TurboActivate needs to be able to read all the components of the computer to actually generate a "fingerprint" of the computer that is accurate. Namely, a fingerprint that doesn't cause false-positives or false-negatives down the line.
Previous to version TA 4.0, we let customers disable network adapters, and then those customer inevitable ran into false-negatives ("your app says my computer is not activated / different even though it's exactly the same"). Then, after digging into the problem, it's inevitably the case that either the customer was using your software on another computer and lying about it OR they were disabling network adapters and thus changing the fingerprint.
So, for these customers that are upset about having to enable their network adapter *temporarily* are the same customers that would complain about being deactivated when disable one adapter and enable another (thus causing a false negatives). Read on for possible solutions for these particular type of customers.
Side note: network adapters aren't the only part of the computer used for the fingerprint. They're a tiny fraction. But they are necessary to make an accurate unique ID of the computer.
So how did we handle these customers? In TA 4.0 we now use all real network adapters (i.e. we exclude fake adapters, VM adapters, bluetooth adapters, other junk, and just use real hardware WiFi and Ethernet adapters). And we also make TurboActivate smart enough that the following cases are true:
1. If the customer is on Windows 8 / Windows 2012 or newer then they can continue to disable network adapters and TurboActivate 4.0+ will be able to read the network adapters without needing admin permissions.
2. If the customer is on an old version of Windows (Windows 7 or older) then TurboActivate will require the network adapter be enabled *temporarily* to read the adapter. The adapter *does not* need to be enabled all of the time. Yes, that's the best practice, but we don't force users to do logical things. See the FAQ about how you can automate this: https://wyday.com/limelm/help/faq/#disabled-adapters
Solutions:
1. Have them upgrade to a modern version of Windows (Windows 8 / Windows 2012 or newer). And then they can continue to use insecure methods for "securing" their network. (See this FAQ for actual secure ways of preventing internet access: https://wyday.com/limelm/help/faq/#disabled-adapters )
2. If they're on old versions of Windows, see the methods here: https://wyday.com/limelm/help/faq/#disabled-adapters
3. One last possible solution that we're considering is make a small standalone Windows Service for Windows 7 and older that will be smart enough to enable any disabled adapters temporarily, read the components, and then disable any disabled adapters.
If the 3rd solution sounds like it will work for you we'll put it together. Shoot me an email at wyatt@wyday.com. This is something we're considering putting in a future TurboActivate release as a "helper tool" for stubborn end-users.
To sum up, even for non-technical users, you can make "one-click" solutions to the problem of the customer running on old versions of Windows with some or all of their adapters disabled. Namely, when you get TA_E_ENABLE_NETWORK_ADAPTERS, just run the TurboActivate Wizard as admin. They click "Yes" and everything magically works.
And please email me if you think you would like to use the 3rd solution I posted here.