Can't prevent access after chargeback or refund.---General Password Rosetta Stone Store Protection: Simply requiring a predetermined password to install or register the file.- Pros: Simple for customer or end user.- Cons: File and password can be passed around, copied, distributed and/or sold without authorization from the owner. Can't prevent access after chargeback or refund.---PC-Unique Password Protection: Generates a unique password based on the user's computer.- Pros: Can't pass around the file since it is basically locked to one machine.- Cons: Requires an extra step for registration; Customer cannot move file to another PC; If their PC crashes they will need another unique password; Can't prevent access after chargeback or refund.---Delayed Registration: This requires a user to enter a second registration number a specific number of days after they first register the file. For example, after 90 days of use, they must enter a new registration number that they receive from you.- Pros: It allows control over chargeback and refunds. The file will be disabled after the second registration period because you will not provide the second key to reactivate the file.- Cons: Requires an extra step for registration; A user can request refund or chargeback AFTER the second registration period.---Post-Purchase Activation: Requires activation by online server. After user purchases they are Rosetta Stone English entered into an online customer database. They then install and register the file by entering their name/email or some data. The server confirms the purchase and then activates the software.This method is become more and more common with big name software.- Pros: Can prevent unauthorized distribution of file since the file must be activated by the online server.- Cons: User must be online to register file; Can't move file to a different PC; Can't prevent access after chargeback or refund.---Active Password Protection: Each time user attempts to access file it checks an online server to confirm the usage rights and permissions for the user.- Pros: Prevents distribution or copying of file; File Owner can revoke access to file after chargeback or refund; Access permissions can be changed and applied in real-time.- Cons: must be connected to the net to register and/or access file; User may not be able to move file to another PC; User registration can be somewhat cumbersome and difficult for some customers.--- hen looking to protect your digital information any protection system or service that you consider should have a few basic security bases covered.For software and executables:1. When opening the file, a protection system must not save or copy an unprotected version of the file to Rosetta Stone Chinese the windows TEMP directory or anywhere on your PC for that matter.2. The system should automatically prevent password sharing and access by unauthorized parties.



0 评论:
发表评论