Saturday, February 21, 2009

Where i can buy the ROCKEY dongle?

www.rockey.com.my

Where i can buy ROCKEY dongle? I am from / in ...United States( USA) , United Kingdom, Canada, Afghanistan, Aland Islands, Albania,Algeria,American Samoa Andorra, Angola, Anguilla, Antarctica, Antigua And Barbuda, Armenia, Aruba, Australia, Austria, Azerbaijan, Bahamas, Bahrain, Bangladesh, Barbados, Belarus, Belgium, Belize, Benin,Bermuda, Bhutan, Bolivia, Bosnia And Herzegovina, Botswana, Bouvet Island, British Indian Ocean Territory, Brunei Darussalam, Bulgaria, Burkina Faso, Burundi, Cambodia, Cameroon, Canada, Cape Verde, Cayman Islands, Central African Republic, Chad, Channel Islands, China, Christmas Island, Cocos (Keeling) Islands, Comoros, Congo, Congo The Dem. Rep. Of The, Cook Islands, Costa Rica, Cote Divoire, Croatia, Cyprus, Czech Republic Denmark, Djibouti, Dominica, Dominican Republic, Ecuador, Egypt, El Salvador, Equatorial Guinea, Eritrea,Estonia, Ethiopia,Falkland Islands(Malvinas), Faroe Islands, Fiji, Finland, France, French Guiana, French Polynesia, French Southern Territories, Gabon, Gambia, Georgia, Germany, Ghana, Gibraltar, Greece, Greenland, renada, Guadeloupe, Guam, Guatemala, Guersney, Guinea, Guinea-Bissau, Guyana, Haiti, Heard Island And Mcdonald Islands, Holy See (Vatican City State), Honduras, Hong Kong, Hungary, Iceland, India, Indonesia, Iraq , Ireland, Isle of Man, Italy, Iran, Jamaica, Japan, Jersey, Jordan, Kazakstan, Kenya, Kiribati, Kuwait,Kyrgyzstan, Lao Peoples Democratic Republic, Latvi, Lebanon, Lesotho, Libya, Liechtenstein, Lithuania, Luxembourg, Macau, Macedonia, Madagascar, Malawi, Malaysia, Maldives, Mali, Malta, Marshall Islands, Martinique, Mauritania, Mauritius, Mayotte, Micronesia Federated States Of, Moldova Republic Of, Monaco, Mongolia, Montenegro, Montserrat, Morocco, Mozambique, Namibia,Nauru, Nepal, Netherlands, Netherlands Antilles,New Caledonia,New Zealand, Nicaragua, Niger, Nigeria, Niue, Norfolk Island, Northern Mariana Islands, Norway, Oman, Pakistan, Palau, Palestinian Territory Occupied, Panama, Papua New Guinea, Paraguay, Peru, Philippines, Pitcairn, Poland, Portugal, Puerto Rico, Qatar, Reunion, Romania, Russian Federation, Rwanda, Saint Helena, Saint Kitts And Nevis,Saint Lucia,Saint Pierre And Miquelon, Saint Vincent And The Grenadines, Samoa, San Marino,Sao Tome And Principe, Saudi Arabia, Senegal, Serbia, Seychelles, Singapore, Slovakia, Slovenia, Solomon Islands, Somalia, South Africa, South Georgia / South Sandwich Islands, South Korea, Sri Lanka, Suriname, Svalbard And Jan Mayen, Swaziland, Sweden, Switzerland, Syrian Arab Republic, Taiwan, Tajikistan, Tanzania United Republic Of, Thailand, Timor-Leste, Togo, Tokelau, Tonga, Trinidad And Tobago, Tunisia, Turkey, Turkmenistan, Turks And Caicos Islands, Tuvalu, Uganda, Ukraine, United Arab Emirates, United Kingdom, United States, United States Minor Outlying Islands, Uruguay, Uzbekistan, Vanuatu, Venezuela, VietNam, Virgin Islands British, Virgin Islands U.S., Wallis And Futuna, Western Sahara, Yemen, Zambia, Zimbabwe


*************************************************************************************
Website : http://www.rockey.com.my
Contact Email : sales@rockey.com.my
Support for ROCKEY: support@rockey.com.my
Phone : +603-8996 8225
Fax : +603-8996 7225
Categories : Software, Technology, Software Security
Tags : software dongle, software protection, software license protection, encryption tool, software anti debugging tool, software license dongle, control software copy, USB Dongle, Software USB Dongle, affordable dongle, strong encryption dongle, cost effective dongle, low cost usb dongle

Labels: , ,

Friday, February 20, 2009

Tips and Tricks on optimizing Software License Protection Dongle

www.rockey.com.my

Tips and Tricks on optimizing Software License Protection Dongle

To achieve maximum security of Software License Protection Dongle, one must first understand the core protection concept of the chosen Dongle and plan ahead on how to utilize the provided security features into their protection before actual integration. Below are some useful tips and tricks on optimizing protection in Software License Protection Dongle.

1.Combining API and Envelope
Most Software License Protection Dongle will come with API (Application protocol interface such as DLLs and Object files), where there are various libraries files provided for software vendors to include protection function calls into their source codes. Envelope is whereby the software vendor can make use of the provided shell program to encrypt their application without the need to modify their source code. The best protection will be Envelope after completed the API protection, a combination of both.

2.Updating Protection
As the best protection now might no longer secure few years later, it is very important that the software vendors will keep updating their protection more often. The best practice is to change their protection strategy for different versions or product, do not use the same strategy once for all.

3.Object vs DLL Links
In order to gain higher security, a software vendor should link their applications to the Software License Protection Dongle’s objects instead of DLLs. This is because link by objects will be compiled and integrated as part of the protected application of which will make simulating attacks more difficult.

4.Intelligent use of API Calls
A smart protection should include multiple API calls with different security function calls from various program points. Protection with more various different API calls will definitely harder to trace than protection with few almost similar API calls. Try to make your API Calls more sophisticate.

5.Dummy API Calls
One simple ways to make your protection even harder to hack is to include some dummy API Calls, i.e. some API or security checks that will not have any legitimate reaction. Such method will be able to confuse hackers who will need to spend more effort on analyzing such dummy API calls that they will never know this is not the “real” one.

6.Delay Reaction
Most software vendors practice direct reaction in their implementation should the API calls found no dongle or invalid return, thus hackers are able to back trace the security checking points and then bypassing it. To make your protection even harder to back trace, perhaps you can delay some of your reactions to confuse the hackers, means if detected no dongle or invalid return then keep a validity flag in your program then at later program point only suspend the program.

7.Manipulate Functionalities
Many software vendors include standard response such as displaying error message and suspending program should there is no dongle found or invalid return. Another better ways to make hacking harder is to alter the program functionalities should the dongle not found, such as disable printing report features until a valid dongle is attached. Hacker might not realize there is security check point that restricted the program functionalities.

8.Authenticate instead of compare
Direct comparing value is just too easy to understand, should the dongle product chosen provide possible features to allow software vendors to perform certain authentication such as Checksum after performing predefine security algorithms, use it. Some dongle products provide more advanced security features such as onboard encryption, seed code or random code generation, onboard security algorithms, of which it will maximize protection if we utilize it in the right manner.

To know more about software protection, software licensing protection, software dongle, please visit http://www.rockey.com.my


*************************************************************************************
Website : http://www.rockey.com.my
Contact Email : sales@rockey.com.my
Support for ROCKEY: support@rockey.com.my
Phone : +603-8996 8225
Fax : +603-8996 7225
Categories : Software, Technology, Software Security
Tags : software dongle, software protection, software license protection, encryption tool, software anti debugging tool, software license dongle, control software copy, USB Dongle, Software USB Dongle, affordable dongle, strong encryption dongle, cost effective dongle

Labels: ,

How to select a good software protection dongle?

www.rockey.com.my

Software License Dongles or Locks started become popular since late 90’s as computer system become more and more common. After more than 20 years of technology evolution, you will find today Software License Dongles or Locks are built with far more advanced anti-cracking technology, some are even built based on complete smart card platforms. The devices itself are in various port options, the common one are such as PCMCIA, Serial, Parallel, and USB models.

With so many competing products available in today competitive market, choosing the RIGHT product require proper evaluation and careful evaluation. Below are some of the Tips or consideration criteria of which are very crucial while making such decision:-

The Product
•Security Technology
Is the chosen product provides acceptable protection against foreseen threats, what are the core security features to prevent hackings?
•Pricing
What is the initial cost to acquire such product and how much will be the per license cost (cost of each additional Dongle)?
•Supported Platforms
What platforms or operating systems the product is supported, does it meet your targeted implementation platforms?
•User Friendliness
How easy to master the product and whether it come with adequate tools and resources to ease the implementation process?
•Flexibilities
How flexible the product can incorporate into your various licensing models such as demo version, leasing or time restricted version, multiple module licenses, pay per use license, specific customer or user license, concurrent user licenses, etc?
•Quality
How good the product quality is, what is the failure rate and whether there is any quality assurance from the provider on the product?

The Company
•Company Background
How long does the company exist in the market and what is the corporate background of the company? Does the company show it is a serious player in the industry and commitment to stay in the business?
•Pre and Pro Sales Support
How efficient their sales person attend your sales enquiry and how easy the ordering process when you make an order? Did their technical support attend your technical support request on time and how will be the warranty process if the dongle spoilt?
•References or Track Records
Who are their existing customers in your region and whether the product posted good and strong reputation in the market?
•Third Party Awards or Certifications
Does the company received any third party awards or certification as to prove their products passing any neutral certification or testing?
•Product R&D
Does the company show its commitment on continuously product R&D and improvement in order to make sure their product is always stay on the line to combat latest hacking threats?

*************************************************************************************
Website : http://www.rockey.com.my
Contact Email : sales@rockey.com.my
Support for ROCKEY: support@rockey.com.my
Phone : +603-8996 8225javascript:void(0)
Fax : +603-8996 7225
Categories : Software, Technology, Software Security
Tags : software dongle, software protection, software license protection, encryption tool, software anti debugging tool, software license dongle, control software copy, USB Dongle, Software USB Dongle,

Labels: , ,

Monday, February 16, 2009

What's New on ROCKEY4ND

contact : www.rockey.com.my

What's New on ROCKEY4ND?

ROCKEY4ND is our enhanced version of the most popular ROCKEY4 model. We develop ROCKEY4ND based on our customers' suggestions together with our market study. This new model will definitely add stronger momentum to make ROCKEY4 ahead of the other similar products in the market.

New Features are:

Driverless

Completely Plug & Play without the need to install any device driver, the supported operating System (Win98SE/ME/2000/2003/XP/Vista?Window7(beta)/Linux/Mac OS X) will recognize ROCKEY4ND as an HID device in the system. Perfect solution to eliminate potential end user technical support issue arise on device driver.

Bigger Memory

ROCKEY4ND come with total 1000 bytes User Data Zone, i.e. 500 bytes low memory area which can be read/written with Basic Passwords (P1 & P2) and 500 bytes high memory which can only be written with Advanced Passwords (P3 & P4) but still readable with Basic Passwords (P1 & P2).

More Modules

ROCKEY4ND has increased Module Zones from previously 16 Modules to now 64 Modules. You can now protect up to 64 software modules/products with a single ROCKEY4ND.

More Algorithms

ROCKEY4ND comes with 128 User Definable Algorithms which will allow developers to include more comprehensive security algorithms as they wish.


64-bit Protection

ROCKEY4ND provides protection not only for 32-bit applications running on 64-bit Operating System, but also for 64-bit native applications.


100% Compatible with old ROCKEY4

ROCKEY4 programs can be seamlessly migrated to ROCKEY4ND without the need to modify source code. All the APIs are the same except the dll/lib files, what you need to do is just replace the old dll/lib files.


*************************************************************************************
Website : http://www.rockey.com.my
Contact Email : sales@rockey.com.my
Phone : +603-8996 8225
Fax : +603-8996 7225
Categories : Software, Technology, Software Security
Tags : software dongle, software protection, software license protection, encryption tool, software anti debugging tool, software license dongle, control software copy, USB Dongle, Software USB Dongle,





*************************************************************************************

Labels: , ,

Why ROCKEY4?

contact: www.rockey.com.my

Why ROCKEY4?

There are a thousand reasons why you should start using ROCKEY4, below are the few highlighted benefits:

* Cost Saving

Why pay more when you can get something better at a cheaper price. ROCKEY4 costs you 50% or less than most of the competing Dongles available in the market. With ROCKEY4, you do not need to employ expensive software security experts but still enjoy high security on your software.

* High Security

ROCKEY4 implements two-level security system to segregate users who need read only access from those who need administrative privileges. To combat hackers, ROCKEY4 has a built-in time gate to prevent software tracking and debugging on its protection system. In addition, ROCKEY4's protected memory + user defined algorithm works within the dongle and is almost impossible to crack.

* High Reliability

ROCKEY4 is built under a perfect customer management system in which every customer is guaranteed to own a unique password, and every dongle come with a unique hardware ID. Both the password and hardware ID are burnt into the CPU inside the dongle, it is absolutely impossible to change them, even for us - the manufacturer. On the other hand, with our high level of Quality Control during production, we are maintaining less than 0.5% faulty rate which is much more lower than the industry standard.

* High Compatibility

ROCKEY4 LPT dongle is not only transparent to printers, scanners, but can also be cascaded with up to maximum of 16 dongles, even from other manufacturers. ROCKEY4 is also designed to process even very complex algorithms with minimal delay for your application. Broad support of ROCKEY4 include Operating Systems like DOS, Windows 3.1/95/98/NT/2000/ME/XP/ Server/Vista, Linux, and Mac; thus enables you to implement it onto almost any platform available in the market.

* Ease of Use

ROCKEY4 is a well designed software protection system that comes with user friendly interface and useful sample source codes in most programming languages, so that you will have no difficulty learning how to integrate it into your software application. In most cases, just within few days a programmer can become the master of using ROCKEY4.


we are now introducing ROCKEY4ND Driverless Software protection Dongle which is much more convinient and come with bigger memory

100% Compatible with old ROCKEY4

ROCKEY4 programs can be seamlessly migrated to ROCKEY4ND without the need to modify source code. All the APIs are the same except the dll/lib files, what you need to do is just replace the old dll/lib files.

**********************************************************************************


Website : http://www.rockey.com.my
Contact Email : sales@rockey.com.my
Phone : +603-8996 8225
Fax : +603-8996 7225
Categories : Software, Technology, Software Security
Tags : software dongle, software protection, software license protection, encryption tool, software anti debugging tool, software license dongle, control software copy

*********************************************************************************

Labels: , ,

Friday, February 13, 2009

What is ROCKEY4 Software Protection and how ROCKEY4 Protection work?

www.rockey.com.my

What is ROCKEY4 software protection dongle?

ROCKEY4 is an advanced software protection system that attaches to the parallel or USB port of a computer. Your software may be duplicated, but it will only run when your ROCKEY4 dongle is attached to the computer. Your application will interact with ROCKEY4 at start-up and during runtime, No Dongle means No License to execute your software. You can also limit the use of your software which is very common in the software industry for DEMO purposes or SHAREWARE.

In the case of software developers offering multiple modules, ROCKEY4 allows you to protect up to 16 applications per dongle at any one time (ROCKEY4ND now support 64 modules). Since every ROCKEY4 dongle comes with a unique ID, software developers can even restrict the application to only allow to execution with a particular dongle.

Unlike some competing products, ROCKEY4 is in fact a powerful miniature computer, with a CPU, memory and specialized firmware that allows for robust interaction with your application. You may write algorithms that are securely stored in the dongle, and then call those algorithms from time to time in your application. This method for software protection is almost impossible to crack. Although designed for high level security, it is also relatively easy to implement.

There are three common ways of implementation:

1. Enveloping (shell)

In the ROCKEY4 SDK CD, there is an Enveloper program which allows software developers to encrypt any executable files in a few simple steps. This solution does not require any programming skills and is an ideal solution if you do not posses the source code for the application.

2. API

The ROCKEY4 API is where software developers can integrate the highest protection from ROCKEY4 by calling specialized instructions into the application source code. You will find many useful API samples for all the popular programming languages as listed below:

API32 Samples

* ActiveX (Delphi 4, JavaScript, Visual Basic 6, VBScript, Word)
* Borland C/C++ 5.02
* C++ Builder 3/4/5/6/Pro
* Delphi 3/4/5/6/7/2005/2006/2007
* DLL (Access 2000, ASP, FoxPro, LabView, PowerBuilder, VB6, VC6, MFC)
* Fortran Power Station
* Java
* AutoCAD for Windows 13/14
* Visual C++ 6.0
* Visual Studio .net

API16 Samples

* MASM 6.x
* Borland C/C++ 5.02
* Delphi 1.0
* Tool Book 3.0
* Visual Basic 3.0
* Visual Basic 4.0
* Visual C/C++ 1.52

DOS Samples

* Borland C/C++ 3.1/4.5
* Clipper
* FoxPro 2.5/2.6
* Microsoft C/C++ 7.0
* QuickBasic 4.5
* Turbo C 2.0
* Turbo Pascal 7.0
* Watcom C/C++ 10/11
* Novell 5.0 NLM

3. Enveloping (Shell) + API

A secure system combining both the API and Enveloping methods, thus will establish greatest level of protection for your software.




*********************************************************************************

Website : http://www.rockey.com.my
Contact Email : sales@rockey.com.my
Phone : +603-8996 8225
Fax : +603-8996 7225
Categories : Software, Technology, Software Security
Tags : software dongle, software protection, software license protection, encryption tool, software anti debugging tool, software license dongle, control software copy

*********************************************************************************

Labels: , ,

Why ROCKEY6 Smart Software Protection Dongle?

www.rockey.com.my

Why ROCKEY6 Smart software protection dongle?

* Smartest and Uncrackable Security
ROCKEY6 makes it virtually impossible for hackers to track, debug or read the intercommunication between the protected application and special programs inside ROCKEY6. In hardware, it is also not possible to duplicate nor access without proper authorities.

* Highest Performance in the Industry
32-bit CPU, smart card and reader on the single chip, together with proprietary fast transfer architecture; ROCKEY6 Smart simply just outperform all other competing products even with the most complex computation.

* User Friendliness for End User
ROCKEY6 Smart driverless technology will ease end user installation and eliminate potential technical support issue arise from device driver problem. It also provide familiar development platform for developer to program the smart card with C51 Keil compiler.

*Value for Money
World class security product at generally affordable pricing, ROCKEY6 Smart give everyone no reason to reject.

*Feature Rich
ROCKEY6 Smart comes with many ready-to-use features that will provide developers complete solution with high security level.
Customer unique ID codes and globally unique hardware ID
o Changeable Super Password and up to 16 File Security Level.
o Onboard Algorithms include RSA, DES, and 3DES.
o Secure Remote Software Updates based on "One-time-only" password technology.
o Soft Timer and Internal Counter.
o Multiple Module Management Schemes.
o Batch Production Tool.
o Secure file transfer.

*********************************************************************************

Website : http://www.rockey.com.my
Contact Email : sales@rockey.com.my
Phone : +603-8996 8225
Fax : +603-8996 7225
Categories : Software, Technology, Software Security
Tags : software dongle, software protection, software license protection, encryption tool, software anti debugging tool, software license dongle, software copy

Labels: , ,

ROCKEY6 Smart Features

www.rockey.com.my

ROCKEY6 Features

*Smart Card Security - ROCKEY6 uses smart card technology widely used by the most security conscious sectors worldwide such as financial institutions and government. It complies with all smart card standards and utilizes smart card technology as a "black box" to protect and execute core portion of application code. Developers may protect their software by storing algorithms, data and programs inside the protected R0CKEY6 environment and executing in isolation from the PC. More importantly, smart card chip is impossible to duplicate and proper authorization are required in order to access the card.

*Powerful Encryption Algorithms - ROCKEY6 supports onboard algorithms which include RSA, DES, and 3DES. It can therefore support far stronger encryption mechanisms than most products available on the market.

*Driverless Technology - ROCKEY6 was developed based on the latest driverless mechanism for USB devices. It is not only more convenient for end user without the need of installing any device driver but will also eliminate possible supporting issue arise from device driver problem. It is also provides protection solution for x64 applications.

*Innovative Features - ROCKEY6 created new idea for software license protection that will not only making hacking impossible but also provide an intuitive integration. C51 Keil compiler eases the smart card programming because it is very similar to C language that many developers familiar with. Soft Timer inside ROCKEY6 provide time control facility without worry of internal battery die off like many other competing products. High-level Remote Update, Batch Production and Multiple Module Scheme are ready to use features that is useful for developers to implement into their desired license policy.


*********************************************************************************

Website : http://www.rockey.com.my
Contact Email : sales@rockey.com.my
Phone : +603-8996 8225
Fax : +603-8996 7225
Categories : Software, Technology, Software Security
Tags : software dongle, software protection, software license protection, encryption tool, software anti debugging tool, software license dongle, software copy

Labels: , ,

Software Protection Dongles and Its Technologies

Software License Dongles or Locks are usually provided by third party suppliers who specialized on software copy protection solution. Software License Dongles or Locks are categorized under hardware based software copy protection.

Nowadays, it is very common when someone purchase a software application, the package come together with a small device that the user is require to attach it onto the relevant port of the computer, in order to execute the application. That small device is popularly called Software License Dongle or Software License Lock.

Software License Dongles or Locks are usually provided by third party suppliers who specialized on software copy protection solution. Software License Dongles or Locks are categorized under hardware based software copy protection. The Software License Dongles or Locks suppliers usually offer their devices together with protection methods or tools in a package in order for software developers to integrate it into their software application. After the integration, the protected application will be distributed together with the Software License Dongles or Locks.

Software License Dongles or Locks started become popular since late 90’s as computer system become more and more common. After more than 20 years of technology evolution, you will find today Software License Dongles or Locks are built with far more advanced anti-cracking technology, some are even built based on complete smart card platforms. The devices itself are in various port options, the common one are such as PCMCIA, Serial, Parallel, and USB models.

With so many competing products available in today competitive market, choosing the RIGHT product require proper evaluation and careful evaluation. Below are some of the Tips or consideration criteria of which are very crucial while making such decision:-

The Product
•Security Technology
Is the chosen product provides acceptable protection against foreseen threats, what are the core security features to prevent hackings?
•Pricing
What is the initial cost to acquire such product and how much will be the per license cost (cost of each additional Dongle)?
•Supported Platforms
What platforms or operating systems the product is supported, does it meet your targeted implementation platforms?
•User Friendliness
How easy to master the product and whether it come with adequate tools and resources to ease the implementation process?
•Flexibilities
How flexible the product can incorporate into your various licensing models such as demo version, leasing or time restricted version, multiple module licenses, pay per use license, specific customer or user license, concurrent user licenses, etc?
•Quality
How good the product quality is, what is the failure rate and whether there is any quality assurance from the provider on the product?

The Company
•Company Background
How long does the company exist in the market and what is the corporate background of the company? Does the company show it is a serious player in the industry and commitment to stay in the business?
•Pre and Pro Sales Support
How efficient their sales person attend your sales enquiry and how easy the ordering process when you make an order? Did their technical support attend your technical support request on time and how will be the warranty process if the dongle spoilt?
•References or Track Records
Who are their existing customers in your region and whether the product posted good and strong reputation in the market?
•Third Party Awards or Certifications
Does the company received any third party awards or certification as to prove their products passing any neutral certification or testing?
•Product R&D
Does the company show its commitment on continuously product R&D and improvement in order to make sure their product is always stay on the line to combat latest hacking threats?

Tips and Tricks on optimizing Software License Protection Dongle

To achieve maximum security of Software License Protection Dongle, one must first understand the core protection concept of the chosen Dongle and plan ahead on how to utilize the provided security features into their protection before actual integration. Below are some useful tips and tricks on optimizing protection in Software License Protection Dongle.

1.Combining API and Envelope
Most Software License Protection Dongle will come with API (Application protocol interface such as DLLs and Object files), where there are various libraries files provided for software vendors to include protection function calls into their source codes. Envelope is whereby the software vendor can make use of the provided shell program to encrypt their application without the need to modify their source code. The best protection will be Envelope after completed the API protection, a combination of both.

2.Updating Protection
As the best protection now might no longer secure few years later, it is very important that the software vendors will keep updating their protection more often. The best practice is to change their protection strategy for different versions or product, do not use the same strategy once for all.

3.Object vs DLL Links
In order to gain higher security, a software vendor should link their applications to the Software License Protection Dongle’s objects instead of DLLs. This is because link by objects will be compiled and integrated as part of the protected application of which will make simulating attacks more difficult.

4.Intelligent use of API Calls
A smart protection should include multiple API calls with different security function calls from various program points. Protection with more various different API calls will definitely harder to trace than protection with few almost similar API calls. Try to make your API Calls more sophisticate.

5.Dummy API Calls
One simple ways to make your protection even harder to hack is to include some dummy API Calls, i.e. some API or security checks that will not have any legitimate reaction. Such method will be able to confuse hackers who will need to spend more effort on analyzing such dummy API calls that they will never know this is not the “real” one.

6.Delay Reaction
Most software vendors practice direct reaction in their implementation should the API calls found no dongle or invalid return, thus hackers are able to back trace the security checking points and then bypassing it. To make your protection even harder to back trace, perhaps you can delay some of your reactions to confuse the hackers, means if detected no dongle or invalid return then keep a validity flag in your program then at later program point only suspend the program.

7.Manipulate Functionalities
Many software vendors include standard response such as displaying error message and suspending program should there is no dongle found or invalid return. Another better ways to make hacking harder is to alter the program functionalities should the dongle not found, such as disable printing report features until a valid dongle is attached. Hacker might not realize there is security check point that restricted the program functionalities.

8.Authenticate instead of compare
Direct comparing value is just too easy to understand, should the dongle product chosen provide possible features to allow software vendors to perform certain authentication such as Checksum after performing predefine security algorithms, use it. Some dongle products provide more advanced security features such as onboard encryption, seed code or random code generation, onboard security algorithms, of which it will maximize protection if we utilize it in the right manner.

To know more about software protection, software licensing protection, software dongle, please visit www.rockey.com.my

We are specialized on providing digital security devices and solutions since 1998. Successful business alliances with our foreign technology partners together with our established business networking, we proudly to be the leading digital security provider in this region. Our business focus on providing digital security devices to our solution partners together with the device last mile integration.

*********************************************************************************

Website : http://www.rockey.com.my
Contact Email : sales@rockey.com.my
Phone : +603-8996 8225
Fax : +603-8996 7225
Categories : Software, Technology, Software Security
Tags : software dongle, software protection, software license protection, encryption tool, software anti debugging tool, software license dongle, software copy

Labels: , ,

Thursday, February 12, 2009

We are selling smart card based software protection dongle too beside Smart Card and Reader

As a software developer or system integration, if you are looking for the software protection dongle in order to protect your software being cracked, you can contact us at sales@rockey.com.my

Our smart card chip based software protection dongle offers a combination of advanced smart card level hardware security together with advanced software protection firmware with is also integrated with advanced anti-cracking algorithms and mechanisms.

How secure of smart card chip based dongle?
built-in support for RSA, DES, 3DES security algorithms. Microprocessor smart chip prevent hardware cloning and duplication attack.


What is ROCKEY6 Smart

ROCKEY6 Smart is the 6th generation programmable dongle, another innovative product which aimed to enhance existing ROCKEY models in term of Speed, Features, Security.

ROCKEY6 Smart is the first Software License dongle in the world deploy 32-bit microprocessor smart card with unique architecture of smart card and reader on the single chip. As the smartest software license dongle, it is a driverless model which do not need any driver installation and supports full 64-bit software protection; i.e. a protection solution for 32-bit software running on 64-bit Operating System and also for native 64-bit applications.

for more details: http://www.rockey.com.my/prod-dongle-rockey6.php

We also offer various model of Software protection dongle, for more details please visit our website http://www.rockey.com.my/index.php

Labels: ,

Friday, January 30, 2009

Contact Us & Hubung Kita

In Softkey, we pay attention to every feedback or enquiry. We promise will response to you within sooner possible.
Kita berjanji balas hubung segala pertanyaan to you secepat mungkin.

Our working hours are from 8:30am to 7:00pm (GMT +08:00) from Monday to Friday.

General & International Email : sales@esoftkey.com

SOFTKEY E-SOLUTION SDN BHD (Reg. no. 540674M)

Malaysia

5-20, Menara KLH Business Centre,
Lebuhraya Damansara-Puchong,
47100 Puchong, Selangor Darul Ehsan,
Malaysia.

Tel: +603-8076 6225
Fax: +603-8070 4225

Singapore

105, Cecil Street,
#06-01 The Octagon,
Singapore 069534.

Tel: +65-6827 9077
Fax: +65-6827 9601

Indonesia

Komplek Ruko ITC Roxy Mas
Blok C2 No. 42,
Jl. KH. Hasyim Ashari
Jakarta 10150, Indonesia

Tel: +6221-6386 1282
Fax: +6221-6386 1283

Labels: ,

Wednesday, January 28, 2009

What our mean by international shipping or worldwide shipping

We mean we can deliver your order via FedEx/DHL/TNT/UPS/EMS if you want to buy smart card (SLE5542, SLE5528,SLE4442,SLE4428, Mifare 1k,4k), ACOS3, ACOS5, .Net Smart card), PC/SC compliant smart card reader, EMV compliant smart card reader, CCID smart card reader, contactless smart card reader, NFC contactless smart card reader from United States, United Kingdom, Canada, Afghanistan, Aland Islands, Albania,Algeria,American Samoa Andorra, Angola, Anguilla, Antarctica, Antigua And Barbuda, Argentina, Armenia, Aruba, Australia, Austria, Azerbaijan, Bahamas, Bahrain, Bangladesh, Barbados, Belarus, Belgium, Belize, Benin,Bermuda, Bhutan, Bolivia, Bosnia And Herzegovina, Botswana, Bouvet Island, Brazil, British Indian Ocean Territory, Brunei Darussalam, Bulgaria, Burkina Faso, Burundi, Cambodia, Cameroon, Canada, Cape Verde, Cayman Islands, Central African Republic, Chad, Channel Islands, Chile, China, Christmas Island, Cocos (Keeling) Islands, Colombia, Comoros, Congo, Congo The Dem. Rep. Of The, Cook Islands, Costa Rica, Cote Divoire, Croatia, Cyprus, Czech Republic Denmark, Djibouti, Dominica, Dominican Republic, Ecuador, Egypt, El Salvador, Equatorial Guinea, Eritrea,Estonia, Ethiopia,Falkland Islands(Malvinas), Faroe Islands, Fiji, Finland, France, French Guiana, French Polynesia, French Southern Territories, Gabon, Gambia, Georgia, Germany, Ghana, Gibraltar, Greece, Greenland, renada, Guadeloupe, Guam, Guatemala, Guersney, Guinea, Guinea-Bissau, Guyana, Haiti, Heard Island And Mcdonald Islands, Holy See (Vatican City State), Honduras, Hong Kong, Hungary, Iceland, India, Indonesia, Iraq , Ireland, Isle of Man, Italy, Jamaica, Japan, Jersey, Jordan, Kazakstan, Kenya, Kiribati, Kuwait,Kyrgyzstan, Lao Peoples Democratic Republic,Latvi, Lebanon, Lesotho, Libya, Liechtenstein, Lithuania, Luxembourg, Macau, Macedonia, Madagascar, Malawi, Malaysia, Maldives, Mali, Malta, Marshall Islands, Martinique, Mauritania, Mauritius, Mayotte, Mexico, Micronesia Federated States Of, Moldova Republic Of, Monaco, Mongolia, Montenegro, Montserrat, Morocco, Mozambique, Namibia,Nauru, Nepal, Netherlands, Netherlands Antilles,New Caledonia,New Zealand, Nicaragua, Niger, Nigeria, Niue, Norfolk Island, Northern Mariana Islands, Norway, Oman, Pakistan, Palau, Palestinian Territory Occupied, Panama, Papua New Guinea, Paraguay, Peru, Philippines, Pitcairn, Poland, Portugal, Puerto Rico, Qatar, Reunion, Romania, Russian Federation, Rwanda, Saint Helena, Saint Kitts And Nevis,Saint Lucia,Saint Pierre And Miquelon, Saint Vincent And The Grenadines, Samoa, San Marino,Sao Tome And Principe, Saudi Arabia, Senegal, Serbia, Seychelles, Singapore, Slovakia, Slovenia, Solomon Islands, Somalia, South Africa, South Georgia / South Sandwich Islands, South Korea, Spain, Sri Lanka, Suriname, Svalbard And Jan Mayen, Swaziland, Sweden, Switzerland, Syrian Arab Republic, Taiwan, Tajikistan, Tanzania United Republic Of, Thailand, Timor-Leste, Togo, Tokelau, Tonga, Trinidad And Tobago, Tunisia, Turkey, Turkmenistan, Turks And Caicos Islands, Tuvalu, Uganda, Ukraine, United Arab Emirates, United Kingdom, United States, United States Minor Outlying Islands, Uruguay, Uzbekistan, Vanuatu, Venezuela, VietNam, Virgin Islands British, Virgin Islands U.S., Wallis And Futuna, Western Sahara, Yemen, Zambia, Zimbabwe

What is Smart Card and what we are supplying??

What is a smart card?
The smart card is one of the latest additions to the world of information technology. Similar in size to today's plastic payment card, the smart card has a microprocessor or memory chip embedded. As an access-control device, smart cards make personal and business data available only to the owner/accurate users. Another application provides users with the ability to make a purchase or exchange value. Smart cards provide data portability, security and convenience.

Memory vs. microprocessor
Smart cards come in two varieties: memory and microprocessor. Memory cards simply store data and can be viewed as a small floppy disk with optional security. A microprocessor card, on the other hand, can add, delete and manipulate information in its memory on the card. Similar to a miniature computer, a microprocessor card has an input/output port operating system and hard disk with built-in security features.

We are supplying contact* smart card such as memory type = SLE5542, 5528, wherever the microprocessor ACOS3, PKI Card, .NET Card also to customer in any location in world wide from Software Developer to system integrator(SI) , we are believe the smart card demand and supply had no boundary, we doing business without prejudices and with honesty. Not only contact smart card, we are also supplying contactless* smart card related such as mifare contactless smart card. With the smart card then the card user will require also the smart card reader also, our online store available at www.esoftkey.com

what is contact type smart card?? Normally contact type smart card refer to smart cardsare inserted into a smart card reader, making physical contact with the reader.

what is contactless type smart card?? contactless smart cards have an antenna embedded inside the card that enables communication with the reader without physical contact.

Following was more complete definition of smart card which we copied from wikipedia to make our blog more richer with content, we are not intend to pirate it, we are respect the copyright and intellectual property. That why we are also work closer with the software and content copyright and licensing protection provider- www.securemetric.com

A smart card, chip card, or integrated circuit card (ICC), is in any pocket-sized card with embedded integrated circuits which can process data. This implies that it can receive input which is processed — by way of the ICC applications — and delivered as an output. There are two broad categories of ICCs. Memory cards contain only non-volatile memory storage components, and perhaps some specific security logic. Microprocessor cards contain volatile memory and microprocessor components. The card is made of plastic, generally PVC, but sometimes ABS. The card may embed a hologram to avoid counterfeiting. Using smartcards also is a form of strong security authentication for single sign-on within large companies and organizations.

source:http://en.wikipedia.org/wiki/Smart_card

Labels: , , ,