software piracy

16

Upload: byerdavi

Post on 10-May-2015

2.539 views

Category:

Education


7 download

TRANSCRIPT

Page 1: Software Piracy
Page 2: Software Piracy

Table of Contents

• What is Software Piracy • How They Do It• Security• Disk Identification• Activation Methods• How They Distribute It• Their Targets • The #10 Most Pirated • How Is This Punished • Why Do People Do This• What Are The Odds!!• Terms • Conclusion

Page 3: Software Piracy

What is Software Piracy

• Creating a copy to serve as a backup.

• Renting the original software.

• Reselling the original software.

•Breaking security methods

•Cracking programs •Creating a copy and or selling it.•Creating a copy and giving it to someone else.

Page 4: Software Piracy

How They Do It!

There are many ways to pirate software. But it all depends on what security methods are being employed

Press button to see the methods:

Generally: • Software is made with a key (376347364761374)• The key unlocks program • The goal of a pirate is how the lock works • Then can make there own key • Once they make there key they pirated it

Page 5: Software Piracy

Security

Software companies often hire a third party to make software to prevent pirating

Two general methods are; disk identification: there's security software in the

installation file that requires a legal CD copyLicence identification: Other security software

concentrates on insuring that you have a legitimate licence

EX. Online or by phone activation or DRM (Digital Right Management)

Page 6: Software Piracy

Disk Identification

• To avoid disk identification programs pirates came up with software that will hide the fact that the software is not an original copy

• Alternatively they can create software that emulates the security code which indicates that it is an original copy.

(EX. Daemon tools and securom)

Page 7: Software Piracy

Activation Methods

• Online activation is very hard to defeat because during activation it can send security information to the company which could indicate a pirated copy.

• How ever companies can’t just use online activation they must also allow the use of phone activation

• The pirates focus on generating keys that fake a telephone activation key which results in pirated software

Page 8: Software Piracy

How They Distribute It 1.First you can use a

program like utorrent.

2.Then you must go to a torrent site like Mininova or Pirate Bay

3.Make it available as a torrent.

4.Then people can follow instructions to be able to run the program

5.Then copy and burn to CD

Page 9: Software Piracy

Their Targets

ANY THING THAT CAN BE HACKED

Page 10: Software Piracy

The #10Most Pirated Software

1. Symantec Norton Anti-Virus2. Adobe Acrobat3. Symantec PC Anywhere4. Adobe PhotoShop5. Autodesk AutoCAD

6. Adobe DreamWeaver7. Roxio Easy CD/DVD Creator8. Roxio Toast Titanium9. Ipswitch WS_FTP10. Nero Ultra Edition

Page 11: Software Piracy

How Is This Punished

• In most cases specialized software like Adobe Premiere results in no punishment if you don’t make a profit with it.

• General software, music and movies are some times punishable

• Fines in between $2,000- $ 2,000,000

• Go Directly To prison for 2 – 10 years

Page 12: Software Piracy

Why Do People Do This

• They believe that nothings going to happen to them

• For profit • To get all there software free • Prestige of being the first to hack the

programEX. The pirating team called Deviance

always likes to be first to break the program

Page 13: Software Piracy

What Are The Odds!!Most people think if they just copy U.S products the would be safe! But little than most know there not!

As a user you have less of a chance of getting caught because of the cost of tracing you down vs. removing one illegal user.

It greatly depends on if you are a software pirate or a pirated software user. If a profit is made or if someone is being tricked into believing it is real the like hood in

being pursued is increased

Page 14: Software Piracy

Terms Word Definition

Torrent Bit Torrent is a peer-to-peer file sharing protocol used to distribute large amounts of data. The initial distributor of the complete file or collection acts as the first seed.

Software written programs or procedures or rules and associated documentation pertaining to the operation of a computer system

Piracy plagiarism: the act of plagiarizing; taking someone's words or ideas as if they were your own

Page 15: Software Piracy

Conclusion

Every day software is pirated and new software protections are developed and attacked by software pirates

I think there will always be pirated software and pirates to sail the internet looking for software booty.

Page 16: Software Piracy

They cant wear those funny hooks because they’re to darn hard to type with!!