--- Byron A Jeff wrote: > The problem is how to have real protection with as > much transparancy as > possible? But frankly no matter how transparent the > protection process can > be made, it's going to intrude on legit users. It's > easy to blame the > company, but it seems to me it's the users who are > not honest and won't > follow the rules that are the real cause. All the points you make are quite true - it's business, and anyone is free to choose their own path. Their previous protection method utilized a key they provided. Each time the software ran, my name was printed. It doesn't bother me, and when I need to reinstall I have the key so it doesn't matter if the company has gone out of business or I'm not able to access the net. For a developer, incorporating protection into your product can also be a distraction. Or even discussing it, which reminds me, I have better things to do :) Apologies to HiTech, I won't forward any more emails. Cheerful regards, Bob -- http://www.piclist.com PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist