One of the most common forms of software copy protection requires that software be “authorized” to operate on a particular system. This is usually accomplished by writing a special, hidden key or authorization file to the main hard drive that the program looks for when it boots up. The process of authorizing a drive to run a particular application usually involves either the creation of the special file from a “key disk” or by the program itself once the proper serial number or other authorization code has been entered. The little key file cannot be easily copied or moved to another drive (without damaging it so it doesn’t work) so authorizations are considered to be an effective form of copy protection.
Related Articles:
Vertex by Gator Pedalboard | Pedalboards for Anyone
1
Vertex by Gator Pedalboard | Pedalboards for Anyone
Recording Shootout: $500 vs. $2,500 vs. $10,000 vs. $100,000 Rigs
2
Recording Shootout: $500 vs. $2,500 vs. $10,000 vs. $100,000 Rigs
We Checked Out Mirador's Live Rigs
3
We Checked Out Mirador's Live Rigs
Kanto Audio Ora 4 Powered Bookshelf Speakers Overview
4
Kanto Audio Ora 4 Powered Bookshelf Speakers Overview
EVH Wolfgang Special Demo Starring Ben Eller
5
EVH Wolfgang Special Demo Starring Ben Eller
Explore the Best of Guitar Gallery – May 2026
6
Explore the Best of Guitar Gallery – May 2026
Tromana CL300 Student Clarinet Demo
7
Tromana CL300 Student Clarinet Demo
Tromana FL300 Student Flute Demo
8
Tromana FL300 Student Flute Demo
Inspiration. Information. Passion.
Being music makers ourselves, we love geeking out on all things gear. From the tweakiest techniques to the biggest ideas, our experts work hard to constantly supply inSync with a steady stream of helpful, in-depth demos, reviews, how-tos, news, and interviews. With over 28,000 articles and counting, inSync is your FREE resource for breaking news, reviews, demos, interviews, and more.