Advice 1: How to remove the dump with HASP key

To prevent illegal use of the software developers build into their products a variety of protection system. One of the most popular ways to limit access is the use of hardware keys.
You will need
  • — HASP HL Installer version 5.20
  • — TORO Dongle Monitor for Hardlock/Hasp4/HaspHL v3.2
Instruction
1
The HASP key is a device the size of a flash drive. It can connect to the computer via LPT-port, but the most widely keys format USB stick. Inside each key is a secure microcontroller. Chip placed inside the crypto processor that is used to encrypt and decrypt data streams sent in the process of a protected program key, and back. This means that the program will not work without a specific HASP key to which it is bound. As a result, selling the keys, the developer can control the distribution process of the program to limit the number of users.
2
For several reasons the use of hardware protection is a disincentive for buyers of the software. To use the hardware key is not too convenient. When the key is down it will be replaced, but it can take a lot of time, especially if the program's manufacturer and the buyer are located in different cities or even countries. The shipment can take days, and all this time the software will be put down, which can lead to the disruption of time, loss of profits and business reputation. Even worse, if the key is lost or stolen. License policy of most developers does not provide for the issuance of duplicates of lost FOB. The program will have to buy again. It is quite difficult to provide adequate protection for this device because it is in the hands of users.
3
As a result, the desire to copy the key appears to licensed buyers of the product. The process of creating a clone is very complex, as the keys were specially designed in order to hamper their duplication. The first step when you copy a HASP key, is the removal of the dump.
4
Download the original drivers of HASP HL Installer. Unpack and install the key drivers is described in the attached instructions. Then restart the computer. Install and start the logger TORO Dongle Monitor. Install and run the protected program, some time have fun with it. At the bottom of the logger you should see the following lines:
Hasp In:> HaspInitPacket
PW1=XXXXX (0x1234) , PW1=YYYYY (0x5678)
This is the password for the key. In the same folder where the logger is also dumper the dongle memory. Close the logger and run dumper with parameters in command prompt:
h5dmp.exe 0x1234 0x5678
As a result of work the program will create in the root of drive C: file containing a dump of the key.

Advice 2: How to dump the key

The developers provide a special system of access to software functions with a special USBkey. If it is lost the owner must apply for a new copy, but it's not always convenient.
You will need
  • program Dekart Key Manager.
Instruction
1
In order to merge the dump key and flash cards, use special software. Mostly all the utilities designed for this, pay. You can use Dekart Key Manager or its analogues.
2
Buy software with a credit card or any other remedies provided by the developer and available to you. Best of all this program to run on a computer with Windows XP operating system, if you have no such opportunity, and you have a newer version, use run in compatibility mode with XP.
3
Run the program and familiarize yourself with its interface. In the left of the main window you will find a list of devices with keys connected to your computer via a USB interface, and the right side – the contents of the selected media. Make a copy of the information held on the key using the program menu. To do this, use the save menu data from a file.
4
In the edit menu select the copy operation and connect to your computer, other removable drive, for which further written information. Confirm the operation and wait for it to finish.
5
Please note that if you encounter problems using the software in compatibility mode, it is mandatory to use the computer with operating system Windows XP. Otherwise, when copying information to a removable storage device in future there can be problems with further reading.
6
Best of all, try to foresee multiple copies of the software keys, so you don't have the extra time to make additional copies yourself. Consider the fact that the software needed to copy the information of the key, almost all paid.
Is the advice useful?
In advance order copies of keys.
Note
Create emulator key by a user who did not buy a license for the program, contrary to articles 272, 273 of the criminal code.
Search
Is the advice useful?