

The wrong way would be to merely check for the presence of the dongle. The right way would be to encrypt your programs and store the encryption key on the dongle and decrypt at run time depending on whether the device is connected or not. Like I said, if the protection is implemented wrong, it cracking the program could be as simple as a 3 byte patch of changing The fact of the matter is, depending on how the dongle protection is incorporated, it can be impossible to crack a program without the device.

These are relatively cheap to produce and are hard to crack. The older ones used the parallel printer port.įinding a computer with a parallel port these days is tough, so as with all technology, adaptations were made. So what is a dongle? Traditionally a dongle is a hardware device that connects to the PC through one of the ports in the back. The idea is simple – store the registration key or encryption key on a mobile piece of hardware.

Every other executable is packed with this or that, PEID is no longer updated, and many software companies are moving towards dongle based security. Reversing aint easy these days and is getting harder.
