It actualy doesn't finish there. The installer is taking a fingerprint of the current system hardware and generating an installation key which must be accompanied with a unlock / activation key provided by the support people. This key works for this hardware / installation id only. The key is stored inside the encrypted source code - which is done by the same encrypted source code... It's working 100% without problem. I've done some tests... it is practicaly very difficult for someone to copy the code - "just like that". Glad that I heard your reply makes me feel good. | [reply] |
Well, kudos for the challenge, but all this encryption stuff was probably quite a lot of work, and I don't think it will bring your company any additional customer... So it's probably actually a net loss from a business point-of-view :)
| [reply] |
Well, at the end of the day we will deal with other companies, and not personals... which will probably be the difference... We'll see. At present I have 30 restaurants using the system... and because of the value behind I am sure somebody will try to copy it.
| [reply] |
Well... time will show... :)
| [reply] |