If your headers include the right include# files, the software opens after it checks a few things. The suite includes options. Anti-piracy is first, second, is anti-theft. So, the software opens up and checks the serial number of the DVD, which was written down, and a list of other serial numbers, including the hard drive it was installed on, and system serials, mouse, keyboard, video cards, sound, CPU. If only one changes, it's a user upgrade, the software chugs along. Activating it may require internet access and a thumb, if you don't have the internet. As you issue serial numbers to DVDs, the software is wide open too any given serial number no matter how many digits. But, it checks the media, then goes through the system too figure out where it has been installed, then it sends a note, even the note is placed on the media, and passed too the internet, and in effect is just a registration. Every time a company, software author, wants too protect their software, they get some web space, and that's where the customers register. But, the list of serial numbers used, is listed there. If you don't make the web connection, you don't get validation. Might only have 2 weeks, maybe 30 days, before you need too find a computer online too pass the note too the server/cloud, and get a message back that activates your software. Once a given serial number has been activated, billing records for IP address must be reviewed and so you need too look at billing addresses. If somebody sells their computer with all of the software on it, and the buyer of the used computer buys the computer, and not the original DVDs with the software on it, they didn't pay for the software, they just own a machine, and that's all they paid for. The first owner keeps the old software, lives at the same billing address, it's okay. IP's are generally GPS sited and an encrypted version. But, must of the internet only see's your provider's and the range of IPs that they paid for. So, I could be paying somebody nearly 50 miles away for internet services. So, for safety's sake, and the sake of being fair, we ask questions. Have moved lately, did you place a change of address, what was your last address. Now, we're crossing over into theft protection. Only the first copy, with a given serial number, is accepted. The other serial numbers are used for proof of ownership. It has more to do with when to raise flags, not so much shut down software, unless the machine is parted out, and the software going in different places. Just like a chop shop for cars.
Most of it works together with cloud computing, registering software and hardware, and in the anti-theft agreements and services, you agree too tell the people you buy hardware from, and or software from, when it is stolen. All of the anti-theft lists go onto the internet, as owned, or stolen. It sets up a basic template of a web page, with was your property stolen? or software? Then asks for only your billing address, first and last name. If you move, the machine will ask you due too the radical change in the IP address that says, you're more than 50 miles away from your last location. Now, you can password that if your a jet setter. You quit getting questioned every time you leave the 50 mile circle. Then there's the vacation setting. Then you get asked odd questions, when you go on vacation, how long does it normally last? How many times a year do you go on vacation. So, you can take your notebook with you, and it won't drive you nuts but, installation of the anti-theft protection, doesn't just involve the serial numbers of every DVD you used too install software, in also includes registering all of the serial numbers of the hardware, CPU, DVD drive, Video Cards etc.. If you're a jet setter, then it ignores certain distance oriented things. In the user agreement, you must always include that, they must report too you if the machine was sold, or the machine and all of the software because, by law, all serial numbers must be unique. It's not a model number, and has nothing too do with drivers. It's an old anti-theft protection series of laws, and a method that could work allot better with computers. You can ask a service provider who's at this or hat IP address, looking at stolen hardware, or software. Anti-piracy, that's way easier and a much shorter list, that's just every DVD you've sold. If a copy is activated before the original, you can't tell which is good or bad, you just always say no too the second too register with the same serial number. People try too get wise, and it doesn't always work but, just one character, is often enough too give plenty of software the slip.
Again, I am commenting on my own software concept. This shouldn't impede any computer that doesn't boot from it's own hard drive. This feature, is there too allow detectives to search a drive by not booting up with it too search the files. So, if the next machine that drive is booted up on, is registered by a detective, badge numbers are all you see. If their license get's revoked, the state just manages a list in cloud by concept. If there is or is not a registry online, it's not up too you on the state level but, the federal level, helps keep everything you buy, yours, and not anyone else.
I'm commenting on my article. This suite can remotely tell the software, it's okay to run, or you can't, and it's really only going to make the file that was installed, the right length in bytes because, a bunch of zeros are in there, and a goto statement, that lands it on every copy of the installed software on a bunch of zeros without commands. The installer, uses a binary file mode, too pick a place in the file to write a new set of commands that are not there. So, it edits the existing installed binary file.