Newsgroups: comp.sys.ibm.pc.misc
Path: utzoo!utgpu!tateishi
From: tateishi@gpu.utcs.utoronto.ca (Nao Tateishi)
Subject: Re: printer port key software protection
Message-ID: <1991Feb16.072856.5644@gpu.utcs.utoronto.ca>
Organization: UTCS Public Access
References: <1991Feb13.044757.19348@gpu.utcs.utoronto.ca> <1991Feb13.090108.11277@unicorn.cc.wwu.edu>
Date: Sat, 16 Feb 1991 07:28:56 GMT

In article <1991Feb13.090108.11277@unicorn.cc.wwu.edu> n8541751@unicorn.cc.wwu.edu (Where there is darkness, light) writes:
>Why don't you change your plans?  Software protection using anything other
>than the honor system is out of fashion.   I won't buy a 
>protected program, no matter what it is.  If I buy one accidentally,
>it goes back.  I don't make illegal copies either, but
>do feel it is my right to make as many backups as I choose, in any
>format I choose, be it a floppy, a tape, a worm disk, or even 
>another hard disk.

This may be okay for shrink wrapped software which sell off the shelf, but for
custom designed control software for industrial applications which you are 
lucky to sell two versions but take three months developing, the honour system
is playing with your livelyhood.

The main reason I went this direction is that the customer specifically asked
for source code.  If that's not a hint that they want to copy the system, I 
don't know what is.

/nt
