Answer the question
In order to leave comments, you need to log in
Answer the question
In order to leave comments, you need to log in
Here are some questions for you.
Changed the hard drive - is it the same computer?
Rearranged the axis - is it the same computer?
Sold it to another user - the same computer?
Changed everything but the user is the same - what to do?
What is a computer for your program?
Otherwise, you can rely on the IDs of a hard, motherboard, processor ... There is such a thing as a fingerprint
Wagon, only no one will tell you the specifics (because, as a rule, the mechanism for generating such an id is part of the software licensing system and is kept secret).
So get ready to listen to general phrases about MAC addresses, xored to the serial numbers of disks, motherboard and processor.
The easiest way is to generate a UUID on the machine and save it somewhere. This is if you are not engaged in cracker protection, but simply want to identify the workplace. The advantage is that this ID will not be corrupted if the user allowed himself to take and change the hard drive.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question