• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Software Piracy

Software Piracy






Total Views
Views on SlideShare
Embed Views



1 Embed 1

http://www.slideshare.net 1



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Software Piracy Software Piracy Presentation Transcript

    • Software Piracy
    • Table of Contents
      • What is Software Piracy
      • How They Do It
      • Security
      • Disk Identification
      • Activation Methods
      • How They Distribute It
      • Their Targets
      • The #10 Most Pirated
      • How Is This Punished
      • Why Do People Do This
      • What Are The Odds!!
      • Terms
      • Conclusion
    • What is Software Piracy
      • Creating a copy to serve as a backup.
      • Renting the original software.
      • Reselling the original software.
      • Breaking security methods
      • Cracking programs
      • Creating a copy and or selling it.
      • Creating a copy and giving it to someone else.
    • How They Do It!
      • There are many ways to pirate software. But it all depends on what security methods are being employed
      • Press button to see the methods:
      • Generally:
      • Software is made with a key (376347364761374)
      • The key unlocks program
      • The goal of a pirate is how the lock works
      • Then can make there own key
      • Once they make there key they pirated it
    • Security
      • Software companies often hire a third party to make software to prevent pirating
      • Two general methods are;
      • disk identification: there's security software in the installation file that requires a legal CD copy
      • Licence identification: Other security software concentrates on insuring that you have a legitimate licence
      • EX. Online or by phone activation or DRM (Digital Right Management)
    • Disk Identification
      • To avoid disk identification programs pirates came up with software that will hide the fact that the software is not an original copy
      • Alternatively they can create software that emulates the security code which indicates that it is an original copy.
      • (EX. Daemon tools and securom)
    • Activation Methods
      • Online activation is very hard to defeat because during activation it can send security information to the company which could indicate a pirated copy.
      • How ever companies can’t just use online activation they must also allow the use of phone activation
      • The pirates focus on generating keys that fake a telephone activation key which results in pirated software
    • How They Distribute It
      • First you can use a program like utorrent .
      • Then you must go to a torrent site like Mininova or Pirate Bay
      • Make it available as a torrent.
      • Then people can follow instructions to be able to run the program
      • Then copy and burn to CD
    • Their Targets
    • The #10 Most Pirated Software
      • Symantec Norton Anti-Virus 2. Adobe Acrobat 3. Symantec PC Anywhere 4. Adobe PhotoShop 5. Autodesk AutoCAD
      6. Adobe DreamWeaver 7. Roxio Easy CD/DVD Creator 8. Roxio Toast Titanium 9. Ipswitch WS_FTP 10. Nero Ultra Edition
    • How Is This Punished
      • In most cases specialized software like Adobe Premiere results in no punishment if you don’t make a profit with it.
      • General software, music and movies are some times punishable
      • Fines in between $2,000- $ 2,000,000
      • Go Directly To prison for 2 – 10 years
    • Why Do People Do This
      • They believe that nothings going to happen to them
      • For profit
      • To get all there software free
      • Prestige of being the first to hack the program
      • EX. The pirating team called Deviance always likes to be first to break the program
    • What Are The Odds!!
        • Most people think if they just copy U.S products the would be safe! But little than most know there not!
        • As a user you have less of a chance of getting caught because of the cost of tracing you down vs. removing one illegal user.
        • It greatly depends on if you are a software pirate or a
        • pirated software user. If a profit is made
        • or if someone is being tricked into
        • believing it is real the like hood in
        • being pursued is increased
    • Terms plagiarism: the act of plagiarizing; taking someone's words or ideas as if they were your own Piracy written programs or procedures or rules and associated documentation pertaining to the operation of a computer system Software Bit Torrent is a peer-to-peer file sharing protocol used to distribute large amounts of data. The initial distributor of the complete file or collection acts as the first seed. Torrent Definition Word
    • Conclusion
      • Every day software is pirated and new software protections are developed and attacked by software pirates
      • I think there will always be pirated software and pirates to sail the internet looking for software booty.
      • They cant wear those funny hooks because they’re to darn hard to type with!!
      What the Pirates Learned