^ cause, for an expert programmer, break a dongle protection is too easy.
Not me, i'm not a programmer ..... but i know that there was a guy that in the past defeated the more strong existent dongle protection of that time in less than a week, after the company that was using it paid like 50.000 $ in developement fees for the protection scheme
They had a program with multiple protection levels (once you break one, another intervent, this for 16 levels), and used a flexdrive dongle with self-recursive algorythms with 256 different encrypted keycodes, granted to be "absolutely impossible to crack, read, disassemble or decipher in any way" from the producer ..... that guy wrote a 9Mb program that simply changed the internal registers of the protection module, so each time it search for the right dongle keycode, it simply find the right answer inside itself, without any need to crack or decipher the dongle ..... and in the 9Mb of the crack there was also the self-presentation of the pirate, with animated logo and music, and a message for the protection developement team that was saying, more or less, "hey, i needed less than a week for defeat your protection, working only 8 hours a day, that was not funny, please do a better work the next time"
:crackup:
(i suppose those guys at flex was really happy reading that, huh ? .....
)