Manuals database logo
manualsdatabase
Your AI-powered manual search engine

SafeNet Sentinel manuals

Sentinel first page preview

Sentinel

Brand: SafeNet | Category: Adapter
Table of contents
  1. fcc compliance
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. conventions used in this guide
  8. technical support
  9. Part 1: Sentinel Key Basics
  10. Chapter 1 – Introduction
  11. Sentinel Keys Protect Against Software Piracy
  12. License Models to Increase Your Revenue
  13. Sentinel Keys Offer Sophisticated Protection
  14. Frequently Asked Questions
  15. Chapter 2 – Sentinel Keys SDK Components
  16. Sentinel System Driver
  17. Sentinel Keys Toolkit
  18. Command-Line Shell Utility
  19. Key Programming APIs
  20. Developer Key
  21. Compiler Interfaces
  22. License Manager (Stand-alone)
  23. Distributor Key
  24. Sentinel Keys
  25. for windows
  26. Sentinel Keys Server
  27. Sentinel Keys License Monitor
  28. Sentinel Protection Installer
  29. Configuration Files
  30. Chapter 3 – Planning Application Protection and Licensing Strategy
  31. About Features, Templates, and Groups
  32. Planning Application Protection and Licensing Strategy
  33. Part 2: Designing and Implementing Protection
  34. Chapter 4 – Protecting Applications Using Shell
  35. Add Shell Feature Dialog Box
  36. Providing Networking Settings
  37. Providing Security Settings
  38. Customizing Error Messages
  39. Changing File Encryption Settings
  40. Applying Shell Protection
  41. Shell Protection Using the Command-Line Utility
  42. What's Next
  43. Chapter 5 – Protecting Applications Using API
  44. Steps to Protect Applications Using API
  45. Adding API Features
  46. Chapter 6 – Secure Remote Updates
  47. Secure Remote Feature/License Update
  48. Secure Remote New License Addition
  49. Remote Update Codes
  50. Remote Update Methods
  51. About Remote Update Actions
  52. Generating Update Codes
  53. Chapter 7 – Implementing Secure Licensing
  54. Vulnerability Assessment - Basic Types of Attacks
  55. Tips and Tricks
  56. Chapter 8 – License Grouping
  57. Creating New Groups
  58. Loading Groups
  59. Removing Groups
  60. Viewing Group Layouts
  61. Modifying Default Feature Instances
  62. Add Templates to Groups
  63. Export-File Manager
  64. Locking/Unlocking Groups
  65. Chapter 9 – Programming Sentinel Hardware Keys
  66. Programming Sentinel Keys using Sentinel Keys Toolkit
  67. Programming Sentinel Keys using the Key Programming APIs
  68. Part 4: Distributing Protected Applications
  69. Chapter 10 – Redistributables for Customers and Distributors
  70. Deploying Sentinel System Driver
  71. for macintosh
  72. Deploying Sentinel Keys Server
  73. Deploying Secure Update Utility
  74. Deploying Secure Update Wizard (Windows Only)
  75. Deploying Sentinel Data Protection Driver (Windows Only)
  76. Deploying Stand-alone License Manager
  77. Deploying System Administrator's Help
  78. troubleshooting
  79. Appendix A – Troubleshooting
  80. Problems and Solutions
  81. Appendix B – Glossary
  82. mac address
  83. silent mode
  84. Appendix C – Sentinel Keys Hardware Specifications
  85. Appendix D – Migration from SuperPro and UltraPro
  86. Stage 2 - Design New Protection Strategy
  87. Index
SafeNet categories
More SafeNet categories
Manuals database logo
manualsdatabase
Your AI-powered manual search engine