Author: Zheng Zhixian
Date: 07:05:44 11/19/05
Go up one level in this thread
On November 18, 2005 at 05:43:32, Uri Blass wrote: >On November 18, 2005 at 05:13:22, Robert Hollay wrote: > >>On November 18, 2005 at 03:30:48, Swaminathan wrote: >> >>>On November 18, 2005 at 01:52:52, Kurt Utzinger wrote: >>> >>>>On November 17, 2005 at 21:01:04, Swaminathan wrote: >>>> >>>>>Does the Fruit 2.2.1 Trial version play at full strength? >>>>>From it's website the quote in the download sections states that It is available >>>>>for 14 days?that means if the expiry gets over,one can again download it and use >>>>>it for another 14 days and so on.So I don't see any real difference between >>>>>making it free and making it available for download as shareware. >>>>>Am I missing any point? >>>> >>>> Just nonsense >>>> Kurt >>> >>>Why?Are you suggesting it doesn't when downloaded for the second time? >>>There are some sharewares that are perfectly running when you download it after >>>the expiry gets over. >> >> >> Maybe such sharewares also exist, but I don't think the Fruit team is as >>naive as that. >> I've never downloaded Fruit 2.2.1 Trial, but it's likely that the first >>time you install it the expiry date is set. Without reinstalling the OS you >>cannot extend the expiry date. Of course, perfect protection doesn't exist. > >I also never downloaded trial version of fruit but I think that in principal >people should be allowed to delete information from their computer and the >question is if people simply cannot delete the fact that they installed fruit >trial version from their computer. They can delete it, if they know where it hides it. Some timelimited software leave behind some small registry key hidden in a obscure area to prevent reinstalls . So some people use software to track changes made by such software, so they can undo it. >I think that a good way to defend trial version should not be based on >information that is in the relevant computer but based on information that is in >a different computer. > >If Fruit trial version simply copy the key of your hardware to another computer >and compare it with list of keys in that computer to check that the key was not >used then it seems to be a better strategy of protection. Don't understand this. >Uri
This page took 0 seconds to execute
Last modified: Thu, 15 Apr 21 08:11:13 -0700
Current Computer Chess Club Forums at Talkchess. This site by Sean Mintz.