Discuss the following:
* RSA Cryptography
* Compiling and Integrating Crypto++
* Product Activation
* Named Pipe Client/Server
* Generating and Serializing RSA Keys
* RSA Signing and Verification Functions
* Product Key Signing
This article signs the Product Key, which may prove to be too restrictive to the reader. In this case, see Installation IDs Based on Truncated Hashing for an implementation of hardware fingerprints for use with Product Activations.