/build/static/layout/Breadcrumb_cap_w.png

Package theft

What's the best practice regarding package theft?

I have been deploying my applications (with embbeded serials numbers ) from a hidden share with read permission to everyone. Everything was working fine until some people started stealing packages to install at home / on other computers.

So, how do you protect your package in a medium size business?

I've read about Custom Action testing if userdomain = yourdomain. I like that idea, but it's far from being bulletproof.

I've also been told not to embed serials in the package. Does that mean that if I deploy to 1,000 PC, an admin has to go enter the serial on 1,000 PC?

Does anyone has any insight on that problem?

Thanks

0 Comments   [ + ] Show comments

Answers (7)

Posted by: twaddle 17 years ago
Yellow Belt
1
Why not just remove browse rights from the share?
Posted by: AB 17 years ago
Purple Belt
0
Tough question...
A few pointers -
Acceptable Use Policy - "if you're caught stealing software then..."
If you plan to remove licence info from your MSI's it depends on the method employed by the Software Manufacturer as to how you might still deploy silently.
A common solution to licence key information that is in plain text in the registry would be to replace the string with a Public Property (e.g. [SERIALKEY] ) and then set this at the command line in your deployment solution.
But this is not a one size fits all fix...
Good luck.
Regards,
Al
Posted by: AngelD 17 years ago
Red Belt
0
A company must be able to trust the employees and if they steal or borrow without permission that would break the company policy if any and should be informed to their closest chief.

At company level deploying packages with MSI integrated or transformed serial and license info would normally be done default, so don't see why you shouldn't. It is not your call as an employee to decide how to prevent theft!
Posted by: hambone 17 years ago
Senior Yellow Belt
0
would specifying the serials in the mst, and then specifying that the msts are secure transforms work in your environment ?
Posted by: AngelD 17 years ago
Red Belt
0
I don't think the problem lies in securing the cached mst but the source of the installation including any transform with defined serialnumber property. As the user will need read permission on the source to be able to repair missing/corrupted files you will not manage to go another way.
Posted by: lkeneston 17 years ago
Senior Yellow Belt
0
Depends on how you are pushing the apps too, we use NS that copies the files as the ns user, remove the ntfs permissions from anyone except the user/system account pushing the files.
Posted by: monster 17 years ago
Senior Yellow Belt
0
is there a way to encrypt this serials??

just asking.. ^_^
Rating comments in this legacy AppDeploy message board thread won't reorder them,
so that the conversation will remain readable.
 
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ