winzip icon

Software Registration key derived from PC hardware components *** Updated ***

Submitted on: 2/3/2015 11:26:00 PM
By: Steve W (from psc cd)  
Level: Intermediate
User Rating: By 45 Users
Compatibility: VB 6.0
Views: 10150
     This is a simplified example that shows how to register an app to individual PCs using a key that is derived from unique properties such as the CPU ID, OS serial, MAC address etc. It's real easy to do & secure enough to keep most users honest. Feel free to modify & use it as you see fit & please vote if you find it useful. Any feedback or comments are welcome and why not take up my cracking challenge - no one has succeeded yet! It uses WMI so if you're running W95, W98 or NT4 & you get an automation error download the WMI engine from: Update info: The app is even more secure as it now includes complete obfuscation of the key variable and a simple and easily expandable anti-hacking routine (currently includes RegMon, FileMon, SoftICE - routine is adapted from Kevin Lingofelter's code at

winzip iconDownload code

Note: Due to the size or complexity of this submission, the author has submitted it as a .zip file to shorten your download time. Afterdownloading it, you will need a program like Winzip to decompress it.Virus note:All files are scanned once-a-day by Planet Source Code for viruses, but new viruses come out every day, so no prevention program can catch 100% of them. For your own safety, please:
  1. Re-scan downloaded files using your personal virus checker before using it.
  2. NEVER, EVER run compiled files (.exe's, .ocx's, .dll's etc.)--only run source code.
  3. Scan the source code with Minnow's Project Scanner

If you don't have a virus scanner, you can get one at many places on the net

Other 1 submission(s) by this author


Report Bad Submission
Use this form to tell us if this entry should be deleted (i.e contains no code, is a virus, etc.).
This submission should be removed because:

Your Vote

What do you think of this code (in the Intermediate category)?
(The code with your highest vote will win this month's coding contest!)
Excellent  Good  Average  Below Average  Poor (See voting log ...)

Other User Comments

7/19/2017 7:15:12 AMEvariste Galois

There are three keystrokes which keep this from being ak good or excellent application: WSI. WSI is notorious because WMI can be spoofed. But at least you haven't committed one of the nastier methods: using a user's IP address to determine who is known [or not].
(If this comment was disrespectful, please report it.)


Add Your Feedback
Your feedback will be posted below and an email sent to the author. Please remember that the author was kind enough to share this with you, so any criticisms must be stated politely, or they will be deleted. (For feedback not related to this particular code, please click here instead.)

To post feedback, first please login.