Software Common Hacks and Counterattacks
A Guide to Protecting Software Products against the Top 7 Piracy Threats
In order to ensure they are properly paid for use of their application, Independent Software Vendors (ISV) must implement some type of software protection. The goal of any software protection solution is to restrict the use of software to abide by some specific license conditions.
This can be done via hardware tokens (also known as dongles), software-only licenses, or homegrown code. External hardware-based solutions provide the highest level of security currently available.
Unfortunately, hackers are a persistent nuisance that cost software vendors worldwide billions of dollars in lost revenue. It is important to be sure that the hardware-based solution you select, as well as your implementation, seal off common hacker entry points.
This white paper examines a variety of the most common hacking techniques, and the best counterattacks available for protecting your application from piracy.