| |
|
|
| This is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a variety of fields. One line of code to protect your investment that is all. www.continuumq.com |
Description: This is the best protection that you can ever place on the software that you develop at the best price ever. We have many happy customers in a variety of fields. One line of code to protect your investment that is all. The component will auto create and show the demo pop up screen if an demo key is in use, the demo pop up screen is totally customizable from the components published properties. The component will auto create and show a register key screen if the key expired or if the key is invalid in any way, this screen is also totally customizable from the components published properties. The component even has a key generation screen that you can use to create keys for your customers. All the low level functions that the component use to create the key and to extract the information from the key like Activation Date, Expiry Date,Number Of Users,Serial Number,Software Type,Software Function List and the Last Date The Software was used are exposed to you for use if you would like to write automated key generators.
The component has a chipper encryptor on top of the custom encryption model this ensures that other users of the component will not be able to decrypt the keys that you generate from your component and they will not be able to supply fraudulent keys to your software.
Main Component Functionality:
1. Key that activates / deactivates and manages your software.
2. Set the component to auto create a demo key when software is run for the first time.
3. Customize the Demo Screen that the component will create if a demo key is in use.
4. Customize the Key Registration Screen that the component will create if key validation failed.
5. Component validations - Date Range,Users,Serial,DateTamper.
6. All the validation pop up messages can be customized with your own messages.
7. You can specify the name of the registry key you want to use.
8. Encryptkey prevents other users of the component from decrypting your keys.
9. The component is data aware. | System Requirements: Delphi | System Key Wizard 2.1 Download from downloads.continuumq.com |
| Similar software: | - gReg 4.55 — Armor your work against thieves. Safeguard your revenues. Our protection is bulletproof! Out-strips the competition with state-of-the-art encryption that locks out thieves permanently. Distribute an evaluation version of the real product.
- Origin Keyring 1.1 — The package contains a dll to include to the encrypted software, a software generator, and sample programme to test the générated serials. The source files of these two programs are fully documented and free to modify/use/distribute.
| Find all software similar on System Key Wizard 2.1 |
|