Subj : Reg methods To : All From : Scott Adams Date : Tue Sep 18 2001 05:44 pm Folks, What do you think is the best registration scheme out there for games? Method 1: Paper sent with code on it to enter into some file or program. Advantage: No reg files to break. Disadvantage: Since its obviously a set scheme hackers can break it with enoughw ork an a hex editor. Even trial and error has been known to crack some of these emthods. If paper is lost then code is lost if game crashes. Method 2: Reg files are sent to the person. 99% of the time its encrypted and unreadable. Other times it might be a straightforward # in some text file. Advantage: Hackers have to use hex editor alot to try to figure out the scheme so its a bit harder due to length of time needed only. Disadvantage: Hex editors can still crack it in alot of ways. Method 3: Complete exes are sent out with the imbeeded information. Advantage: Harder to track if its well placed into the exe and not in obvious spots like "Registeration code" found in a hex editor. A bit tougher to break. Disadvantage: Usually takes up alot of space and expense sending out the files (if by mail-disk). Method 4: Imbed the information encrypted into the disk itself (works with floppies but I suppose CDs could be done with some work). The only game I saw to do this was a early Wizardy (#3 or 4 I think). Nothing to this day could break it or crack it. It could not even be copied. You could not even get a directory listing on the disk. Advantage: Very skilled encryption on the hardware level. Very hard to break. Though some modern copy software might be able to do it. Disadvantage: Didn't work in many disk drives adn were limited to set hardware and conditions. Hard to tell if the disk was corrupted/bad since you saw garbage on teh disk. Method 5: The Microsoft Way. Okok :) Enter name and #s in 4 boxes into the software. Advantage: The encryption scheme was different for each CD. Disadvantage: Well its microsloft :) Trial and error and combinations and permuations could get it done eventually. Those are the main methods I know of. There are probably others not listed if you have some let me know. BBS doors used methods 1-3 to death. Computer games in the '80s did methods 1-3 then at one point did combation of those methods. Then in the '90s computer games were about 90% of method 5. As to encryption codes. There have been many many versions over the years. Some as simple as converting the name of the person buying/regging the software to hex. To real complicated schemes using CRC values, dates and secret random codes. Then more that used all of the above plus 30-50 other steps. So does anyone know of a general scheme that seems to work most often that you don't see crackers for? --- Fringe BBS * Origin: EWOG II - The Fringe - 904-733-1721 (1:112/91) .