User's Manual

3
Index
1
INTRODUCTION ....................................................................................................................................................8
1.1
O
BJECTIVES OF THE MANUAL
................................................................................................................................8
1.2
T
O WHOM THE MANUAL IS ADDRESSED
.................................................................................................................8
1.3
H
OW TO CONTACT
E
UTRONSEC
.............................................................................................................................8
2
WHY SHOULD I PROTECT SOFTWARE?........................................................................................................ 9
2.1
T
HE MENACE OF PIRACY INCREASES THE NEED FOR PROTECTION
..........................................................................9
2.2
C
OMMERCIAL REASONS FOR PROTECTING SOFTWARE
...........................................................................................9
2.3
P
IRACY
? R
UINOUS TO THE SOFTWARE INDUSTRY
..................................................................................................9
2.4
A
HISTORY OF SOFTWARE PROTECTION SYSTEMS
................................................................................................10
2.5
E
UTRONSEC PAVES THE WAY FOR A NEW SOFTWARE PROTECTION ERA
...............................................................10
3
INTRODUCING SMARTKEY.............................................................................................................................11
3.1
W
HO NEEDS
S
MART
K
EY
? ................................................................................................................................... 12
3.2
W
HAT ARE
S
MART
K
EY
'
S CHARACTERISTICS
?..................................................................................................... 12
3.3
H
OW DOES
S
MART
K
EY WORK
?........................................................................................................................... 13
3.4
H
OW MUCH TIME IS NEEDED TO PROTECT A PROGRAM
? ...................................................................................... 13
3.5
W
HAT IS
S
MART
K
EY
'
S DEGREE OF SECURITY
?.................................................................................................... 13
3.6
P
ROGRAMS FOR
S
MART
K
EY
................................................................................................................................14
3.7
S
MART
K
EY FOR
L
INUX AND
M
AC
OS X............................................................................................................. 14
3.8
G
ETTING
S
TARTED
..............................................................................................................................................14
3.8.1
Installation................................................................................................................................................ 14
4
SMARTKEY MODELS.........................................................................................................................................15
4.1
FX....................................................................................................................................................................... 15
4.2
PR.......................................................................................................................................................................15
4.3
EP....................................................................................................................................................................... 15
4.4
SP & XM............................................................................................................................................................ 16
4.5
NET.................................................................................................................................................................... 16
4.6
A
COMPARISON OF
S
MART
K
EY MODELS
............................................................................................................. 17
4.7
W
HICH
S
MART
K
EY TO USE
? ............................................................................................................................... 17
5
PROTECTING A PROGRAM WITH SMARTKEY ......................................................................................... 19
5.1
M
ANUAL PROTECTION
.........................................................................................................................................19
5.2
A
UTOMATIC PROTECTION
.................................................................................................................................... 19
5.3
S
HOULD
I
USE MANUAL OR AUTOMATIC PROTECTION
? ....................................................................................... 20
6
PROTECTION IN A LOCAL NETWORK.........................................................................................................21
6.1
A
UTOMATIC PROTECTION ON A LOCAL NETWORK
...............................................................................................21
6.2
M
ANUAL PROTECTION ON A LOCAL NETWORK
.................................................................................................... 21
6.3
P
ROTECTING SEVERAL PROGRAMS WITH
S
MART
K
EY
.......................................................................................... 21