Its actually one of the easiest to use. All it does is generate hash data that you can then use to determine if a file or data has been altered.
Or like Tom was explaining about how the Gravatar thingy can detect your email addy without having to show it publicly.
Quite possible, but it doesnt change the fact that i couldnt figure out how to use it <img src="smileys/smiley12.gif" border="0" align="middle" />
And as i dont feel that unique ( ;) ) i presume that there more people then just me, who also cant learn that.
In the other hand, method described in this tutorial can be used by anybody, anywhere, anytime. Without the use of all that scary words like "hash" <img src="smileys/smiley36.gif" border="0" align="middle" />
But as i stated at the end - the more the marrier!
mixing diffrent protection methods and techniques into combo, as long as they are compatible, empowers the overall protection.
Its not a choice of "this or that", but rather "this or this AND that".
And i would to like say this again - theres virtualy no kind of softwere protection that CANT be cracked.
But to "crack" trickery you need hell of a brain and strong portion of detective sense <img src="smileys/smiley1.gif" border="0" align="middle" />