The Plus and Net model dongles can be used to encrypt or decrypt data you pass to them. This page was last edited on 26 October , at Computer companies established in Computer companies of the United Kingdom Computer hardware companies establishments in England. Many Languages Supported We supply full sample code and detailed programming notes in a large number of programming languages. Software protection by dongles or by intelligent monitoring using the internet helps protect your revenue stream and gives you the piece of mind that the only people using your software are those who have paid to do so.
|Date Added:||9 November 2012|
|File Size:||15.42 Mb|
|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|
|Price:||Free* [*Free Regsitration Required]|
For presales and general enquiries, please use our enquiry form. Event-based OTP tokens generate new codes at the press of the button and the code is valid until it is used by the application. Protect Data Files If you use our Shell wrapper to protect your application then you can also encrypt data files that are accessed by this application.
Driverless Our dongles use drivers built-in to the operating system so there is no need to hsb drivers. Buy c Mini OTP tokens. By careful monitoring of the usage of each installation of your software, it achieves what has up to now been thought impossible: These support pages are for Microcosm customers.
Branding and Customisation Our products use the specifications listed below as standard, but we are able to supply tokens in other configurations to meet the needs of your project.
This page was last edited on 26 Octoberat Free fast-response technical support via email or phone. Its early claims to fame included Silicon Disk System in and Microcache the world’s first disk cache for microcomputers in Our anti-piracy solutions help you ensure that your software licence terms are met with ease. Software-based protection and licensing system with intelligent monitoring.
Reverse engineering is the process by which a hacker is able to work out what your code is doing just by analysing the compiled code in the executables that you release.
From Wikipedia, the free encyclopedia. If you are an end-user of software that is protected by one of our products, please contact your software vendor. Reverse engineering of native binaries is harder but is still achievable by skilled hackers with the right tools and experience.
If you cannot use the latest version for some reason, make sure that you mention which version you are using when contacting our support team. To install the latest Dinkey drivers, follow the instructions for your platform below.
Competitive Pricing Our prices are mixrocosm of the lowest in the industry. Free Technical Support Technical support is offered free of charge as standard – forever!
Microcosm – The Software Protection Experts
If you use our Shell wrapper to protect your application then you can also encrypt data files that are accessed by this application. CopyMinder is effectively keeping an eye on each installation of your uab.
Although internet access is not necessary for CopyMinder to provide protection, it does enable it to be much more flexible. Microcosm Ltd is a UK company established in Extremely Secure Dongle hardware is based on ksb card technology that is proven to be very secure and is widely used in the security industry. Dinkey Pro and Dinkey FD dongles do not require drivers. This gives the advantage of only releasing one set of compiled binaries for all platforms but the downside is that your application can be reverse engineered back to readable source code very easily!
Key Features Ultra-secure copy protection.
We believe Dinkey Pro and FD dongles are the best in the industry and here is why: It provides a high level of security with the minimum amount of fuss and a level of flexibility that is second to none. Previous software-based copy protection systems were much less flexible: If there were any problems, the software just stopped: Languages such as CVB.
Please note that you will not be able to place orders or receive technical support by phone on the following dates:.