Glenco Introduces CD-Crypt for Safe CD-ROM Software Distribution

Buffalo Grove, Illinois, February 1, 1994 -- Now they can try your
software, and buy it too! Glenco Engineering, Inc. will feature their new
CD-Crypt, the protection system for CD-ROM applications, at Software
Development '94 in San Jose.

One of six new additions to Glenco's Hardlock family of products, CD-Crypt
allows you to truly customize your security, distribution, and/or
marketing strategies for your company's specific needs. The system has the
ability to provide a myriad of CD-ROM security solutions like remote
enabling of applications (perfect for "try and buy" software catalogs),
incorporating expiration dates or counters into software programs, data
file protection, and much more. CD-Crypt protects files by patching into
the .EXE program, and also offers a full menu of selectable anti-debugging
and reverse engineering features.

With the advent of low cost desktop CD recorders for creating CD-ROM disks,
new opportunities for software distribution and marketing present
themselves at every turn. Many Glenco customers will find CD-Crypt an
invaluable aid for implementing these strategies.

Here are just a few examples of how CD-Crypt can be customized:

Lock/Unlock

This option is perfect for a software catalog situation, where you may have
several vendors' programs on one CD-ROM disk, or even several of your own
products. CDCrypt will patch in a lock/unlock mechanism with selectable
features, such as counters that would allow a program to run only a
specified number of times, program run expiration dates, or demo crippling
(for example, you could disable the print and save functions in a
program).

With your chosen patch in place, the loaded CD-ROM disk can safely be sent
out to customers. Then, when your customer decides to purchase the full
version of a program, the unlock patch is enabled remotely, and the
customer has full use of whatever programs they have paid for.

Archiving and Data Security

CD-ROM data security is also a breeze with CD-Crypt. Let's say that your
company has confidential financial or product design files archived on a
CD-ROM disk. After CD-Crypt is applied to these files, the only way they
can be accessed is with its corresponding Hardlock key -- a much more
secure way to protect files if the disk should fall into the wrong hands.

Glenco Engineering Inc
270 Lexington Dr
Buffalo Grove, IL 60089-6930
708-808-0300,  fax 708-808-0313

 ============================================================
 From the  'New Product Information'  Electronic News Service
 ============================================================
 This information was processed from data provided by the
 above mentioned company. For additional details, contact 
 the company at the address or telephone number indicated.
 OmniPage Pro is now used for converting all printed input! 
 ============================================================
 All submissions for this service should be addressed to:
 BAKER ENTERPRISES,  20 Ferro Dr,  Sewell, NJ  08080  U.S.A.
 Email: RBakerPC (AOL/Delphi), rbakerpc@delphi.com (Internet)
 ============================================================
