TechSpot

challenging problem. highly expert knowledge needed.

By alidabiri
Apr 14, 2006
  1. hi all,
    i work for a small custom software company specializing in accounting software.
    our team has been developing an accounting package for a business firm. this firm markets this package starting with the trial version that lasts for 30 days. we know that some customers may use the trial version that expires in 30 days and then un-install it, and re-install it and use it for another 30 days. my question is: is there anyway to determine if a particular pc has ever installed this package, even if they have un-installed it before installation?
     
  2. Peddant

    Peddant TS Rookie Posts: 1,644

    Yes,you leave a hidden key(s) in the registry.That`s how shareware has done it since time began.

    Links - One and Two and Three
     
  3. Samstoned

    Samstoned TechSpot Paladin Posts: 2,582

    new stuff uses internet logon and gets the machine ID
    only way to bypass is complete rebuild of machine with diff parts
    ID is held in the class area of registery
    when user runs program the key is sent back to your server and bang denied
     
  4. alidabiri

    alidabiri TS Rookie Topic Starter Posts: 540

    thanks peddant, and sam.
    peddant, is that legal? i mean to leave a "key" or anything on a user's computer? i thought sony got in trouble for doing that - leaving a small program on a dvd player's memory or something to prevent copying.
     
  5. Nodsu

    Nodsu TS Rookie Posts: 9,431

    Virtually all programs leave their registry entries and even some files behind after uninstallation. It is either the laziness of the programmers, the shortcomings of the (un)installer, or a feature.

    Sometimes it is actually good to get all your settings and such back after you have uninstalled and reinstalled a program. And often it is not possible to tell, whether a file should be removed or not.. Would you like MS Office to delete all your documents after you uninstall it? :p

    There is a huge difference between some leftover files or data and a malicious program BTW.
     
  6. Tedster

    Tedster Techspot old timer..... Posts: 10,074   +13

    commonly known as orphaned files......
     
  7. Peddant

    Peddant TS Rookie Posts: 1,644

    Sony got into trouble for taking the concept to extremes,by virtually taking over the OS.More info HERE
     
Topic Status:
Not open for further replies.


Add New Comment

TechSpot Members
Login or sign up for free,
it takes about 30 seconds.
You may also...


Get complete access to the TechSpot community. Join thousands of technology enthusiasts that contribute and share knowledge in our forum. Get a private inbox, upload your own photo gallery and more.