring task much harder for little benefit, and often creating pointless annoyance for end users. Copy protection might briefly deter casual copiers, but is no obstacle at all to anyone the least bit tech savvy.
    If copy prevention really matters, each copy of the document needs to be computer-generated for the specific licensed end user, with user-customized, easily traced content.
    All that aside, and assuming management can't be dissuaded on the copy protection issue, does TimeSavers support insertion of form fields while preserving security settings?

  • BEWARE OF ADOBES NEW COPY PROTECTION SOFTWARE  IT CAN SERIOUSLY HARM YOUR COMPUTER

    Beware of Adobes new copy protection software it can seriously harm your computer!
    The FlexNet licensing software that is installed on your computer along with CS3 and CS4, and possibly other, products has the capacity to seriously harm your system. It seems that it relies on some sort of insidious rootkit technology, which hides files on your hard drive. The trouble is that it is not robust and, if it gets broken, has the capacity to render your computer unusable by any product that uses this technology unless and until the hard drive is completely reformatted and everything properly reinstalled. Given that we all pay good money to prevent this doomsday scenario occurring in our computers, this should be unacceptable.
    In particular, anyone who thinks that they can rely on disk imaging technology as a means of backing up or migrating system drives containing installations of Adobe CS3/4 should think again. Adobes new software and activation technology does not support disk cloning, and the result of using it is likely to render your computer permanently unusable, at least by Adobe products.
    I know this because it has happened to me. My computer completely freezes suddenly anytime during or after running CS3. After spending some time investigating the problem, Adobe came up with the following astonishing response:
    ]"We have gone through all the material and logs once again, and came to the conclusion, the problem was in fact caused by cloning your hard drive. What happened is, that the FlexNet service, the service responsible for the activation and licensing of the product, has been damaged. Cloning our products is not supported by our products, and was therefore not tested either. The problem is, there are leftovers of the last Photoshop. installation's FlexNet files present in your system. To make matters worse, these files are well hidden, to protect our programs from piracy. Therefore, they can't be removed. Since a deactivation and reinstallation were already done to no avail, the only thing that's left to do, is a complete reformatting of your harddrive. We are very sorry to have to tell you this, but it really is the only option left.
    Kind regards,
    Adobe Technical Support"
    Needless to say I am hopping mad! The implication that the problem is somehow my fault for daring to clone my hard drives is absurd! Disk imaging is a perfectly legitimate way of backing up and restoring or migrating hard drives and what they seem to be saying is that disk imaging as a backup & restore solution does not work with Adobe and Macromedia products. If this is so, a warning to this effect should be writ large on all of them.
    To top it all, Adobes abdication of responsibility shows a blatant disregard for their paying customers. They have rolled out a technology that, by their own admission, has not been fully tested and which has the potential to inflict irrevocable harm on their customers computer systems as a result. (Even Microsoft would not dare to try to get away with such a thing!) They have done this to protect their software from piracy and thus to protect their revenue stream. Fine, but they should do this at their own expense, not at the expense of their loyal paying customers, and, when things do go wrong, they should be willing and able to provide a fix. If Adobe lose these paying customers, the piracy issue becomes irrelevant! (If you ask me, a far more elegant solution to the piracy problem would be to lower the price of the software, which is absurdly over-priced, certainly here in the UK.)
    As a loyal customer and user of Photoshop virtually from day one, I do expect better than this. For the first time since I took up digital photography, I am looking for a different photo editing solution. I certainly do not think that any more of my hard earned cash will be heading in Adobes direction, at least until this is sorted out.

    It is possible that cloning will work for some, maybe, for example, if done between identical disks. Adobe are saying that they do not guarantee that it will; and sometimes it won't.
    However that is beside the point. Microsoft, bless their socks, have gone to great lengths to produce an operating system, which, for all its faults, is robust. If something gets broken, it will, 9 times out of 10 repair itself, and what remains is always fixable, once the problem is identified. It is amazing just how much abuse XP can take and still function.
    Now Adobe has come along and done something that negates all of that. They have introduced a technology, that, once broken, cannot be fixed. That goes against the principles that everyone else has been working towards.
    At the moment, few people may be affected (maybe more than Adobe care to admit to, and perhaps some who do not yet know that they are) but software users need to be wary of the thin end of the wedge. If all software vendors did similar things and played fast and loose with the basic fabric of the operating and file systems, all computers would soon be reduced to piles of junk.
    That is why it is wrong.
    Until Microsoft themselves support 3rd party product licensing and activation within the operating system, Adobe should hold off on this.

  • Copy Protection without DLT - Link does not work

    I'm trying to find out how I can protect DVDS with Encore. Or if anyone knows of reasonably priced software to do this. I see there is a link to something called, Protection without DLT, but the link does not work....
    Help!
    Jessica

    CSS keys are only licensed to replicators, player manufacturers, etc. so it is highly unlikely that there will ever be a free solution for creating encrypted DVDs.
    CSS encryption is worthless, by the way.  It has been compromised for over a decade.  There are more complex copy-protection methods available that work by creating malformed structures on the DVD meant to confuse "ripping" programs.  However, they are an additional cost from third parties and, more significantly, they run the risk of making your product incompatible with older players or with some computer DVD-ROM drives or software players. 
    Your replication facility can tell you which additional copy-protection methods they offer and what their cost is.

Maybe you are looking for