

Disclaimer: I work for a company (Wibu Systems) that prevents software piracy and provides license management solutions. Jeez, everybody thinks there's no solutions available to prevent piracy, but there are. But if the values will not match my database then i will reject the call.ġ- Do you think this solution is feasible ?Ģ- According to my thinking, it will make the software useless to the hacker.

I will verify those values and return the results. Whenever the software needs to run that feature the software will give a call to the WEB SERVICE with the values in REGISTRY. Now, i am planning to take some of my code from MAIN features of the software to a WEB SERVICE hosted somewhere else on a web server. The hacker has bypassed the communication code and added fake values in registry and he can use my software now. Once the user is verified it saves the values in Registry. So, following is what i am thinking.Ĭurrently, I have desktop application that communicates with the web server to verify the user. In the start of the software i cannot allow this to happen and i want a solution.

I posted a question on stack overflow and people said that i cannot stop that. I recently launched my desktop application and it got cracked after a few days.
