Protected application can log important events to a text file.

Select "Enable logging" option to enabled logging for protected application.

Logging settings

Protected application can log the following information:

- All messages displayed by protection code to end user (errors, notifications...)

- License activation: site code, mid code, activation code, serial number (if applicable).

- License removal: removal code

- License transfer: new site code, new activation code

- License extension: site code, mid code, activation code

- Demo extension: site code, mid code, activation code

- Change of locking parameter: parameter name, old hash value, new hash value

NOTE: At least single logging option must be selected.

Log filename

Default log filename is "default.log" and it can be changed here. This filename is embedded into protected application during protection process.

By default, log file is located in license directory on remote machine.

CSIDL_COMMON_APPDATA\<license dir>

Where <license dir> is the name of directory with license file (available in protection report) 

Folder identified by CSIDL_COMMON_APPDATA it the file system directory that contains application data for all users. 

A typical path is:

Windows 7:

C:\ProgramData\<license dir>

C:\Documents and Settings\All Users\Application Data\<license dir>

Windows 10: 

C:\Users\All users\<license dir>

NOTE: CSIDL_COMMON_APPDATA is same as ALLUSERSAPPDATA. Path may be different on different operating systems.

Changing default activation filename dynamically from command line

Use -PCG_CL_LOGFILE option to override default log filename and location by passing it via command line to protected application.

Definition:

-PCG_CL_LOGFILE [Full path to log file]

Examples:

-PCG_CL_LOGFILE C:\test\test.log

-PCG_CL_LOGFILED:\my application data\test.log

Be sure to put full path to log file in quotes in case path contains space characters as in above example. Directory with log file must be present on remote machine and should have appropriate access rights so that protected application can write to log file.

Log file structure

Each log file entry contains:

- date and time (in DD.MM.YYYY HH:MM format)
- full path to protected application which generated entry (as log file may be shared by multiple protected applications)
- event message

Related KB articles