Content area
Full text
The Envelope: Ingenuity and Simplicity
Many of today's software publishers are faced with the complex issue of how to prevent unauthorized use of their software without creating obstacles for customers who wish to legitimately purchase it. Too often, these software publishers are finding illegal copies of their applications across the Internet. Those that have proactively protected their software are not prepared for the numerous cracking programs that can compromise their application's security and licensing mechanisms.
A hardware-based protection system provides the strongest defense when used with a key or dongle attached to the USB or parallel port to prohibit application access to nonapproved users. The strength of the security is contained in both the hardware and software. Publishers need to evaluate the reliability of the keys - along with security features - in the software.
Protection Methods
HASP® HL is a hardware-based software protection system designed, manufactured and distributed by Aladdin® Knowledge Systems. The system is composed of an AES encryption-based hardware protection key and supporting software-based protection tools. A HASP HL-protected application can load and run only if the HASP HL key is connected to the computer.
There are two software protection methods-HASP HL API and the HASP HL Envelope-that you can incorporate when securing your Microsoft® application with HASP HL. Your application will receive the utmost security when you use both methods.
The HASP HL API
Protection using the HASP HL API requires changes to your source code and lets you customize calls to the HASP HL key throughout your application. With the API, you need to plan your protection strategy accordingly and incorporate the HASP HL calls during the development process of your software. This protection method provides infinite flexibility and is well worth the effort.
The HASP HL Envelope
The HASP HL Envelope, on the other hand, is an automatic protection tool deployed on
the executable DLL, OCX, other PE-format files and .NET applications. It secures these by adding a protective shield of Aladdin's own protection code, which...





