![]() ![]() Dealing with license key issues is not your primary business and you certainly do not want to spend a good portion of your time figuring out what hardware change broke the license. If you are a one man show or have a small support organization that is already busy on application related issues, once again, we recommend the Computer Name approach. Is you software a prime target for hackers?.If your target market is the consumer market, then the decision is based on these factors: You need to balance security with customer satisfaction. Finally, corporate customers can get quickly frustrated if they start experiencing licensing issues after hardware changes. It may not be practical either for a company to keep computers outside of the domain infrastructure to bypass licensing. It is not possible in this context to have two computers with the same name. In addition, most companies run a Domain Controller that manages all computers in the organization. In medium and large companies, software piracy is not prevalent. If your target market is the enterprise market, small, medium or large, we recommend binding the license to the Computer Name. Do you have a large support organization?.Given these choices, which option to pick depends on the following factors: Bind the license key to a combination of the above.A CPU replacement invalidates the license. Here again, you want to make sure to handle systems with multiple CPUs. This is another common approach that works with most modern computers. Additionally, if the user’s hard drive is replaced, the license key is no longer valid. ![]() There may be cases where you will not be able to retrieve a hard disk serial number, in which case you may want to fall back onto another identifier. You just need to make sure you skip removable drives. This is a bit more reliable than the previous option.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2023
Categories |