Please also include any other relevant information in as much detail as you can. All encryption is executed in the dongle itself. While you might not be able to prevent your software being copied you can prevent it being used. Since , it has concentrated on computer security, firstly with CopyControl a software-based copy protection system , then Dinkey Dongle small hardware copy protection keys that connect to parallel or USB ports. Communication between your software and the dongle uses very strong encryption techniques:
|Date Added:||25 December 2012|
|File Size:||22.65 Mb|
|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|
|Price:||Free* [*Free Regsitration Required]|
Microcosm Ltd – Wikipedia
Our dongles use drivers built-in to the operating system so there is no need to install drivers. It can also protect PDF documents for use on Windows. Shell and API protection methods for ultimate flexibility. For example, you may wish to restrict which features of your software are made available or you midrocosm wish to set some simple expiry dates. By careful monitoring of the usage of each installation of your software, it achieves what has up to now been thought impossible: Enforce Software Licensing Terms.
Strong Encryption Communication microcowm your software and the dongle uses very strong encryption techniques: Customisable protection via a web-based interface.
It provides a high micgocosm of security with the minimum amount of fuss and a level of flexibility that is second to none.
Long established company specialising in software security. Time-based OTP tokens generate codes that are valid only for a certain amount of time eg, 30 or 60 secondsafter which a new code must be generated.
Dinkey Pro/FD Dongles
Extremely Secure Dongle hardware is based on smart card technology that is proven to be very secure and is widely used in the security industry.
Buy c OTP Microcos. Our prices are some of the lowest in the industry.
Sinceit has concentrated on computer security, firstly with CopyControl a software-based copy protection systemthen Dinkey Dongle small hardware copy protection keys that connect to parallel or USB ports. Previous software-based copy protection systems were much less flexible: Key Features Ultra-secure copy protection. This is not possible with any other dongle protection system. Software protection by dongles or by intelligent monitoring using the internet helps protect your revenue stream and gives you the piece of mind that the only people using your software are those who have paid to do so.
Software-based protection and licensing system with intelligent monitoring. Fully customisable colour faceplates, front and microdosm Configurable serial number Configurable algorithm Configurable timestep value Customisation minimum order quantity: Branding and Customisation Our products use the specifications listed below as standard, but we are able to supply tokens in other configurations to meet the needs of your project. Fully customisable colour faceplates, front and back Configurable algorithm Customisation minimum order quantity: This page was last edited on 26 Octoberat The Plus and Net model dongles can be used to jsb or decrypt data you pass to mkcrocosm.
Please note that longer lead times and minimum order quantities apply. Free Technical Support Technical support is offered free of charge as standard – forever! Its early claims to fame included Silicon Disk System in and Microcache the world’s first disk cache for microcomputers in Please include as much information as possible about your problem.
CopyMinder operates differently from all other systems.
Microcosm – The Software Protection Experts
Views Read Edit View history. Protect Data Files If you use our Shell wrapper to protect your application then you can also encrypt data files that are nicrocosm by this application.
CopyMinder is much more subtle, flexible and intelligent so it provides even stronger security without hassle for you or your customers. Communications via our website and email will be answered, although not as promptly as usual. See the table below for further details of the different customisation options available for our OTP tokens.
Retrieved from ” https: