Reverse Engineering challenge #45.

This is a software copy protection imitation, which uses a key file. The key file contain a user (or customer) name and a serial number.

There are two tasks:

The files:

More challenges: //challenges.re/; about solutions: //challenges.re/#Solutions.