Yahoo Answers is shutting down on May 4th, 2021 (Eastern Time) and the Yahoo Answers website is now in read-only mode. There will be no changes to other Yahoo properties or services, or your Yahoo account. You can find more information about the Yahoo Answers shutdown and how to download your data on this help page.

How do CD Keys/Serials Work?

If I wanted to protect some software I wrote, how would I go about doing this with a serial key (as is with nearly all games and applications nowadays). I don't mean how to crack or generate them. I mean, how could I implement a CD key verification system into an application?

- Are there a set number of keys, or are they generated by a specific algorithm, how does the process work.

- Many thanks.

4 Answers

Relevance
  • 1 decade ago
    Favorite Answer

    There are many algorithms that you can use , also you can make an algorithm on your own or customize already available algorithms.

    But hard truth is that no matter what you do, someone will definitely crack your security.

    Few things that you can do are :

    Using md5 , sha1 etc (all hash algorithms) to have one way hashes of CD key hard coded in you application , of course hard coding means a very weak protection, but to counter that, you can use

    Code obfuscation : Adding redundant code "all around and within" the code of algorithm that you made. Also dynamically fetching strings and allocating memory dynamically for strings to be verified. Storing hash of key in an external component like dll or heavily obfuscated algorithms and cd check like 20 times at various parts of you application.These are just few methods that will fool novice crackers.

    If you don't want to hard code serial in your application then you will need to come up with an algorithm that checks entered serial is some/different ways and when conditions are met allow access etc..

    Like

    xxx - xxxx - xxxx

    first three digits of key when converted to there ASCII counterparts and than adding some number to them , divided by something (...and so on) doing whatever you may want, gives you some particular result.

    Or just give some third party protector to do the protection like

    http://intelliprotector.com/

    Check the free subscription plan to try.

  • Anonymous
    5 years ago

    The Key is located on a small strip that is on the sleave that came with your copy of the CD. You will need this Key to do a Erase Install Feature using the CD. Remember there are several different options to do this, if you read your choices when you insert the CD. If you however have sensitive information as you claim, I would do a Goverment wipe that entails a 7 pass erase Install I suggest you do a Google search of this method. There are some Internet Security Suites that do make this option available. Don

  • Anonymous
    7 years ago

    You can try to visit vipwildstargold.com, You can get the answers you want to know.

  • Anonymous
    1 decade ago

    if theres always a key there will always be a crack.

Still have questions? Get your answers by asking now.