must admit that I'm new to these kind of applications; as attractive as they nevertheless seem.
You keep mentioning how this can help beat the hackers and crackers etc. but as I see it any application using this system of yours will require a routine (presumably the dll) to check your server for valid keys etc. If none is found then the application will not run fully registered etc.
What's to stop the hackers and crackers from simply bypassing the code used to check the server etc?
Sorry if I'm being a little dense here
