Of course not.
Heck, my software's eminently crackable. Just find the decision point that queries the Aladdin dongle and NOP it out, more or less. The only reason, in fact, that I use the dongles is to make such a method the only way of cracking it by removing the possibility of 'key generators', etc. A quick hash of the executable file will always tell me whether someone has a legit copy.
The only way to truly secure software is by physically securing the hardware that it's running on, so that potential attackers can only interact with it via its interfaces, not by modifying its executable instructions. It's amazing how many people don't quite grasp that basic fact.
Bookmarks