- Page 2 and 3: Copyright © 2009, SafeNet, Inc. Al
- Page 4 and 5: Certifications European Community D
- Page 6 and 7: FCC Compliance FC Sentinel Hardware
- Page 8 and 9: Contents Sentinel Keys Server .....
- Page 10 and 11: Contents Sending Group Files to Dis
- Page 12 and 13: Contents xii Sentinel Hardware Keys
- Page 14 and 15: Conventions Used in This Guide You
- Page 16 and 17: Technical Support Technical Support
- Page 18 and 19: We Welcome Your Comments Export Con
- Page 22 and 23: Chapter 1 - Introduction Contents G
- Page 24 and 25: Chapter 1 - Introduction Contents G
- Page 26 and 27: Chapter 1 - Introduction Contents G
- Page 28 and 29: Chapter 1 - Introduction Contents G
- Page 30 and 31: Chapter 1 - Introduction Contents G
- Page 32 and 33: Chapter 1 - Introduction Contents G
- Page 34 and 35: Chapter 1 - Introduction Contents G
- Page 36 and 37: Chapter 1 - Introduction Contents G
- Page 38 and 39: Chapter 2 - Sentinel Hardware Keys
- Page 40 and 41: Chapter 2 - Sentinel Hardware Keys
- Page 42 and 43: Chapter 2 - Sentinel Hardware Keys
- Page 44 and 45: Chapter 2 - Sentinel Hardware Keys
- Page 46 and 47: Chapter 2 - Sentinel Hardware Keys
- Page 48 and 49: Chapter 2 - Sentinel Hardware Keys
- Page 50 and 51: Chapter 2 - Sentinel Hardware Keys
- Page 52 and 53: Chapter 2 - Sentinel Hardware Keys
- Page 54 and 55: Chapter 2 - Sentinel Hardware Keys
- Page 56 and 57: Chapter 2 - Sentinel Hardware Keys
- Page 58 and 59: Chapter 2 - Sentinel Hardware Keys
- Page 60 and 61: Chapter 2 - Sentinel Hardware Keys
- Page 62 and 63: Chapter 2 - Sentinel Hardware Keys
- Page 64 and 65: Chapter 2 - Sentinel Hardware Keys
- Page 66 and 67: Chapter 2 - Sentinel Hardware Keys
- Page 68 and 69: Chapter 2 - Sentinel Hardware Keys
- Page 70 and 71:
Chapter 3 - Planning Application Pr
- Page 72 and 73:
Chapter 3 - Planning Application Pr
- Page 74 and 75:
Chapter 3 - Planning Application Pr
- Page 76 and 77:
Chapter 3 - Planning Application Pr
- Page 78 and 79:
Chapter 3 - Planning Application Pr
- Page 80 and 81:
Chapter 3 - Planning Application Pr
- Page 82 and 83:
Chapter 3 - Planning Application Pr
- Page 84 and 85:
Chapter 3 - Planning Application Pr
- Page 86 and 87:
Chapter 3 - Planning Application Pr
- Page 88 and 89:
Chapter 3 - Planning Application Pr
- Page 90 and 91:
Chapter 3 - Planning Application Pr
- Page 93 and 94:
Chapter 4 Protecting Applications U
- Page 95 and 96:
Adding Files Contents Glossary Inde
- Page 97 and 98:
Providing Licensing Settings To pro
- Page 99 and 100:
2. Specify options using the inform
- Page 101 and 102:
Providing Security Settings To prov
- Page 103 and 104:
.NET Enhancement Customizing Error
- Page 105 and 106:
To customize the error message titl
- Page 107 and 108:
Applying CodeCover Protection Conte
- Page 109 and 110:
CodeCover Protection Using the Comm
- Page 111 and 112:
CodeCover Protection Using the Comm
- Page 113 and 114:
CodeCover Protection using Custom C
- Page 115 and 116:
CodeCover Protection using Custom C
- Page 117 and 118:
What’s Next? Contents Glossary In
- Page 119 and 120:
Power Builder 6.0, 7.0, 8.0, 9.0, 1
- Page 121 and 122:
Frequently Asked Questions Contents
- Page 123 and 124:
.NET Framework Version Using “.NE
- Page 125 and 126:
Frequently Asked Questions Contents
- Page 127 and 128:
Chapter 5 Protecting Applications U
- Page 129 and 130:
Steps to Protect Applications Using
- Page 131 and 132:
Adding API Features Adding API Feat
- Page 133 and 134:
Adding API Features Contents Glossa
- Page 135 and 136:
Adding API Features Contents Glossa
- Page 137 and 138:
Adding API Features Contents Glossa
- Page 139 and 140:
Adding API Features Contents Glossa
- Page 141 and 142:
Adding API Features Contents Glossa
- Page 143 and 144:
Adding API Features Contents Glossa
- Page 145 and 146:
Adding API Features Contents Glossa
- Page 147 and 148:
Adding API Features Contents Glossa
- Page 149 and 150:
Adding API Features Contents Glossa
- Page 151 and 152:
Business Layer API - Quick Referenc
- Page 153 and 154:
Frequently Asked Questions Contents
- Page 155 and 156:
Chapter 6 Secure Remote Updates Sec
- Page 157 and 158:
Secure Remote Feature/License Updat
- Page 159 and 160:
Secure Remote Feature/License Updat
- Page 161 and 162:
Secure Remote Feature/License Updat
- Page 163 and 164:
Secure Remote New License Addition
- Page 165 and 166:
Secure Remote New License Addition
- Page 167 and 168:
Remote Update Codes Contents Glossa
- Page 169 and 170:
Remote Update Methods Remote Update
- Page 171 and 172:
Remote Update Methods Contents Glos
- Page 173 and 174:
Remote Update Methods Contents Glos
- Page 175 and 176:
About Remote Update Actions Content
- Page 177 and 178:
Modify AES secret key Overwrite exe
- Page 179 and 180:
6. Click OK to add the action. Addi
- Page 181 and 182:
Frequently Asked Questions Contents
- Page 183 and 184:
Frequently Asked Questions Contents
- Page 185 and 186:
Chapter 7 Implementing Secure Licen
- Page 187 and 188:
Attack the Hardware Vulnerability A
- Page 189 and 190:
Tips and Tricks Attack the Applicat
- Page 191 and 192:
Query-Response Protection Create a
- Page 193 and 194:
Tips and Tricks Contents Glossary I
- Page 195 and 196:
Tips and Tricks Contents Glossary I
- Page 197 and 198:
Scatter the Security Checks Tips an
- Page 199 and 200:
Tips and Tricks Contents Glossary I
- Page 201 and 202:
Frequently Asked Questions Contents
- Page 203:
Part 3 Grouping Licenses and Progra
- Page 206 and 207:
Chapter 8 - License Grouping Conten
- Page 208 and 209:
Chapter 8 - License Grouping Conten
- Page 210 and 211:
Chapter 8 - License Grouping Conten
- Page 212 and 213:
Chapter 8 - License Grouping Conten
- Page 214 and 215:
Chapter 8 - License Grouping Conten
- Page 216 and 217:
Chapter 8 - License Grouping Conten
- Page 218 and 219:
Chapter 8 - License Grouping Conten
- Page 220 and 221:
Chapter 8 - License Grouping Conten
- Page 222 and 223:
Chapter 9 - Programming Sentinel Ha
- Page 224 and 225:
Chapter 9 - Programming Sentinel Ha
- Page 226 and 227:
Chapter 9 - Programming Sentinel Ha
- Page 228 and 229:
Chapter 9 - Programming Sentinel Ha
- Page 230 and 231:
Chapter 9 - Programming Sentinel Ha
- Page 232 and 233:
Chapter 9 - Programming Sentinel Ha
- Page 234 and 235:
Chapter 9 - Programming Sentinel Ha
- Page 236 and 237:
Chapter 9 - Programming Sentinel Ha
- Page 238 and 239:
Chapter 9 - Programming Sentinel Ha
- Page 241 and 242:
Chapter 10 Redistributables for Cus
- Page 243 and 244:
SDNPro.dll, and SDNPro64.dll (only
- Page 245 and 246:
Deploying (Client) Configuration Fi
- Page 247 and 248:
Where to Deploy Deploying Secure Up
- Page 249 and 250:
Error Code (Decimal) For API-protec
- Page 251 and 252:
SPP_UPDATE_WIZARD_INFO Structure De
- Page 253 and 254:
Deploying Sentinel Data Protection
- Page 255 and 256:
Option Description Deploying Stand-
- Page 257 and 258:
For Windows Deploying System Admini
- Page 259 and 260:
Frequently Asked Questions Contents
- Page 261 and 262:
Appendix A Troubleshooting This app
- Page 263 and 264:
Problems and Solutions Contents Glo
- Page 265 and 266:
Problems and Solutions Contents Glo
- Page 267 and 268:
Solution: Problems and Solutions Co
- Page 269 and 270:
Problems and Solutions Contents Glo
- Page 271 and 272:
Problem: The application receives a
- Page 273 and 274:
Solution: Problems and Solutions Co
- Page 275 and 276:
Appendix B Glossary A Access Mode A
- Page 277 and 278:
C Business Layer API Contents Glos
- Page 279 and 280:
D Decryption Contents Glossary Ind
- Page 281 and 282:
Execution Count Contents Glossary I
- Page 283 and 284:
G H Group Contents Glossary Index
- Page 285 and 286:
License Addition Code Contents Glos
- Page 287 and 288:
P Q Contents Glossary Index Troubl
- Page 289 and 290:
Secure Communication Tunnel Content
- Page 291 and 292:
T Contents Glossary Index Troubles
- Page 293 and 294:
W Sentinel Hardware Keys Developer
- Page 295 and 296:
Appendix C Sentinel Keys Hardware S
- Page 297 and 298:
Appendix D Migration from SuperPro
- Page 299 and 300:
Stage 2 - Design New Protection Str
- Page 301 and 302:
Index Symbols .req 149 .upw 149, 16
- Page 303 and 304:
P personal folder 269 piracy attack