Appendices
In this section:
>Understanding the Sentinel LDK Master License – Describes the modules that are available to software vendors in the Sentinel LDK Master license.
>Sentinel LDK Run-time Network Activity – Describes the type of network activity that occurs in the communication between the Sentinel License Manager and a protected application, and between the local Sentinel License Manager and remote Sentinel License Managers.
>
>How Sentinel LDK Detects Machine Cloning – Describes the techniques employed by Sentinel LDK to prevent unauthorized use of protected software when the virtual machine on which the software is installed is cloned.
>How Sentinel LDK Protects Time-based Licenses With V-Clock – Describes the technology used in Sentinel LDK to prevent a user from extending the duration of a software license that is locked to a Sentinel SL key.
>How to Optimize Performance for Sentinel LDK Run‑time Environment – Describes how you can optimize the performance in the Sentinel LDKRun-time Environment
>
>
>
>Troubleshooting – Provides a checklist to help you solve some of the most common problems that your customers might encounter when using the Sentinel HL keys. Also includes a list of specific problems you or your customers may experience, together with the solutions.
> – Provides a comparison of the functionality between Sentinel LDK-EMS and Sentinel EMS. This appendix assists vendors who want to choose between these two products or who are considering migrating from Sentinel LDK-EMS to Sentinel EMS.