Using the registration code generated by the user machine hardware parameter (such as hard disk serial number) is the most stringent encryption method (for example, MS Office XP). But most is not the case. Preliminary statistics have the following: 1. Simple software serial number: For example, the WPS2000 exists in the registry, the user only needs to copy the WPS2000 while exporting the corresponding registry key value and then import, the serial number of the WPS2000 is not Encryption There is a registry, and some software is encrypted; Accommine the registration code with any serial number: It is divided into software to generate a limited number of determined serial numbers (Zhou Wei said that this is the case) and by the user enter the username or casually specify (for example, Magic Set 3.01) 3. Strict encryption methods: including floppy disk encryption dogs, disc serial numbers, network card addresses, and four types of hard disk serial numbers.
About software encryption philosophy: Encryption is like closing a thief, not encryption is open. According to the popularity and market potential of the software, choose the appropriate encryption method. Strict encryption methods sometimes equivalent to the staple lock, moderate encryption is actually the driving force of development.