Usability for Nerds/Software/Copy Protection
Producers of commercial software have a very reasonable wish to protect their product against unauthorized copying. Many different methods have been invented, but unfortunately all these methods have usability problems as well as problems of distinguishing between legitimate and unauthorized copying. Some methods are listed below:
Original disk is tampered with. A compact disc supplied as part of the software product is tampered with in a way that is not easily copied, e.g. a specific part of the data layer is removed. Problems:
- The user has to insert the disk every time the product is used.
- The user cannot make a legitimate backup copy.
- This method requires direct hardware access or a special driver that may be incompatible with future hardware or operating systems.
- Does not work in network systems, unless one dedicated machine has a special driver or other software which would allow remote identification via network.
Hidden information is stored on the computer. Problems:
- This information may be lost when the user updates hardware or operating system.
- The user may have more than one computer.
- May be incompatible with future operating systems.
A fingerprint of the computer hardware is stored. Problems:
- Lost when the hardware is updated or repaired.
- The user may have more than one computer.
- May be incompatible with future operating systems.
A dongle. A dongle is a little piece of hardware that has to be connected to the computer. Problems:
- Requires direct hardware access or a special driver that may be incompatible with future hardware or operating systems.
- Must be moved all the time if the user has more than one computer.
- The dongle may be stolen, misplaced or damaged.
- Difficult to protect against theft.
- May be incompatible with other dongles or other hardware.
- The number of dongles that can be attached to a computer is limited.
- May not work in network systems.
Printed manual. A manual is more difficult to copy than software. Problems:
- Users prefer online help.
Registration. The users fear that they may receive spam mail.
Serial number. The user has to enter a serial number when the program is installed.
Hotline. Only legitimate users have access to support and service from a hotline.
License server. A serial number or other key to access is stored on a central server. Problems:
- Only useful for organizations with many users.
- Depends on reliable network access.
Free updates. Legitimate users get free updates and bug fixes.
Most copy protection schemes contain combinations of these methods. However, most software producers are now using a serial number only or refraining from using any copy protection at all because of the severe usability problems and technical problems they entail. Shareware and freeware products are gaining popularity for similar reasons.