Software Piracy

Post on 10-May-2015

2.540 views 7 download

Tags:

Transcript of Software Piracy

Table of Contents

• What is Software Piracy • How They Do It• Security• Disk Identification• Activation Methods• How They Distribute It• Their Targets • The #10 Most Pirated • How Is This Punished • Why Do People Do This• What Are The Odds!!• Terms • Conclusion

What is Software Piracy

• Creating a copy to serve as a backup.

• Renting the original software.

• Reselling the original software.

•Breaking security methods

•Cracking programs •Creating a copy and or selling it.•Creating a copy and giving it to someone else.

How They Do It!

There are many ways to pirate software. But it all depends on what security methods are being employed

Press button to see the methods:

Generally: • Software is made with a key (376347364761374)• The key unlocks program • The goal of a pirate is how the lock works • Then can make there own key • Once they make there key they pirated it

Security

Software companies often hire a third party to make software to prevent pirating

Two general methods are; disk identification: there's security software in the

installation file that requires a legal CD copyLicence identification: Other security software

concentrates on insuring that you have a legitimate licence

EX. Online or by phone activation or DRM (Digital Right Management)

Disk Identification

• To avoid disk identification programs pirates came up with software that will hide the fact that the software is not an original copy

• Alternatively they can create software that emulates the security code which indicates that it is an original copy.

(EX. Daemon tools and securom)

Activation Methods

• Online activation is very hard to defeat because during activation it can send security information to the company which could indicate a pirated copy.

• How ever companies can’t just use online activation they must also allow the use of phone activation

• The pirates focus on generating keys that fake a telephone activation key which results in pirated software

How They Distribute It 1.First you can use a

program like utorrent.

2.Then you must go to a torrent site like Mininova or Pirate Bay

3.Make it available as a torrent.

4.Then people can follow instructions to be able to run the program

5.Then copy and burn to CD

Their Targets

ANY THING THAT CAN BE HACKED

The #10Most Pirated Software

1. Symantec Norton Anti-Virus2. Adobe Acrobat3. Symantec PC Anywhere4. Adobe PhotoShop5. Autodesk AutoCAD

6. Adobe DreamWeaver7. Roxio Easy CD/DVD Creator8. Roxio Toast Titanium9. Ipswitch WS_FTP10. Nero Ultra Edition

How Is This Punished

• In most cases specialized software like Adobe Premiere results in no punishment if you don’t make a profit with it.

• General software, music and movies are some times punishable

• Fines in between $2,000- $ 2,000,000

• Go Directly To prison for 2 – 10 years

Why Do People Do This

• They believe that nothings going to happen to them

• For profit • To get all there software free • Prestige of being the first to hack the

programEX. The pirating team called Deviance

always likes to be first to break the program

What Are The Odds!!Most people think if they just copy U.S products the would be safe! But little than most know there not!

As a user you have less of a chance of getting caught because of the cost of tracing you down vs. removing one illegal user.

It greatly depends on if you are a software pirate or a pirated software user. If a profit is made or if someone is being tricked into believing it is real the like hood in

being pursued is increased

Terms Word Definition

Torrent Bit Torrent is a peer-to-peer file sharing protocol used to distribute large amounts of data. The initial distributor of the complete file or collection acts as the first seed.

Software written programs or procedures or rules and associated documentation pertaining to the operation of a computer system

Piracy plagiarism: the act of plagiarizing; taking someone's words or ideas as if they were your own

Conclusion

Every day software is pirated and new software protections are developed and attacked by software pirates

I think there will always be pirated software and pirates to sail the internet looking for software booty.

They cant wear those funny hooks because they’re to darn hard to type with!!