Stuart McLachlan
stuart at lexacorp.com.pg
Sat Jan 3 17:59:46 CST 2004
Take a look at http://www.klcconsulting.net/smac/ for a way to defeat this copy protection scheme. (Follow the link to "the research of Kyle Lai" for a lot of good info on MAC addresses) On 3 Jan 2004 at 13:34, John W. Colby wrote: > Yea, but you have to start somewhere. More and more NICs are embedded right > in the motherboards so this is getting less and less likely. > > John W. Colby > www.ColbyConsulting.com > > -----Original Message----- > From: accessd-bounces at databaseadvisors.com > [mailto:accessd-bounces at databaseadvisors.com]On Behalf Of Gustav Brock > Sent: Saturday, January 03, 2004 12:53 PM > To: Access Developers discussion and problem solving > Subject: Re: [AccessD] Mac address > > > Hi John > > Hmm ... so the user changes his/hers NIC and is hosed ..? > > /gustav > > > > Date: 2004-01-03 18:14 > > > Well... I'm looking at a machine specific piece for copy protection. The > > work station name might be specific to a network, but is created by the > > software (or user doing the install) so if the machine went down (as many > of > > mine have over the last few years) if the user didn't select the same name > > then the key wouldn't work. > -- Lexacorp Ltd http://www.lexacorp.com.pg Information Technology Consultancy, Software Development,System Support.