<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: ALernin</title>
    <description>The latest articles on DEV Community by ALernin (@a_lernin).</description>
    <link>https://dev.to/a_lernin</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F654459%2Ff2eda856-361d-4932-a210-e8522f1972d9.jpeg</url>
      <title>DEV Community: ALernin</title>
      <link>https://dev.to/a_lernin</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/a_lernin"/>
    <language>en</language>
    <item>
      <title>How to copy a software protection dongle</title>
      <dc:creator>ALernin</dc:creator>
      <pubDate>Mon, 12 Jul 2021 19:14:51 +0000</pubDate>
      <link>https://dev.to/a_lernin/how-to-copy-a-software-protection-dongle-3kc6</link>
      <guid>https://dev.to/a_lernin/how-to-copy-a-software-protection-dongle-3kc6</guid>
      <description>&lt;p&gt;The most efficient method of sharing a USB dongle over the Internet or a local network is with the dedicated functionality of the dongle copying software solution &lt;strong&gt;Donglify.&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Donglify&lt;/strong&gt; is a sophisticated software application that enables users to create a virtual copy of a USB license dongle so it can be accessed remotely over a network. All network connections are encrypted so data transmission is fully secured. The app even lets you share a single physical USB dongle simultaneously with multiple remote users.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The instructions provided below describe the three different ways of using protected software on a network by copying USB dongle keys.&lt;/em&gt; The software runs on the Windows platform and can be used in the following ways. &lt;/p&gt;

&lt;h3&gt;
  
  
  How to copy a USB dongle key
&lt;/h3&gt;

&lt;p&gt;These steps enable a user to remotely connect to a computer with a physical connection to the required security key. Sharing the device across the network lets you use a virtual copy of a USB dongle to run the protected software resource from any remote location.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;a href="https://account.donglify.net/user/registration/"&gt;&lt;strong&gt;Create&lt;/strong&gt;&lt;/a&gt; a Donglify account on the software’s website. After you create your account, &lt;a href="https://www.donglify.net/download/"&gt;&lt;strong&gt;download&lt;/strong&gt;&lt;/a&gt; and install the software on the machine with the attached dongle (the server) and the computer that will access the USB dongle copy remotely (the client).&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--XVxZU2KQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://s3.amazonaws.com/cdn.freshdesk.com/data/helpdesk/attachments/production/2043057326389/original/k66P7Aly8CSVhJG06KkWr-9-L6PrjTQ09Q.png%3F1571748395" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--XVxZU2KQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://s3.amazonaws.com/cdn.freshdesk.com/data/helpdesk/attachments/production/2043057326389/original/k66P7Aly8CSVhJG06KkWr-9-L6PrjTQ09Q.png%3F1571748395" alt="Create account"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Start Donglify on the two machines and log into the software using identical credentials.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--JvfZq3Gz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://s3.amazonaws.com/cdn.freshdesk.com/data/helpdesk/attachments/production/2043097987819/original/oUFJVNCZxDSphnt5fphRnVJUJLmVjx6_cA.png%3F1584962237" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--JvfZq3Gz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://s3.amazonaws.com/cdn.freshdesk.com/data/helpdesk/attachments/production/2043097987819/original/oUFJVNCZxDSphnt5fphRnVJUJLmVjx6_cA.png%3F1584962237" alt="Start Donglify"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Click "+" on the server to open a window from which you can view the USB dongles that are available to be shared. Select the device you wish to use and click &lt;em&gt;“Share”&lt;/em&gt;. USB copy protection dongles that display a &lt;em&gt;“Multi-connect”&lt;/em&gt; icon can be shared simultaneously with multiple users.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--hMkYfbgB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://s3.amazonaws.com/cdn.freshdesk.com/data/helpdesk/attachments/production/2043066592811/original/gj6KO4A6u05EjoCtBF6of_nTvJ4gWDtnRQ.png%3F1574774798" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--hMkYfbgB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://s3.amazonaws.com/cdn.freshdesk.com/data/helpdesk/attachments/production/2043066592811/original/gj6KO4A6u05EjoCtBF6of_nTvJ4gWDtnRQ.png%3F1574774798" alt="Select a dongle"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Open Donglify on a client computer and locate the dongle shared by the server. After clicking &lt;em&gt;“Connect”&lt;/em&gt;, the dongle key copy will be recognized by your system and give you the same level of functionality as if you were physically connected to the device. &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--yR2Sg_ji--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://s3.amazonaws.com/cdn.freshdesk.com/data/helpdesk/attachments/production/2043066594714/original/TGCLXdU4qbOvmhw2-gPBhSaBvTe9Xksdrg.png%3F1574775104" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--yR2Sg_ji--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://s3.amazonaws.com/cdn.freshdesk.com/data/helpdesk/attachments/production/2043066594714/original/TGCLXdU4qbOvmhw2-gPBhSaBvTe9Xksdrg.png%3F1574775104" alt="Connect to the USB key"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Click &lt;em&gt;“Disconnect”&lt;/em&gt; when you are finished using the dongle and the connection will be terminated.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/FqW7ZWmRPXs"&gt;&lt;strong&gt;Here is a video guide&lt;/strong&gt;&lt;/a&gt; &lt;/p&gt;

&lt;h3&gt;
  
  
  Using a login token to share a USB dongle copy
&lt;/h3&gt;

&lt;p&gt;Creating a token provides a secure digital key that can be shared with other users. Sharing a token with a colleague lets them use Donglify’s functionality without accessing your Donglify account. This keeps your personal information safe and gives you control over who can access a specific copy of a dongle key. If you delete a token, the individual using it is immediately logged out of the Donglify account.&lt;/p&gt;

&lt;p&gt;Create a token using the following simple steps.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Log into your online Donglify account.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Open the &lt;em&gt;“Tokens”&lt;/em&gt; tab and click on &lt;em&gt;“Create Token”&lt;/em&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Choose a name for the token and click &lt;em&gt;“Create”&lt;/em&gt;. It will immediately be listed and available to be shared.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Copy the token and share it with any users using a text message, email, or any other method.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If you need to delete the token, click the red “X” next to its creation date.&lt;/p&gt;

&lt;p&gt;To use Donglify using a token, use these steps;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Download and install Donglify on the computer that will access the dongle remotely.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Start the application, provide the token, and log into the account.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Note: Token can be used simultaneously on multiple machines.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/2bHcqDjI4c4"&gt;&lt;strong&gt;Watch the video guide to learn more about this process.&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Sending invitations to other Donglify account owners
&lt;/h3&gt;

&lt;p&gt;You can invite users to remotely access a security key. This enables you to keep your account details private while letting others access a security key remotely. Follow these steps to send an invitation to use a security key:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Physically attach the dongle to your computer. Launch Donglify and click “+” to view the devices that can be shared. Locate the key you want to share, check its radio button, and click &lt;em&gt;“Share”.&lt;/em&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Send an invitation directly to another user by typing the email address associated with another valid Donglify account and clicking the “+” icon. Donglify displays the email address and you will receive a &lt;em&gt;“Connected”&lt;/em&gt; message when your invitation has been accepted.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;When you want to end the remote session, click &lt;em&gt;“More”&lt;/em&gt; next to the user’s email address and choose &lt;em&gt;“Disconnect”.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/EEOXbb19hhM"&gt;&lt;strong&gt;Check out the video for more information&lt;/strong&gt;&lt;/a&gt; &lt;/p&gt;

&lt;h2&gt;
  
  
  Who gets the most out of Donglify
&lt;/h2&gt;

&lt;p&gt;Donglify is useful in a wide variety of situations and to a range of IT professionals.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Licensed software developers&lt;/strong&gt; can distribute a product trial to many customers without sending them hardware dongles. This saves time and money and lets the developer control when the dongle is removed from the Internet, shutting down access to the software.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Large or medium business&lt;/strong&gt; owners who have remote technical staffs and employees can benefit from maintaining their hardware dongles in a centralized location and sharing them remotely as they are needed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Service providers&lt;/strong&gt; who need to perform software maintenance for their customers can benefit from the remote access to security keys provided by Donglify and can provide clients with more customized service.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Owners of licensed software products protected with a USB security key&lt;/strong&gt; benefit by having the ability to use their licensed software without needing to carry around an extra piece of hardware.&lt;/p&gt;

&lt;p&gt;As you can see, &lt;strong&gt;copying a dongle can be important in a variety of situations.&lt;/strong&gt; It greatly expands the utility of protected software by eliminating the need to have the security key physically present when using an application. With the help of Donglify, using protected software requiring security keys remotely becomes a simple process.&lt;/p&gt;

</description>
      <category>dongle</category>
      <category>security</category>
      <category>usbkey</category>
    </item>
    <item>
      <title>Copy USB dongles with just a couple of clicks!</title>
      <dc:creator>ALernin</dc:creator>
      <pubDate>Tue, 06 Jul 2021 21:25:15 +0000</pubDate>
      <link>https://dev.to/a_lernin/copy-usb-dongles-with-just-a-couple-of-clicks-20lm</link>
      <guid>https://dev.to/a_lernin/copy-usb-dongles-with-just-a-couple-of-clicks-20lm</guid>
      <description>&lt;p&gt;&lt;em&gt;Users often need the ability to remotely connect to a licensed copy protection USB dongle&lt;/em&gt;. They may need to use the functionality of the protected software but be unable to physically connect to the dongle. If you are in this situation, you may be asking yourself if it’s possible to copy a USB security dongle. &lt;/p&gt;

&lt;p&gt;The answer to that question is &lt;strong&gt;"Yes"&lt;/strong&gt; if you are using a USB dongle copying solution like Donglify.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is Donglify?
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.donglify.net/"&gt;&lt;strong&gt;Donglify&lt;/strong&gt; &lt;/a&gt;is a software solution that enables users to virtually copy a USB dongle key which eliminates the need to physically connect to the device. Donglify lets you make a copy of a USB dongle so it can be shared with any network-connected machine. &lt;/p&gt;

&lt;p&gt;Let’s investigate the features of this dongle copying solution.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;The software offers the ability to connect to multiple machines simultaneously when using a copy protection dongle. You can use the software to access a dongle from either a single computer or multiple machines at the same time, making it a flexible solution for diverse technical teams.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Using a virtual dongle copy helps protect the original security key from being lost or damaged. It can be safely connected to one computer and not be subjected to the wear and tear associated with physically sharing it between machines.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Donglify makes it easy to access a copy protection dongle from within a virtual environment. If your virtual machine does not recognize the physical dongle, you can create a virtual security key with this dongle copying software solution. You just need to install Donglify on both the host and guest operating systems.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Additional benefits provided by Donglify
&lt;/h3&gt;

&lt;p&gt;The benefits of using Donglify for copying USB dongle keys include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;High-level security:&lt;/strong&gt; 2048-bit SSL encryption keeps your virtual USB copy protection dongles safe when sharing them over a network.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Time and costs savings:&lt;/strong&gt; Productivity gains are enjoyed by not having to physically swap dongles between machines. Losing or damaging dongles is minimized by reducing the number of times the devices are physically handled.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Access control:&lt;/strong&gt; Granular control over who can access a USB dongle key is provided by Donglify.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Easy set-up:&lt;/strong&gt; Installation and configuration take minimal time so you can get working quickly. There is no need for any extra software or hardware to share a security dongle copy over the network.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Donglify offers a multi-connect feature for the following models of security keys:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--tajvvo5P--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://www.donglify.net/images/upload/products/donglify/main/devices.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--tajvvo5P--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://www.donglify.net/images/upload/products/donglify/main/devices.png" alt="dongles"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>dongle</category>
      <category>security</category>
      <category>usbkey</category>
    </item>
    <item>
      <title>A Brief History of Dongles &amp; Copy Protection</title>
      <dc:creator>ALernin</dc:creator>
      <pubDate>Thu, 01 Jul 2021 09:56:30 +0000</pubDate>
      <link>https://dev.to/a_lernin/a-brief-history-of-dongles-copy-protection-2m9k</link>
      <guid>https://dev.to/a_lernin/a-brief-history-of-dongles-copy-protection-2m9k</guid>
      <description>&lt;p&gt;Two general techniques can be used to provide copy protection for a software application. Programs can be protected digitally using software or physically with a copy protection dongle. &lt;/p&gt;

&lt;p&gt;While using software may seem like a simpler method, keeping your software safe from piracy can be difficult. The software used to protect your program can be hacked, rendering it useless as a defensive measure.&lt;/p&gt;

&lt;p&gt;Tenacious hackers can subvert the detection and encryption mechanisms put in place to keep them away from protected software resources. Using a physical form of defense like a USB copy protection dongle provides an additional level of security that must be breached to gain access to the projected resource. It’s not a perfect method but is widely used by software developers to protect their work.&lt;/p&gt;

&lt;h2&gt;
  
  
  Providing physical protection
&lt;/h2&gt;

&lt;p&gt;A physical security solution was introduced in the 1980s in the form of dongle copy protection. Dongles are hardware devices that connect to a computer’s USB or I/O port. They are difficult to duplicate or crack and provide verification that a software product is valid for use.&lt;/p&gt;

&lt;p&gt;Dongles are commonly constructed with the following three distinct components.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;A custom processor that provides the dongle’s intelligence and functionality. The license credentials required to activate the protected software are stored here. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;An interface to connect the device to a computer using its USB, serial, or parallel port. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;A device driver to facilitate installation and communication between the dongle and the host computer. &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Physically, a USB dongle is very much like a USB flash drive with the addition of a dedicated processor that gives it its necessary functionality. &lt;/p&gt;

&lt;p&gt;A robust method of using a dongle with a software application is to have the program authenticate itself multiple times by accessing the device. Poorly implemented protection schemes may only query the dongle when the application is first started, resulting in a single potential source of failure. It is much easier for hackers to manipulate the code to gain unauthorized access to the protected software when only one check is made. A better solution makes multiple checks at various points in the program, not only at startup.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It can often be useful to copy a USB dongle so it can be used on multiple computers simultaneously&lt;/strong&gt;. Teams may have unlimited access to a software product but only have a limited number of physical dongles available. By creating a virtual copy of a USB security dongle, a team of technicians can use the software at the same time. &lt;/p&gt;

&lt;p&gt;Virtual copies of USB copy protection dongles also enable remote users to gain authorization to the protected resource. This can greatly improve productivity and make the protected software more valuable to an organization. With the increased focus on remote work these days, this may be the most important reason for copying a dongle key.&lt;/p&gt;

</description>
      <category>usbdongle</category>
      <category>security</category>
      <category>licensekey</category>
    </item>
  </channel>
</rss>
