How to protect our Add-on?

Hi Experts
I want to know that how can we give password for installation of Add-on and Can we set time bound for our Add-On expiry?. if yes then tell me how ?
Regards
Gorge

Hi,
There r many ways how u can develop trail versions.
1. U can have a temperory field or table and at the 1st time of installation u can post the SQL server date which cannot be changed by the user (Some use system date too but this can be easily changed by the user) and have a condition for some 15 days or so as per ur requirements.
2. U can write some registry values.
I suggest u to use the 1st menthod, as its simple and foolproof.
Hope it helps,
Vasu Natari.

Similar Messages

  • How to protect java source code?

    Hi everybody
    I love Java but I think that people can decompile my class file to take my source code!Like this program
    http://kpdus.tripod.com/jad.html
    How to protect our source code?Even you use Jar files, they can unzip them and decompile!
    Thanks in advance!

    Use Java Obfuscator. Try one of these
    http://preemptive.com/products/dasho/index.html
    http://www.zelix.com/klassmaster/obfuscator.html
    http://java-source.net/open-source/obfuscators

  • How to set our favourite song as ringtone?

    Hai Friends,
    I don't know how to set our favourite song or favourite cut song as a ringtone for my IPhone 5s, so can u help me to solve my query?
    And if any applications available for set our favourite ringtone means tell me guys...

    RINGTONE
    This how to make ring tones for your iPhone:
    Choose the desired song from you library
    Do a secondary click on your song if you are using a MAC (right click for PC)
    Click "Get Info”
    Go to Options tab
    Set Start Time and Stop Time, some iOS only allow for a 30 sec duration for ringtones, then click OK
    Do secondary click (right click for PC) to your selected song
    Click "Create AAC Version", new song from your selected will added to your library (short one)
    Do secondary click (right click for PC) to your short one (new song)
    Click "Show in Finder”
    Rename file *.m4a to *.m4r, click "use *.m4r”
    Drag the file to library, for the first time it would automatically add your library with new folder "Tones" under Apps folder
    Open the ring tones in the Tones folder of your library than drag it to your iPhone and your ringtone also would be automatically added "Tones" folder.
    Last but not least, set the ring tone in your iPhone under the "Setting-Sound"
    For information on how to make ringtones read http://www.ehow.com/how_2160460_custom-iphone-ringtones-free.html
    Or
    http://www.demogeek.com/2009/07/31/how-to-add-custom-ringtones-to-your-iphone/
    How to sync ringtones to your iPhone - https://discussions.apple.com/docs/DOC-3792

  • How to protect source of your precious scripts

    Hi all,
    This short topic is dedicated to all script writters, who wants to keep their scripts out of reach for third persons.
    The main framework we'll be talking about is the simple directive called #targetengine.
    As we all know, even some of the simplest scripts we made can be really powerfull and lucrative. This is the main reason why we may want to keep them out of range for other people and our employers.
    This is the moment where #targetengine directive comes handy.
    OK, lets get started.
    #targetengine is getting two (as far as I know) basic parameters.
    - main (which destroys all the variables/function definitions after scripts is executed)
    - session (which keeps all the stuff while application is still running).
    You can also make your own global spaces and call them whatever you want to, but we'll be working on just two of these. 
    In first place, try to copy and paste this simple script to your extended toolscript and try to run it.
    #target illustrator
    #targetengine "main"
    alert(msg);
    alert(var1);
    safeFunction();
    It does not work! You will get a message that both of these variables are not defined and safeFunction is not a function, and thats good.
    Now, try to run this script and then run the other one.
    #target illustrator
    #targetengine "session"
    var msg = "this is a message";
    var var1 = 4345;
    function safeFunction()
              showMsg();
    function showMsg()
              alert(msg +"\n"+ var1);
    As you have probably already noticed, the 2nd script works like a charm now.
    No matter how experienced coders you are, I suggest you to always keep your property safe, and this is the best way of making your scripts safe.
    Have a nice day,
    Igor
    PS. excuse me my english.

    BeOpenMinded wrote:
    PS. excuse me my english.
    Your English seems perfectly fine, no worries there, thanks for sharing.
    BeOpenMinded wrote:
    - How to protect source of your precious scripts
    - keep … scripts out of reach for third persons
    - keep your property safe, and this is the best way of making your scripts safe
    I am just curious however how does this approach keep scripts safe, out of reach and protected from third parties, in what capacity?

  • HT5012 How to protect my iPhone 4S to virus

    How to protect my iphone to virus

    Not according to why the newest two updates to iOS were released.
    About the security content of iOS 7.1.1
    This document describes the security content of iOS 7.1.1.
    For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
    For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."
    Where possible, CVE IDs are used to reference the vulnerabilities for further information.
    To learn about other Security Updates, see "Apple Security Updates."
    iOS 7.1.1
    CFNetwork HTTPProtocolAvailable for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
    Impact: An attacker in a privileged network position can obtain web site credentials
    Description: Set-Cookie HTTP headers would be processed even if the connection closed before the header line was complete. An attacker could strip security settings from the cookie by forcing the connection to close before the security settings were sent, and then obtain the value of the unprotected cookie. This issue was addressed by ignoring incomplete HTTP header lines.
    CVE-ID
    CVE-2014-1296 : Antoine Delignat-Lavaud of Prosecco at Inria Paris
    IOKit KernelAvailable for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
    Impact: A local user can read kernel pointers, which can be used to bypass kernel address space layout randomization
    Description: A set of kernel pointers stored in an IOKit object could be retrieved from userland. This issue was addressed through removing the pointers from the object.
    CVE-ID
    CVE-2014-1320 : Ian Beer of Google Project Zero working with HP's Zero Day Initiative
    Security - Secure TransportAvailable for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later
    Impact: An attacker with a privileged network position may capture data or change the operations performed in sessions protected by SSL
    Description: In a 'triple handshake' attack, it was possible for an attacker to establish two connections which had the same encryption keys and handshake, insert the attacker's data in one connection, and renegotiate so that the connections may be forwarded to each other. To prevent attacks based on this scenario, Secure Transport was changed so that, by default, a renegotiation must present the same server certificate as was presented in the original connection.
    CVE-ID
    CVE-2014-1295 : Antoine Delignat-Lavaud, Karthikeyan Bhargavan and Alfredo Pironti of Prosecco at Inria Paris
    WebKitAvailable for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code executionDescription: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling.CVE-IDCVE-2013-2871 : miaubizCVE-2014-1298 : Google Chrome Security TeamCVE-2014-1299 : Google Chrome Security Team, Apple, Renata Hodovan of University of Szeged / Samsung ElectronicsCVE-2014-1300 : Ian Beer of Google Project Zero working with HP's Zero Day InitiativeCVE-2014-1302 : Google Chrome Security Team, AppleCVE-2014-1303 : KeenTeam working with HP's Zero Day InitiativeCVE-2014-1304 : AppleCVE-2014-1305 : AppleCVE-2014-1307 : Google Chrome Security TeamCVE-2014-1308 : Google Chrome Security TeamCVE-2014-1309 : cloudfuzzerCVE-2014-1310 : Google Chrome Security TeamCVE-2014-1311 : Google Chrome Security TeamCVE-2014-1312 : Google Chrome Security TeamCVE-2014-1313 : Google Chrome Security TeamCVE-2014-1713 : VUPEN working with HP's Zero Day Initiative
    Important: Mention of third-party websites and products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the selection, performance or use of information or products found at third-party websites. Apple provides this only as a convenience to our users. Apple has not tested the information found on these sites and makes no representations regarding its accuracy or reliability. There are risks inherent in the use of any information or products found on the Internet, and Apple assumes no responsibility in this regard. Please understand that a third-party site is independent from Apple and that Apple has no control over the content on that website. Please contact the vendor for additional information. 
    Last Modified: Apr 22, 2014

  • Symantec Endpoint Protection (SEP) adds support for Windows 10 with 12.1.6 MP1.

    Hello Everyone,
    Symantec Endpoint Protection (SEP) adds support for Windows 10 with 12.1.6 MP1.For Symantec Endpoint Protection 12.1, a maintenance patch has been released on July 29, 2015. Customers will need to be current on maintenance to receive the maintenance patch update. For more information, visit our SEP 12.1 Windows 10 Knowledge Base.You can upgrade to Windows 10 with Symantec Endpoint Protection 12.1.6 MP1 installed. You must uninstall earlier versions of Symantec Endpoint Protection. The operating system upgrade stops if it detects an earlier version of Symantec Endpoint Protection.The following operating system upgrade paths are supported with 12.1.6 MP1 installed:Windows 8.1 to Windows 10Windows 8 to Windows 10Windows 7 to Windows 10For more details check the following article:http://www.symantec.com/docs/INFO2746SEP...
    This topic first appeared in the Spiceworks Community

    Hello,
    Just to give an update. We were able to make this work but we used Symantec Protection Engine for Cloud Services instead. Also, for anyone having problems with the parameters - we used the exact same parameters listed in Peoplebooks or on the delivered virusscan.xml file, just update the IP address. We also saved the xml file on both the Portal.war and PSIGW.war directories.

  • How do I automatically add filenames as keywords?

    I want my filename to always be added as a keyword/metadata.

    darn okay. i name them according to a hr/mm convention for race photos. then they only have to search for the hh/mm.
    thx for the help though
    Show me your passion and I'll immortalize it.
    Scott [email protected]om
    Date: Wed, 17 Feb 2010 09:40:46 -0700
    From: [email protected]
    To: [email protected]
    Subject: How do I automatically add filenames as keywords?
    First, I still don't understand why anyone would want to search by file name if search by keyword was available.
    Putting the file name into a keyword essentially defeats the purpose of keywords. If you have 1000 files in your Lightroom Library Module, then you have 1000 distinct keywords, and I can't see how that is useful to anyone.
    But the bottom line is that I don't think Lightroom has the capability of putting file name into the keyword field.
    >

  • Should a Phone (Device) Update Law Be Created to Protect Our Information?

    Hi, all.
    If you think about it, we often perform software updates to many technology devices we own. These devices include our networking routers, our tablets, servers, PCs, set top boxes, gaming consoles, and much more than I have listed here.
    There are different types of updates that we perform as well. We install PC BIOS updates, the latest operating system updates, and software updates to applications such as business applications and web browsers.
    We install these updates to keep our devices running at their highest performance level with greatest efficiency and improved capabilities. Most importantly, we also install these updates to protect our personal information (our data), ensuring we have the latest, and most secure operating system and security tools to protect our information from hackers/thieves.
    We are usually in charge of these updates. With these software update options, we should also take a little responsibility for something we own getting hacked if we don't install current software upgrades or updates - especially if we can update them ourselves.
    That leads to my question above. Should a law be passed requiring device manufacturers who control software upgrades/updates to always publish them? Should a law require hardware resellers to publish software update schedules so users will know when the updates are available? Should hardware resellers who control software upgrades/updates be held responsible for putting users' information at risk by not offering the latest software updates?
    As our phones become more and more like personal computers, we want to be charge of how they are secured and updated. Right now, for the Windows Phone OS 7/8+, it's completely out of our hands and yet we are responsible for our own phone security.
    I suspect that something is going to have to change in the future with software updates to our devices. This is especially true when phones start becoming more hacked like PCs are today.
    Just a thought.

    Elector,
    I've been lurking on this board for a while now, and I have seen a lot of your posts, and this is the first time I felt compelled to respond.
    You stated:
    "Verizon and others are a business. They sell a connection to the cellular and data network. With your working device."
    That is what we are looking for. Verizon is selling a connection, that is EXACTLY what we want! Keep selling us the connection, and stay the hell out of managing the software updates. We are not renting the devices from Verizon, we are simply using their connection. Personally, this is my biggest beef with Verizon right now. I know that I bought a phone with a specific software version that worked. I know Verizon is not obligated to update that phone, etc. All of which I am fine with, what I am not fine with is that Verizon is not letting ME update MY device. Yes, I can use the developer preview, which I am currently using, but it is still not the released version with the firmware update.
    I roughly relate this to a cable modem router, I can buy my own router, connect it to my Verizon FIOS, and update the router at any point without having to involve Verizon. What I paid for was a connection to the Verizon FIOS network. This is exactly what I want to have on my phone network as well.
    Another interesting quote -
    " Should the device makers have the ability to send updates out in the same manner as Apple? Yes I totally favor that.
    Is it going to happen soon? No. "
    - Well, why not? That is what I find interesting, if Apple can do it, why not Android or Microsoft? And this response isn't directed to Elector, this is directed to Verizon (which, of course, I know will never actually respond to this).
    - Have a nice day

  • How to develop our own provisoning process

    Hi,
    Please tell me step by step how to develop our own provisioning process .

    try below
    1. create it resource
    2. create Resource Object
    3. create Process Form using Form designer
    4. Create adapters (You must have java code ready)
    5. create Process Definition
    6. add process task by associating adapter under process definition
    below link will help to do above
    http://docs.oracle.com/cd/E14571_01/doc.1111/e14309.pdf
    Its better Go with OOTB connector and see how OOTB works and that will give you the proper idea
    You can install any OOTB connector for this
    regards,
    Nishith Nayan
    Edited by: Nishith Nayan on Jan 30, 2012 10:08 PM

  • How to protect SAP Application Tables and Reports in R/3

    Hi Gurus,
                 Any one please explain me detail how to protect tables in R/3 with different senarios.
                  How to protect reports in SAP R/3 without assigning SA38 transaction access
                  How to protect Program in SAP R/3 in R/3

    Hello Happyman,
    <b>What do you mean by Protect Table, Program and Report?</b>
    Let me ask you one base Question, On which area are you working? Are you from functional side or Technical side (Developement or Basis guy)?
    This is very clear cut answer that with the restricted autorization you can protect table and programs. Do not provide the change autorization.
    CATCH your BASIS guy and he will do rest of the things. Just explain him what are you want to protect.
    Hope this helps.
    Regards
    Arif Mansuri

  • How to connect our outbound function module to the message type

    how to connect our outbound function module to the message type any transcation code exits to assign the message type with the function module .
    Thank in advance .
    A. Thiru

    Hi Thiru,
    Standard Transaction Codes, have their own Function Modules for generating Outbound/Indbound Idocs. Where these Function Modules will be configured to a particular Process Codes.
    For E.g for PO's
    Process code : ME10 - IDOC_OUTPUT_ORDERS - for creation
    In case if its a Z Function Module, It depends on the case how you use IDOC types. either directly through Z Program or through Inbound/Outbound Process  codes with respective Function modules.
    Regards,
    Anbalagan

  • How to protect the lines in smartforms

    hi gurus
    i want to know how to protect the line in smartforms..
    regards
    baskar

    Check this link.
    http://www.saptechies.com/smartforms-protect-lines-in-main-window/
    if you are using tables, there are two options for protection against line break: – You can protect a line type against page break. – You can protect several table lines against page break for output in the main area.
    Protection against page break for line types – Double-click on your table node and choose the Table tab page. – Switch to the detail view by choosing the Details pushbutton. – Set the Protection against page break checkbox in the table for the relevant line type. Table lines that use this line type are output on one page.
    Protection against page break for several table lines – Expand the main area of your table node in the navigation tree. – Insert a file node for the table lines to be protected in the main area. – If you have already created table lines in the main area, you can put the lines that you want to protect again page break under the file using Drag&Drop. Otherwise, create the table lines as subnodes of the file. – Choose the Output Options tab page of the file node and set the Page Protection option. All table lines that are in the file with the Page Protection option set are output on one page
    Regards,
    Maha

  • Does anyone know how to add a preface page at the beginning of the book in ibooks author once the book is written? No matter how I try to add a Preface page, it goes to the end of the book.

    Does anyone know how to add a preface page at the beginning of the book in ibooks author once the book is written? No matter how I try to add a Preface page, it goes to the end of the book.

    Thanks. I've tried this and apparently the template I'm using is one of those where it doesn't work. I've tried dragging it as well as cutting a pasting but it always travels back to the end of the book. Maybe I can try changing the template temporarily, move the preface page, and then convert back to the original template. I'll experiment a little.

  • In ME2N  report for PO- How to get or add Vendor name in ALV grid output

    Hl Everyone
    How to get  or add Vendor Name and payment terms in the ALV grid output for the follwing reports like ME2N and ME2V.
    cuurently i am in 4.7 E version.
    Kindly suggest..........
    thanks in advance
    Regards
    Prashanth

    Hi Pankaj
    I knew that vendor name field is avaiable in ECC versions, but how to get the same field(vendor name) in 4.7 E vesion.
    Kindly suggest
    Regards
    Prashanth

  • How I can delete add-in in windows 8.1 ,I see only enable and disable function but I don't see any add-in delete function

    hi,
    how I can delete  add-in applications in add-in applications section ,  I try to delete one but I don't see any delete function, I see only enable and disable function in the manage add-in applications wizard.
    thanks
    johan
    h.david

    Hi,
    If you want to remove the add-ins of Office 2010 programs, you need to remove it from control panel.
    For example, if you use Excel, please try to follow the link to delete the add-ins:
    http://office.microsoft.com/en-us/excel-help/add-or-remove-add-ins-HP010342658.aspx
    If I misunderstand something, please let me know.
    Regards,
    George Zhao
    TechNet Community Support

Maybe you are looking for

  • Batch creation of bookmarks (Windows)

    There is another thread on this for Apple users, one year old, but without an asnwer (except for something in the line of "not possible"), so: I have got several hundred pages in tree structure, from a 2-pane "outliner"; technically, I'm able to have

  • Enhancing performance of system

    I am developing a CCP CAN based application. However I am running to performance difficulties (overflow)when only trying to read (multiread) a maximum of 30 frames every 10ms. I am using queues to buffer the CAN data and processing it on a trigger (o

  • FRM-40735:when-button-pressed trigger raised unhandled exception ORA-24247

    hi all i am using form 10g release2 i am having a problem when i use the following stored procedure in form then i am getting this error. FRM-40735:when-button-pressed trigger raised unhandled exception ORA-24247 but the same code working fine when i

  • How to install 10 dev suit on linux

    Plz help me how can i install forms dev suit 10g on linux 4 El

  • How to locate an old photo?

    There is an image that is no longer in my Aperture Library but might be saved in one of my vaults when I did a back up. Is there a way I can load up a vault so I can be able to search for it there? I tried doing it already but my vault was greyed out