>Get the machines hdd serial number, mac address, or other similar data. Use this data to generate a password. Give the user the password and store the hash of the password in a table. When the user needs to supply a password he does so, you hash it, and compare it to the stored hash.
Jol,
Thanks for the reply again! I'll think about that when I work on the algorithm.
Dawa Tsering
"Do not let any unwholesome talk come out of your mouths,
but only what is helpful for building others up according to their needs,
that it may benefit those who listen."
- Ephesians 4:29-30 NIV
Dare to Question -- Care to Answer
Time is like water in a sponge, as long as you are willing you can always squeeze some.
--Lu Xun, Father of Modern Chinese Literature