What problems do you need to know more about in the process of using the software dog of the central control operator of Zhejiang University? In fact, the following answers to frequently asked questions about dongles are suitable for micro dogs, software dogs, netdogs and other dogs.
1. Question: If USB dog and parallel port dog are plugged into the USB port and parallel port of the computer at the same time, which dog will work?
Answer: When the binding method is selected for installing the Microdog development kit, if the parallel port dog is selected in the "Priority Selection" item, the system will first detect the parallel port dog when inserting the USB dog and the parallel port dog at the same time, and the parallel port dog will work first; If the "priority selection" selects the USB dog, the USB dog will work first in this case.
2. Q: What is the difference between Microdog development kit and Softdog?
A: The main difference is that the parallel port dog and USB dog have a built-in microcontroller, while the software dog does not.
3. Question: What role does the microcontroller play?
Answer: SCM is mainly used to improve the performance of anti tracking. It transforms the written and read data according to a certain algorithm through the solidified software (the software is not readable), and uses the data exchange randomization technology to make the byte stream of each interaction between the software and the dog different (even if the written data is the same). This effectively prevents software tracking and logic analyzer analysis, and ensures the reliability of encryption.
4. Question: What is the dog's password and its role?
Answer: The dog's password is a password controlled by the software developer and verified when reading and writing to the dog. The dog password does not affect the check and change operations (DogCheck(), DogConvert()). The password of Microdog is four bytes long (32 bits), and the password is set to 0 at the factory. The dog password can be modified by the software developer using the tool software (DogEdt32. EXE) provided on the distribution disk of the Microdog development kit.
Note: The modified password must be recorded and saved. If you forget the password, the encrypted software will not be able to read and write to the dog, resulting in software operation failure. After forgetting the password, the dog can only be sent back to the manufacturer for resetting.
5. Question: Can others buy the same dog as me? Can he read what I wrote in the dog with his dog software?
A: You don't need to worry about it. There is a certain storage space in the dog, one part of which is the system area, and the other part is the user area. The user area can be read and written by developers, while the system area is used to store dog signatures and other information that no user can access. The signature is a set of data used to distinguish dogs. This data is randomly generated during production and then written to dogs. The probability of signature repetition is very small, only tens of millions of times. When the dog software operates on the dog, it must first check the dog's signature before it can perform other work. Therefore, dog software and dog are one-to-one, and other people's software cannot read what you write in the dog.
6. Question: Can I plug and unplug the dog with electricity?
Answer: USB dog is a plug and play device, which can be plugged and unplugged with power.
Let's explain six points about the problems in the use of the operator software dog of Zhejiang University, so that you can have a basic understanding of this and better use. If you have relevant needs, please come to our website http://www.sdjkyqyb.com Consult!