You need to login to do wolfenstein. the new order x64.exe win32. Okay, here’s the dumb copy protection.
When a player purchases a video game, how does the developer prevent them from simply making an illicit copy of the software and giving it away to a friend? This has been a concern for game makers even from the start, so throughout the years they’ve come up with a variety of ways to verify that whoever is playing their game has fronted the proper cash for that privilege. Passphrase method: The game prompts a user to input a word or phrase from a specified page of the game’s manual, trusting that only legal owners have a copy of that. Puzzle method: As a more subtle, elaborate version of the above, the player encounters an in-game puzzle that is generally not solvable without supplementary clues and information included either in the game’s manual or its Feelies. Activation: The software key is registered and paired with your computer’s hardware somehow. On first install, information about your computer is sent back to the developers, and on subsequent installs the information is checked and you’re blocked from proceeding if the information doesn’t add up.
See also Digital Piracy Is Evil and DRM. Infogrames’ original Alone in the Dark series has this, and notably ratcheted it up in the second game. The DOS game Al-Qadim: The Genie’s Curse features copy-protection in the form of a question whose answer you need to look up on a page in the manual in order to start playing. Also in the original game, whenever you level up, the Review Board will ask you to name a street in the city.