- Page 2 and 3:
Copyright © 2009, SafeNet, Inc. Al
- Page 4 and 5:
Certifications European Community D
- Page 6 and 7:
FCC Compliance FC Sentinel Hardware
- Page 8 and 9:
Contents Sentinel Keys Server .....
- Page 10 and 11:
Contents Sending Group Files to Dis
- Page 12 and 13:
Contents xii Sentinel Hardware Keys
- Page 14 and 15:
Conventions Used in This Guide You
- Page 16 and 17:
Technical Support Technical Support
- Page 18 and 19:
We Welcome Your Comments Export Con
- Page 21 and 22:
Chapter 1 Introduction In this chap
- Page 23 and 24:
Sentinel Keys Protect Against Softw
- Page 25 and 26:
Sentinel Keys Offer Sophisticated P
- Page 27 and 28:
Sentinel Keys Offer Sophisticated P
- Page 29 and 30:
The Business Layer API Functions Se
- Page 31 and 32:
Programming Utility Sentinel Keys T
- Page 33 and 34:
Frequently Asked Questions Contents
- Page 35 and 36:
Frequently Asked Questions Contents
- Page 37 and 38:
Chapter 2 Sentinel Hardware Keys SD
- Page 39 and 40:
Compiler Interfaces Sentinel Keys L
- Page 41 and 42:
Distributor Key Distributor Key Con
- Page 43 and 44:
Sentinel Keys Contents Glossary Ind
- Page 45 and 46:
Sentinel Keys Contents Glossary Ind
- Page 47 and 48:
Sentinel Keys Server Contents Gloss
- Page 49 and 50:
Sentinel System Driver Sentinel Sys
- Page 51 and 52:
Backward-compatibility Information
- Page 53 and 54:
Command-Line CodeCover Utility Cont
- Page 55 and 56:
Key Programming APIs Contents Gloss
- Page 57 and 58:
GCC a For Linux Compiler/Environmen
- Page 59 and 60:
Sentinel Keys License Monitor Conte
- Page 61 and 62:
Sentinel Protection Installer Conte
- Page 63 and 64:
Secure Update API Frequently Asked
- Page 65 and 66:
authentication.) Frequently Asked Q
- Page 67 and 68:
Frequently Asked Questions Contents
- Page 69 and 70:
Chapter 3 Planning Application Prot
- Page 71 and 72:
About Features, Templates, and Grou
- Page 73 and 74:
About Features, Templates, and Grou
- Page 75 and 76:
About Features, Templates, and Grou
- Page 77 and 78:
About Features, Templates, and Grou
- Page 79 and 80:
Planning Application Protection and
- Page 81 and 82:
Planning Application Protection and
- Page 83 and 84:
Enabling License Sharing Planning A
- Page 85 and 86:
Planning Application Protection and
- Page 87 and 88:
Planning Application Protection and
- Page 89 and 90:
Frequently Asked Questions Contents
- Page 91:
Part 2 Designing and Implementing P
- Page 94 and 95:
Chapter 4 - Protecting Applications
- Page 96 and 97:
Chapter 4 - Protecting Applications
- Page 98 and 99:
Chapter 4 - Protecting Applications
- Page 100 and 101:
Chapter 4 - Protecting Applications
- Page 102 and 103:
Chapter 4 - Protecting Applications
- Page 104 and 105:
Chapter 4 - Protecting Applications
- Page 106 and 107:
Chapter 4 - Protecting Applications
- Page 108 and 109:
Chapter 4 - Protecting Applications
- Page 110 and 111:
Chapter 4 - Protecting Applications
- Page 112 and 113:
Chapter 4 - Protecting Applications
- Page 114 and 115:
Chapter 4 - Protecting Applications
- Page 116 and 117:
Chapter 4 - Protecting Applications
- Page 118 and 119:
Chapter 4 - Protecting Applications
- Page 120 and 121:
Chapter 4 - Protecting Applications
- Page 122 and 123:
Chapter 4 - Protecting Applications
- Page 124 and 125:
Chapter 4 - Protecting Applications
- Page 126 and 127:
Chapter 4 - Protecting Applications
- Page 128 and 129:
Chapter 5 - Protecting Applications
- Page 130 and 131:
Chapter 5 - Protecting Applications
- Page 132 and 133:
Chapter 5 - Protecting Applications
- Page 134 and 135:
Chapter 5 - Protecting Applications
- Page 136 and 137:
Chapter 5 - Protecting Applications
- Page 138 and 139:
Chapter 5 - Protecting Applications
- Page 140 and 141:
Chapter 5 - Protecting Applications
- Page 142 and 143:
Chapter 5 - Protecting Applications
- Page 144 and 145:
Chapter 5 - Protecting Applications
- Page 146 and 147:
Chapter 5 - Protecting Applications
- Page 148 and 149:
Chapter 5 - Protecting Applications
- Page 150 and 151:
Chapter 5 - Protecting Applications
- Page 152 and 153:
Chapter 5 - Protecting Applications
- Page 154 and 155: Chapter 5 - Protecting Applications
- Page 156 and 157: Chapter 6 - Secure Remote Updates C
- Page 158 and 159: Chapter 6 - Secure Remote Updates C
- Page 160 and 161: Chapter 6 - Secure Remote Updates C
- Page 162 and 163: Chapter 6 - Secure Remote Updates C
- Page 164 and 165: Chapter 6 - Secure Remote Updates C
- Page 166 and 167: Chapter 6 - Secure Remote Updates C
- Page 168 and 169: Chapter 6 - Secure Remote Updates C
- Page 170 and 171: Chapter 6 - Secure Remote Updates C
- Page 172 and 173: Chapter 6 - Secure Remote Updates C
- Page 174 and 175: Chapter 6 - Secure Remote Updates C
- Page 176 and 177: Chapter 6 - Secure Remote Updates C
- Page 178 and 179: Chapter 6 - Secure Remote Updates C
- Page 180 and 181: Chapter 6 - Secure Remote Updates C
- Page 182 and 183: Chapter 6 - Secure Remote Updates C
- Page 184 and 185: Chapter 6 - Secure Remote Updates C
- Page 186 and 187: Chapter 7 - Implementing Secure Lic
- Page 188 and 189: Chapter 7 - Implementing Secure Lic
- Page 190 and 191: Chapter 7 - Implementing Secure Lic
- Page 192 and 193: Chapter 7 - Implementing Secure Lic
- Page 194 and 195: Chapter 7 - Implementing Secure Lic
- Page 196 and 197: Chapter 7 - Implementing Secure Lic
- Page 198 and 199: Chapter 7 - Implementing Secure Lic
- Page 200 and 201: Chapter 7 - Implementing Secure Lic
- Page 202 and 203: Chapter 7 - Implementing Secure Lic
- Page 206 and 207: Chapter 8 - License Grouping Conten
- Page 208 and 209: Chapter 8 - License Grouping Conten
- Page 210 and 211: Chapter 8 - License Grouping Conten
- Page 212 and 213: Chapter 8 - License Grouping Conten
- Page 214 and 215: Chapter 8 - License Grouping Conten
- Page 216 and 217: Chapter 8 - License Grouping Conten
- Page 218 and 219: Chapter 8 - License Grouping Conten
- Page 220 and 221: Chapter 8 - License Grouping Conten
- Page 222 and 223: Chapter 9 - Programming Sentinel Ha
- Page 224 and 225: Chapter 9 - Programming Sentinel Ha
- Page 226 and 227: Chapter 9 - Programming Sentinel Ha
- Page 228 and 229: Chapter 9 - Programming Sentinel Ha
- Page 230 and 231: Chapter 9 - Programming Sentinel Ha
- Page 232 and 233: Chapter 9 - Programming Sentinel Ha
- Page 234 and 235: Chapter 9 - Programming Sentinel Ha
- Page 236 and 237: Chapter 9 - Programming Sentinel Ha
- Page 238 and 239: Chapter 9 - Programming Sentinel Ha
- Page 241 and 242: Chapter 10 Redistributables for Cus
- Page 243 and 244: SDNPro.dll, and SDNPro64.dll (only
- Page 245 and 246: Deploying (Client) Configuration Fi
- Page 247 and 248: Where to Deploy Deploying Secure Up
- Page 249 and 250: Error Code (Decimal) For API-protec
- Page 251 and 252: SPP_UPDATE_WIZARD_INFO Structure De
- Page 253 and 254: Deploying Sentinel Data Protection
- Page 255 and 256:
Option Description Deploying Stand-
- Page 257 and 258:
For Windows Deploying System Admini
- Page 259 and 260:
Frequently Asked Questions Contents
- Page 261 and 262:
Appendix A Troubleshooting This app
- Page 263 and 264:
Problems and Solutions Contents Glo
- Page 265 and 266:
Problems and Solutions Contents Glo
- Page 267 and 268:
Solution: Problems and Solutions Co
- Page 269 and 270:
Problems and Solutions Contents Glo
- Page 271 and 272:
Problem: The application receives a
- Page 273 and 274:
Solution: Problems and Solutions Co
- Page 275 and 276:
Appendix B Glossary A Access Mode A
- Page 277 and 278:
C Business Layer API Contents Glos
- Page 279 and 280:
D Decryption Contents Glossary Ind
- Page 281 and 282:
Execution Count Contents Glossary I
- Page 283 and 284:
G H Group Contents Glossary Index
- Page 285 and 286:
License Addition Code Contents Glos
- Page 287 and 288:
P Q Contents Glossary Index Troubl
- Page 289 and 290:
Secure Communication Tunnel Content
- Page 291 and 292:
T Contents Glossary Index Troubles
- Page 293 and 294:
W Sentinel Hardware Keys Developer
- Page 295 and 296:
Appendix C Sentinel Keys Hardware S
- Page 297 and 298:
Appendix D Migration from SuperPro
- Page 299 and 300:
Stage 2 - Design New Protection Str
- Page 301 and 302:
Index Symbols .req 149 .upw 149, 16
- Page 303 and 304:
P personal folder 269 piracy attack