Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Software Piracy


Published on

Published in: Education, Technology
  • Be the first to comment

Software Piracy

  1. 1. Software Piracy
  2. 2. Table of Contents <ul><li>What is Software Piracy </li></ul><ul><li>How They Do It </li></ul><ul><li>Security </li></ul><ul><li>Disk Identification </li></ul><ul><li>Activation Methods </li></ul><ul><li>How They Distribute It </li></ul><ul><li>Their Targets </li></ul><ul><li>The #10 Most Pirated </li></ul><ul><li>How Is This Punished </li></ul><ul><li>Why Do People Do This </li></ul><ul><li>What Are The Odds!! </li></ul><ul><li>Terms </li></ul><ul><li>Conclusion </li></ul>
  3. 3. What is Software Piracy <ul><li>Creating a copy to serve as a backup. </li></ul><ul><li>Renting the original software. </li></ul><ul><li>Reselling the original software. </li></ul><ul><li>Breaking security methods </li></ul><ul><li>Cracking programs </li></ul><ul><li>Creating a copy and or selling it. </li></ul><ul><li>Creating a copy and giving it to someone else. </li></ul>
  4. 4. How They Do It! <ul><li>There are many ways to pirate software. But it all depends on what security methods are being employed </li></ul><ul><li>Press button to see the methods: </li></ul><ul><li>Generally: </li></ul><ul><li>Software is made with a key (376347364761374) </li></ul><ul><li>The key unlocks program </li></ul><ul><li>The goal of a pirate is how the lock works </li></ul><ul><li>Then can make there own key </li></ul><ul><li>Once they make there key they pirated it </li></ul>
  5. 5. Security <ul><li>Software companies often hire a third party to make software to prevent pirating </li></ul><ul><li>Two general methods are; </li></ul><ul><li>disk identification: there's security software in the installation file that requires a legal CD copy </li></ul><ul><li>Licence identification: Other security software concentrates on insuring that you have a legitimate licence </li></ul><ul><li>EX. Online or by phone activation or DRM (Digital Right Management) </li></ul>
  6. 6. Disk Identification <ul><li>To avoid disk identification programs pirates came up with software that will hide the fact that the software is not an original copy </li></ul><ul><li>Alternatively they can create software that emulates the security code which indicates that it is an original copy. </li></ul><ul><li>(EX. Daemon tools and securom) </li></ul>
  7. 7. Activation Methods <ul><li>Online activation is very hard to defeat because during activation it can send security information to the company which could indicate a pirated copy. </li></ul><ul><li>How ever companies can’t just use online activation they must also allow the use of phone activation </li></ul><ul><li>The pirates focus on generating keys that fake a telephone activation key which results in pirated software </li></ul>
  8. 8. How They Distribute It <ul><li>First you can use a program like utorrent . </li></ul><ul><li>Then you must go to a torrent site like Mininova or Pirate Bay </li></ul><ul><li>Make it available as a torrent. </li></ul><ul><li>Then people can follow instructions to be able to run the program </li></ul><ul><li>Then copy and burn to CD </li></ul>
  9. 9. Their Targets <ul><li>ANY THING THAT CAN BE HACKED </li></ul>
  10. 10. The #10 Most Pirated Software <ul><li>Symantec Norton Anti-Virus 2. Adobe Acrobat 3. Symantec PC Anywhere 4. Adobe PhotoShop 5. Autodesk AutoCAD </li></ul>6. Adobe DreamWeaver 7. Roxio Easy CD/DVD Creator 8. Roxio Toast Titanium 9. Ipswitch WS_FTP 10. Nero Ultra Edition
  11. 11. How Is This Punished <ul><li>In most cases specialized software like Adobe Premiere results in no punishment if you don’t make a profit with it. </li></ul><ul><li>General software, music and movies are some times punishable </li></ul><ul><li>Fines in between $2,000- $ 2,000,000 </li></ul><ul><li>Go Directly To prison for 2 – 10 years </li></ul>
  12. 12. Why Do People Do This <ul><li>They believe that nothings going to happen to them </li></ul><ul><li>For profit </li></ul><ul><li>To get all there software free </li></ul><ul><li>Prestige of being the first to hack the program </li></ul><ul><li>EX. The pirating team called Deviance always likes to be first to break the program </li></ul>
  13. 13. What Are The Odds!! <ul><ul><li>Most people think if they just copy U.S products the would be safe! But little than most know there not! </li></ul></ul><ul><ul><li>As a user you have less of a chance of getting caught because of the cost of tracing you down vs. removing one illegal user. </li></ul></ul><ul><ul><li>It greatly depends on if you are a software pirate or a </li></ul></ul><ul><ul><li>pirated software user. If a profit is made </li></ul></ul><ul><ul><li>or if someone is being tricked into </li></ul></ul><ul><ul><li>believing it is real the like hood in </li></ul></ul><ul><ul><li>being pursued is increased </li></ul></ul>
  14. 14. Terms plagiarism: the act of plagiarizing; taking someone's words or ideas as if they were your own Piracy written programs or procedures or rules and associated documentation pertaining to the operation of a computer system Software Bit Torrent is a peer-to-peer file sharing protocol used to distribute large amounts of data. The initial distributor of the complete file or collection acts as the first seed. Torrent Definition Word
  15. 15. Conclusion <ul><li>Every day software is pirated and new software protections are developed and attacked by software pirates </li></ul><ul><li>I think there will always be pirated software and pirates to sail the internet looking for software booty. </li></ul>
  16. 16. <ul><li>They cant wear those funny hooks because they’re to darn hard to type with!! </li></ul>What the Pirates Learned