![]() If you are unsure of the dongle type, the first thing that I would do is carefully cut or crack the case open and look for identification marks. ![]() Pretty sure that DESkey provided that type of protection for DOS applications. It could also just have a wrapper around it for the dongle protection that checks to see the dongle is present and then allows the application to run. If that turns out to be the case, it will be necessary to disassemble the application code and find the checks. However, my money is on these not working anyway because the application is probably using built in code to access the dongle. I take it that the dongle is HASP/Hardlock or at least it looks like one otherwise I think that you are fighting a loosing battle with the available dongle cloning tools.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |