30 Day Free Trials-How do they work?
#1
How does the computer know your 30 days are up? If I set reset the date to the day I installed a trial will it go back to 30 days or does it use some other method?
I am curious I do not want t know how to extend the period before anyone decideds to lock it.
I am curious I do not want t know how to extend the period before anyone decideds to lock it.
#2
Scooby Regular
Join Date: Apr 2002
Location: The poliotical wing of Chip Sengravy.
Posts: 6,129
Likes: 0
Received 0 Likes
on
0 Posts
I have tried this myself with limited trials - i.e. uninstall and then re-install - it dont work , maybe its something written to the registry?
Like you I am also curious
Like you I am also curious
#6
Scooby Regular
Join Date: Nov 1999
Location: Stockport
Posts: 474
Likes: 0
Received 0 Likes
on
0 Posts
If you use one of those programs that you can get that saves the state of the registry you can run that before you install the program. Then run it again afterwards and see whats changed.
#7
mj:
I haven't done this stuff for a long time. The technology we used to employ would not be effected by a de-frag or any other re-organisation of the disk.
The protected software also wouldn't work if you "backed up" the hard drive, you had to clone it for the protection to be taken across.
Steve.
I haven't done this stuff for a long time. The technology we used to employ would not be effected by a de-frag or any other re-organisation of the disk.
The protected software also wouldn't work if you "backed up" the hard drive, you had to clone it for the protection to be taken across.
Steve.
Trending Topics
#8
Scooby Regular
Join Date: Mar 2000
Location: Gloucestershire, home of the lawnmower.
Posts: 4,531
Likes: 0
Received 0 Likes
on
0 Posts
Some software I write/support has some of this built in, not so much to protect the software from theft more to ensure that the users move to the upgrades.
However, we have a component that is used that uses multiple methods.
1. The installer itself records the date during installation to the registry, usually a location hard to find. The software checks the date when it is run and compares with this date to see if it is still within 30 days.
2. The date and number of days left to run is also written to the hard disk on every use of the software. This is usually in a sector marked bad. We tend not to use this method.
3. The date details are patched into a DLL used by the software. This is fairly clever as the writing of it still ensures the DLL can be used but without knowing where in the DLL it is written or how the encryption works it is very difficult to reverse this.
4. Sneaky one is to write the details into common windows components such as the standard bitmap files by using a method know as stenography. This writes the details into a BMP file but you wouldn't know looking at it. This is especailly clever as the last modified, last accessed date/times are reset after it happens so that it appears the file hasn't been touched.
5. A few other methods.
We generally use method 4 as it is fairly harmless and fairly difficult to notice/reverse.
I know that the commercial grade shareware/trial software components can be even more devious and are quite hard to crack.
Cheers
Ian
However, we have a component that is used that uses multiple methods.
1. The installer itself records the date during installation to the registry, usually a location hard to find. The software checks the date when it is run and compares with this date to see if it is still within 30 days.
2. The date and number of days left to run is also written to the hard disk on every use of the software. This is usually in a sector marked bad. We tend not to use this method.
3. The date details are patched into a DLL used by the software. This is fairly clever as the writing of it still ensures the DLL can be used but without knowing where in the DLL it is written or how the encryption works it is very difficult to reverse this.
4. Sneaky one is to write the details into common windows components such as the standard bitmap files by using a method know as stenography. This writes the details into a BMP file but you wouldn't know looking at it. This is especailly clever as the last modified, last accessed date/times are reset after it happens so that it appears the file hasn't been touched.
5. A few other methods.
We generally use method 4 as it is fairly harmless and fairly difficult to notice/reverse.
I know that the commercial grade shareware/trial software components can be even more devious and are quite hard to crack.
Cheers
Ian
#9
Scooby Regular
Join Date: Jul 2003
Location: Surviving as a soldier of fortune on the Los Angeles underground...
Posts: 7,181
Likes: 0
Received 0 Likes
on
0 Posts
i have a utility somewhere that stops the "days remaining" counter of the trial program. Its not foolproof, but it mainly depends on how much you're using the program. I found if my computer crashed during the program then it had a tendancy to realize "it had been had"...
Thread
Thread Starter
Forum
Replies
Last Post
Wingnuttzz
Member's Gallery
30
26 April 2022 11:15 PM
Scott@ScoobySpares
Full Cars Breaking For Spares
61
11 January 2021 03:08 PM
Scott@ScoobySpares
Full Cars Breaking For Spares
7
14 December 2015 08:16 AM
MeisterR
Car Parts For Sale
1
15 September 2015 07:07 PM