Time-based OTP tokens generate codes that are valid only for a certain amount of time eg, 30 or 60 seconds , after which a new code must be generated. You can still place orders online on these days. Our anti-piracy solutions help you ensure that your software licence terms are met with ease. In , it produced CopyMinder software-based copy protection that uses the Internet where possible to provide an ‘intelligent’ copy protection system. All encryption is executed in the dongle itself.
|Date Added:||7 August 2004|
|File Size:||32.96 Mb|
|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|
|Price:||Free* [*Free Regsitration Required]|
If you are an end-user of software that is protected by one of our products, please contact your software vendor. Customisable protection via a web-based interface. Fully customisable colour faceplates, front and back Configurable algorithm Customisation minimum order quantity: More recently, it has expanded microocsm security products by producing SmartSign, a multi-factor authentication system that supports using mobile devices usbb control access to web pages. All of our OTP tokens can be customised with your logo or other artwork.
Please note that longer lead times and minimum order quantities apply. This means it is not possible to emulate the hardware dongle. Dongle hardware is based on smart card technology that is proven to be very secure and is widely used in the security industry.
These support pages are for Microcosm customers. Reverse engineering is the microcozm by which a hacker is able to work out what your code is doing just by analysing the compiled code in the executables that you release. Protect Data Files If microcosmm use our Shell wrapper to protect your application then you can also encrypt data files that are accessed by this application.
The Journal of the Operational Research Society32 If you cannot use the latest version for some reason, make sure that you mention which version you are using when contacting our support team. Please also include any other relevant information in as much microcoem as you can.
Please include as much information as possible about your problem.
If you cannot find a solution to your problem in the knowledge base, use the knowledge base contact form to send a message to our support team. Computer companies established in Computer companies of the United Kingdom Computer hardware companies establishments in England.
Strong Encryption Communication between your software and the dongle uses very strong encryption techniques: We are not able to support you directly. Allows legitimate users to move a protected program to a different computer. Anti-hacking Techniques We offer many techniques to improve the security microcoam your code and our libraries.
Previous software-based copy protection systems were much less flexible: Contact Us About Customisation Options. On-dongle Encryption The Plus and Net model dongles can be used to encrypt or decrypt data you pass to them. CopyMinder operates differently from all other systems. We offer many techniques to improve the security between your code and our libraries.
Dinkey Pro/FD Dongles
Communications via our website and email will be answered, although not as promptly as usual. This is lacking in many dongle systems but it is often the weakest part that hackers exploit. By careful monitoring, it is able to decide which customers to trust and which to be wary of. Our software ubs solutions prevent reverse engineering statically through strong encryption of your code, and at usn using our Advanced Runtime Protection system.
Microcosm Ltd – Wikipedia
Our anti-piracy solutions help you ensure that your software licence terms are met with ease. All encryption is executed in the dongle itself. Competitive Pricing Our prices are some of the lowest in the industry. Please note that you will not be able to place orders or receive technical support nicrocosm phone on the following dates: