Well first a comment to another ultimative CO bot: This is the 5th time I heard about a new bot (which is most likely never gonna be released), all of those projects have probably been cancelled.
Do you even know how to login and reply to the bot check packets? I doubt that.
The way I cracked BJX requires a bit more than just an hex editor and a packet sniffer. If it was so easy why didn't you crack it?
Shareware authors thinking hardware protections were some heavy kind of protection were proven wrong some hours after they released their protected software.
Redirecting some API's so that the software thinks it's always running on 1 computer combined with a valid serial for that machine is the easiest way to crack that kind of protection.
Once your software runs in functional mode (when it can do the job it's made for) it can be dumped, all parts rebuilt, cracked and be used in registered mode.
And if you do not distribute shareware versions of that software, 1 registered copy is enough in order to make a version fully functional on every machine.
If you want to play the cat-n-mouse game (releasing new versions of your software when it's cracked) remember, there are 10.000 crackers vs 1 shareware author.
I gave up protecting all of my software, it causes additional incompatibility, instability, bugs, slows the software down on runtime, and if a cracker really wants to crack it, it will be cracked. All I do now is UPX it and remove decompression informations so that some novice crackers couldn't see the code.
Anything which runs can be cracked, and the cracker is always the winner in the end.