Customisable protection via a web-based interface. Extremely Secure Dongle hardware is based on smart card technology that is proven to be very secure and is widely used in the security industry. Computer companies established in Computer companies of the United Kingdom Computer hardware companies establishments in England. By using this site, you agree to the Terms of Use and Privacy Policy. All software updates are free of charge, for life. Please note that you will not be able to place orders or receive technical support by phone on the following dates:

Uploader: Net
Date Added: 17 February 2017
File Size: 11.40 Mb
Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads: 75789
Price: Free* [*Free Regsitration Required]

Microcosm – The Software Protection Experts

Views Read Edit View history. Languages such as CVB.

Sinceit has concentrated on computer security, firstly with CopyControl a software-based copy protection systemthen Dinkey Dongle small hardware copy protection keys that connect to parallel or USB ports. This is not possible with any other dongle protection system. Protect Data Files If you use our Shell wrapper to protect your application then you can also encrypt data files that are accessed by this application. microxosm

Reverse engineering of native binaries is harder but is still achievable by skilled hackers with the right tools and experience. Communication between your software and the dongle uses very strong encryption techniques: Many Languages Supported We supply full sample code and detailed programming notes in a large number of programming languages.


We believe Dinkey Pro and FD dongles are the best in the industry and here is why: Anti-hacking Techniques We offer many techniques to improve the security between your code and our libraries.

To install the latest Dinkey drivers, follow the instructions for your platform below. For example, you can encrypt all the parameters you pass to our API. Get a download link for the latest version of your SDK here. Init produced CopyMinder software-based copy protection that uses the Internet where possible to provide an ‘intelligent’ copy protection system.

Microcosm Ltd is a UK company established in Reverse engineering is a big problem now with the increasing use of languages that compile to an intermediate form of code, also known as ‘byte code’. It provides a high level of security with the minimum amount of fuss and a level of flexibility that is second to none.

If there were any problems, the software just stopped: The Journal of the Operational Research Society32 mictocosm From Wikipedia, the free encyclopedia. Our anti-piracy solutions help you ensure that your software licence terms are met with ease.

Microcosm Ltd – Wikipedia

For presales and general enquiries, please use our enquiry form. Our SmartSign solution provides IAM facilities and a multi-factor authentication server and token management system.

Our OATH-compliant One Time Password tokens are a simple, secure and highly cost-effective way of deploying stronger user access control within your organisation. Although internet access is not necessary for CopyMinder to provide protection, it does enable it to be much more flexible.


Microcosm Ltd

Previous software-based copy protection systems were much less flexible: Buy c OTP Tokens. Fully customisable colour faceplates, front and back Configurable algorithm Configurable timestep value Customisation minimum order quantity: If you cannot use the latest version for some reason, make sure that you mention which version you are using when contacting our support team. This means it is not possible to emulate the hardware dongle.

If you use our Shell wrapper to protect your application then you can also encrypt data files that are accessed by this application. More recently, it has expanded its security products by producing SmartSign, a multi-factor authentication system that supports using mobile devices to control access to web pages.

Please get in touch to discuss your requirements. This list is not exhaustive. OTP tokens come in two types: