SlideShare a Scribd company logo
1 of 18
Download to read offline
We believe we can change how people think of
software and their own value in this world. Our
  inspiration came from the world of humans.


Vatari is the Future standard of
      protecting software
Some of the DRM software used today
includes
  SecuROM
  Starforce
  SafeDisc / Safecast
  XCP (Extended Copy Protection)
  Tages
  Solidshield
  Ubisoft’s new Online Services Platform
  Metafortress
• Most  of it doesn’t last past few hours after the
title launch
• Some are extremely easy to bypass through key
generators or cracked executables
• Some put limits on the opportunity to play
• They all have limited management possibilities
• The toughest ones give publisher bad PR


• The best ones ensure at least few days of pirate
less sales after launch
• Simple  installation code dependency
• Centralized control point of protection
• Heavy generality throughout the protection.
• Identifiable protected parts in the code.
• Relying on the cracker’s low skills.
• Expecting that crackers will give it up soon.
• Trying to outsmart the smartest guys in the
field.
• Protections are designed as layers.
• No experience-based deterring system.
• No unique copy-per-customer technology.
• Doesn’t use centralized point of protection
(easiest point to crack into an application
protection layer)

• Doesn’tneed original source code to be able to
morph protection into it (injects the protection
code on the level of raw PE and PE+ executable)

• Creates
       unique executables for each machine
game should be played on

• Createssymbiotic code with original application
and is nearly impossible to detect (and hence
remove from) there
• Extremely  flexible management and configuration
tools (e.g. proper “no. of installs” solution)

• Characterof the protection makes the cracker to
manually reverse engineer it in order to remove all the
protection (estimates based on currently running test =
10-12 months)

• No online bugging the consumer after the installation
is finished

• However  needs one time online activation (but we
have “offline” solution too)
• Doesn’t use centralized point of protection
(easiest point to crack into an application
protection layer)

• Doesn’tneed original source code to be able to
morph protection into it (injects the protection
code on the level of raw PE and PE+ executable)

• Creates
       unique executables for each machine
game should be played on

• Createssymbiotic code with original application
and is nearly impossible to detect (and hence
remove from) there
;&7'"3.%>H8H6M%",5%/..0%O.#+3.
         ?%6$*"%8                       >"1"3)                O.#+6W4                O1"3R&3#.              8"9.*            4.1"R&313.**             QSM'0"(              O1."7@&3A*             U86<%
       !"#$%#&'(%)*%+,)-+.                   !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
         /0"1%2"(.3%4&5.0                    !                      "                      "                    "           )#*"&%+&#,%+(%%,%,             "                        "            !"#$%&'#(
     6",5&7%8$.&3(%!,9),.                    !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
      :&%;<=<><%3.-+)3.5                     !              )%&*-./+!0+#(12        !+3!"#0&'4%+#(125            "                    !                     !                        !            !"#$%&'#(
           ?&0(7&3'$)*7                      !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
     4&&,@"0A%*1."01$%#&5.                   !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
   ?"**)B.%'3&1.#C&,%&D.3.5                  !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
     /&3.,*)#%)5.,CE#"C&,          !+3&"6&7+"%898':1%5              "                      "                    "                    "                     "                        "            !"#$%&'#(
     <)3.#1%?!=?!F%),G.#C&,                  !               ;/+%(<9(%+*8%,         ;/+%(<9(%+*8%,     )#*"&%+&#,%+(%%,%,   )#*"&%+&#,%+(%%,%,           =>0              ;9"$*61+?91%+)28$%@    !"#$%&'#(
     H,C5.I+9%J%H,C.7+0             AB$"%@%12+8$"#(<           -9,9&*1#*8              0,46(&%,            -9,9&*1#*8               A682             -9,9&*1#*8               -9,9&*1#*8         !"#$%&'#(
:&%),1.3,.1K%H#CB"C&,%'&**)I0.L     !+3C#+0&'46$#"5                 "                      "                   =>0                   "                =#+D62E                       "            !"#$%&'#(
    6."#CB"C&,*%"*%,..5.5         !+3@6F#"+6(,+@9(#"5      .(12+G+6(,+$H6$I8+9$E        J9@9$%,                =>0                   "                   =>0                       =>0           !"#$%&'#(
    ?0"(),9%&,%5)D.3.,1%?;*         !+3K"64%1+@#,%5           G+'@%8+#(12L                 "                   =>0                   "                     !                        !            !"#$%&'#(
        M,*1",1%83)"0%7&5.                   !                      "                      "                    "                    "             MH%(+&"6&7%,+N5                  !            !"#$%&'#(
        N%?"3.,1"0%;&,13&0                   !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
          %%N%H0.31%O(*1.7                   !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
      %N%P.&2&#"C&,%H0.31                    !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
         N%6.7&1.%2&G"#A                     !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
     QOM<%5"1"I"*.%*+''&31                   !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
    6.R.3"0*%",5%4&CB"C&,*             !+3#O'#(615                  "                      "                    "                    "                     "                        "            P98$"9:*'#(
       ;&3'&3"1.%*&0+C&,*                    !                      "                !"#0&'4%+#(12              "                    "                     "                        "            !"#$%&'#(
     QOS%2"+,#$%8&A.,%A.(          !+3;9O%"+7%2Q+#O$L5              "                      "                    "                    "                     "                        "            !"#$%&'#(
        O&#)"0%,.1@&3A),9         !+3"%6,2+R#"+"%R%"6185            "                      "                    "                    "                     "                    !6"'6112         P98$"9:*'#(
           N;0&+5%*1&3"9.              !+36(2+S1%5                  "                      "                    "                    "           !6"'6112+3864%8+#(125              !              T#@R#"$
     <)9)1"0%O13),9%8.#$&0&9(      !+3R*112+8*OO#"$%,5              "                      "                    "                    "                     "                        "            !"#$%&'#(
    ?T?%:.1@&3A*%+C0)U"C&,             !+3#O'#(615                  "                      "                    "                    "                     "                        "            P98$"9:*'#(
      S)18&33.,1%+C0)U"C&,             !+3#O'#(615                  "                      "                    "                    "                     "                        "            P98$"9:*'#(
   <.#.,13"0)U.5%5)*13)I+C&,       !+3P)K+$%&H(#1#<25               "                      "                    "                    "                     "             !6"'6112+3P;PQ+)$%6@5   P98$"9:*'#(
     N%VV%.(+&19%($8+,%@6(,
    Standard “wrapper” protection
    Creates additional protective layer for the
     application
    All IN/OUT operations are redirected through
     own IDT table that creates zombie controlled
     application layer
    Vulnerability in operating memory, where it’s
     easy to trace frequent routine jumps to
     centralized control area
    Typical protection that lasts about 6 hours
    Most similar to Vatari, however…
    Needs application source code to create
     injected protection layer
    Uses centralized point of protection and
     libraries for digital signing, CRC32 control,
     memory control (CRC32 control can be
     switched of, integrity control module can be
     disabled too – both typical starting points for
     any cracker)
• New ground-breaking technology that learned
from the mistakes of the currently used
protections

• Difficult
         to break, and breaking one doesn’t
create generally usable crack solution

• Easy
     on consumer, especially compared to
SecuROM or Ubi protection

• Great   for both online and offline distribution

• We   promise you wouldn’t regret trying it!
Gamster Center
 Desktop client for end-user
 Allows complete management of games/applicatiopns portfolio
 Do we have web interface?


Torrent support
 Cost efficient data/content distribution
 Own torrent client
 Integrated Seed2See motivational program (seed and get points
to buy DLC or bonuses)
Cloud Storage
 Mirroring of selected files/folders on the server
 E.g. saved positions for those who travel or simply use
more computers

Trial functions for games/applications
 Vatari allows limited number of starts, time limited (as
play time or as calendar time)

Viper USB Key
 HW login into user account, allows installing and playing
games on other computers as long as USB is inserted
 “offline” activation of games/applications
Parental lock
 Allows e.g. set number of hours a game can be played
every day
 Includes alert system, that provides email alerts to parents
about played games
 Includes LoJack, remote disabling of game/application on
specific account or computer

Travel & Play
 Allows simultaneous installations on more devices, but
play only on one at a time

Social networking
 Twitter / Facebook updates
USID system
 Application on each machine is unique
 This allows forensic identification, passive software
protection, also identification for call center, etc.
andy.svakova@vatari.com
    www.vatari.com
   00 421 915 104 103

More Related Content

Recently uploaded

Teck Investor Presentation, April 24, 2024
Teck Investor Presentation, April 24, 2024Teck Investor Presentation, April 24, 2024
Teck Investor Presentation, April 24, 2024TeckResourcesLtd
 
Q3 FY24 Earnings Conference Call Presentation
Q3 FY24 Earnings Conference Call PresentationQ3 FY24 Earnings Conference Call Presentation
Q3 FY24 Earnings Conference Call PresentationSysco_Investors
 
Malad Escorts, (Pooja 09892124323), Malad Call Girls Service
Malad Escorts, (Pooja 09892124323), Malad Call Girls ServiceMalad Escorts, (Pooja 09892124323), Malad Call Girls Service
Malad Escorts, (Pooja 09892124323), Malad Call Girls ServicePooja Nehwal
 
Editing progress 20th march.docxxxxxxxxx
Editing progress 20th march.docxxxxxxxxxEditing progress 20th march.docxxxxxxxxx
Editing progress 20th march.docxxxxxxxxxMollyBrown86
 
BDSM⚡Call Girls in Hari Nagar Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Hari Nagar Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Hari Nagar Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Hari Nagar Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual serviceanilsa9823
 
Top Rated Call Girls In Podanur 📱 {7001035870} VIP Escorts Podanur
Top Rated Call Girls In Podanur 📱 {7001035870} VIP Escorts PodanurTop Rated Call Girls In Podanur 📱 {7001035870} VIP Escorts Podanur
Top Rated Call Girls In Podanur 📱 {7001035870} VIP Escorts Podanurdharasingh5698
 
Sustainability Leadership, April 26 2024
Sustainability Leadership, April 26 2024Sustainability Leadership, April 26 2024
Sustainability Leadership, April 26 2024TeckResourcesLtd
 
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our EscortsVIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escortssonatiwari757
 
Call Girls Chandigarh Just Call 8868886958 Top Class Call Girl Service Available
Call Girls Chandigarh Just Call 8868886958 Top Class Call Girl Service AvailableCall Girls Chandigarh Just Call 8868886958 Top Class Call Girl Service Available
Call Girls Chandigarh Just Call 8868886958 Top Class Call Girl Service AvailableSheetaleventcompany
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024CollectiveMining1
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Miyapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Miyapur high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Miyapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Miyapur high-profile Call Girladitipandeya
 
CALL ON ➥8923113531 🔝Call Girls Vineet Khand Lucknow best Night Fun service 🧦
CALL ON ➥8923113531 🔝Call Girls Vineet Khand Lucknow best Night Fun service  🧦CALL ON ➥8923113531 🔝Call Girls Vineet Khand Lucknow best Night Fun service  🧦
CALL ON ➥8923113531 🔝Call Girls Vineet Khand Lucknow best Night Fun service 🧦anilsa9823
 
B2 Interpret the brief.docxccccccccccccccc
B2 Interpret the brief.docxcccccccccccccccB2 Interpret the brief.docxccccccccccccccc
B2 Interpret the brief.docxcccccccccccccccMollyBrown86
 
Call Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In Amritsar
Call Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In AmritsarCall Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In Amritsar
Call Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In Amritsaronly4webmaster01
 

Recently uploaded (20)

Sensual Moments: +91 9999965857 Independent Call Girls Noida Delhi {{ Monika}...
Sensual Moments: +91 9999965857 Independent Call Girls Noida Delhi {{ Monika}...Sensual Moments: +91 9999965857 Independent Call Girls Noida Delhi {{ Monika}...
Sensual Moments: +91 9999965857 Independent Call Girls Noida Delhi {{ Monika}...
 
Call Girls 🫤 Nehru Place ➡️ 9999965857 ➡️ Delhi 🫦 Russian Escorts FULL ENJOY
Call Girls 🫤 Nehru Place ➡️ 9999965857  ➡️ Delhi 🫦  Russian Escorts FULL ENJOYCall Girls 🫤 Nehru Place ➡️ 9999965857  ➡️ Delhi 🫦  Russian Escorts FULL ENJOY
Call Girls 🫤 Nehru Place ➡️ 9999965857 ➡️ Delhi 🫦 Russian Escorts FULL ENJOY
 
Teck Investor Presentation, April 24, 2024
Teck Investor Presentation, April 24, 2024Teck Investor Presentation, April 24, 2024
Teck Investor Presentation, April 24, 2024
 
Rohini Sector 15 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 15 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 15 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 15 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
young call girls in Mahavir Nagar 🔝 9953056974 🔝 Delhi escort Service
young call girls in Mahavir Nagar 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Mahavir Nagar 🔝 9953056974 🔝 Delhi escort Service
young call girls in Mahavir Nagar 🔝 9953056974 🔝 Delhi escort Service
 
Q3 FY24 Earnings Conference Call Presentation
Q3 FY24 Earnings Conference Call PresentationQ3 FY24 Earnings Conference Call Presentation
Q3 FY24 Earnings Conference Call Presentation
 
Malad Escorts, (Pooja 09892124323), Malad Call Girls Service
Malad Escorts, (Pooja 09892124323), Malad Call Girls ServiceMalad Escorts, (Pooja 09892124323), Malad Call Girls Service
Malad Escorts, (Pooja 09892124323), Malad Call Girls Service
 
Editing progress 20th march.docxxxxxxxxx
Editing progress 20th march.docxxxxxxxxxEditing progress 20th march.docxxxxxxxxx
Editing progress 20th march.docxxxxxxxxx
 
Call Girls In Kalkaji 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Kalkaji 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Kalkaji 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Kalkaji 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
BDSM⚡Call Girls in Hari Nagar Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Hari Nagar Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Hari Nagar Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Hari Nagar Delhi >༒8448380779 Escort Service
 
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Fazullaganj Lucknow best sexual service
 
Top Rated Call Girls In Podanur 📱 {7001035870} VIP Escorts Podanur
Top Rated Call Girls In Podanur 📱 {7001035870} VIP Escorts PodanurTop Rated Call Girls In Podanur 📱 {7001035870} VIP Escorts Podanur
Top Rated Call Girls In Podanur 📱 {7001035870} VIP Escorts Podanur
 
Sustainability Leadership, April 26 2024
Sustainability Leadership, April 26 2024Sustainability Leadership, April 26 2024
Sustainability Leadership, April 26 2024
 
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our EscortsVIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
VIP Call Girl Amritsar 7001035870 Enjoy Call Girls With Our Escorts
 
Call Girls Chandigarh Just Call 8868886958 Top Class Call Girl Service Available
Call Girls Chandigarh Just Call 8868886958 Top Class Call Girl Service AvailableCall Girls Chandigarh Just Call 8868886958 Top Class Call Girl Service Available
Call Girls Chandigarh Just Call 8868886958 Top Class Call Girl Service Available
 
Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024Collective Mining | Corporate Presentation - April 2024
Collective Mining | Corporate Presentation - April 2024
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Miyapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Miyapur high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls Miyapur high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls Miyapur high-profile Call Girl
 
CALL ON ➥8923113531 🔝Call Girls Vineet Khand Lucknow best Night Fun service 🧦
CALL ON ➥8923113531 🔝Call Girls Vineet Khand Lucknow best Night Fun service  🧦CALL ON ➥8923113531 🔝Call Girls Vineet Khand Lucknow best Night Fun service  🧦
CALL ON ➥8923113531 🔝Call Girls Vineet Khand Lucknow best Night Fun service 🧦
 
B2 Interpret the brief.docxccccccccccccccc
B2 Interpret the brief.docxcccccccccccccccB2 Interpret the brief.docxccccccccccccccc
B2 Interpret the brief.docxccccccccccccccc
 
Call Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In Amritsar
Call Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In AmritsarCall Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In Amritsar
Call Girls In Amritsar 💯Call Us 🔝 76967 34778🔝 💃 Independent Escort In Amritsar
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

End of illegal copies

  • 1.
  • 2. We believe we can change how people think of software and their own value in this world. Our inspiration came from the world of humans. Vatari is the Future standard of protecting software
  • 3. Some of the DRM software used today includes SecuROM Starforce SafeDisc / Safecast XCP (Extended Copy Protection) Tages Solidshield Ubisoft’s new Online Services Platform Metafortress
  • 4. • Most of it doesn’t last past few hours after the title launch • Some are extremely easy to bypass through key generators or cracked executables • Some put limits on the opportunity to play • They all have limited management possibilities • The toughest ones give publisher bad PR • The best ones ensure at least few days of pirate less sales after launch
  • 5. • Simple installation code dependency • Centralized control point of protection • Heavy generality throughout the protection. • Identifiable protected parts in the code. • Relying on the cracker’s low skills. • Expecting that crackers will give it up soon. • Trying to outsmart the smartest guys in the field. • Protections are designed as layers. • No experience-based deterring system. • No unique copy-per-customer technology.
  • 6. • Doesn’t use centralized point of protection (easiest point to crack into an application protection layer) • Doesn’tneed original source code to be able to morph protection into it (injects the protection code on the level of raw PE and PE+ executable) • Creates unique executables for each machine game should be played on • Createssymbiotic code with original application and is nearly impossible to detect (and hence remove from) there
  • 7. • Extremely flexible management and configuration tools (e.g. proper “no. of installs” solution) • Characterof the protection makes the cracker to manually reverse engineer it in order to remove all the protection (estimates based on currently running test = 10-12 months) • No online bugging the consumer after the installation is finished • However needs one time online activation (but we have “offline” solution too)
  • 8. • Doesn’t use centralized point of protection (easiest point to crack into an application protection layer) • Doesn’tneed original source code to be able to morph protection into it (injects the protection code on the level of raw PE and PE+ executable) • Creates unique executables for each machine game should be played on • Createssymbiotic code with original application and is nearly impossible to detect (and hence remove from) there
  •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
  • 10.   Standard “wrapper” protection   Creates additional protective layer for the application   All IN/OUT operations are redirected through own IDT table that creates zombie controlled application layer   Vulnerability in operating memory, where it’s easy to trace frequent routine jumps to centralized control area   Typical protection that lasts about 6 hours
  • 11.   Most similar to Vatari, however…   Needs application source code to create injected protection layer   Uses centralized point of protection and libraries for digital signing, CRC32 control, memory control (CRC32 control can be switched of, integrity control module can be disabled too – both typical starting points for any cracker)
  • 12.
  • 13. • New ground-breaking technology that learned from the mistakes of the currently used protections • Difficult to break, and breaking one doesn’t create generally usable crack solution • Easy on consumer, especially compared to SecuROM or Ubi protection • Great for both online and offline distribution • We promise you wouldn’t regret trying it!
  • 14. Gamster Center  Desktop client for end-user  Allows complete management of games/applicatiopns portfolio  Do we have web interface? Torrent support  Cost efficient data/content distribution  Own torrent client  Integrated Seed2See motivational program (seed and get points to buy DLC or bonuses)
  • 15. Cloud Storage  Mirroring of selected files/folders on the server  E.g. saved positions for those who travel or simply use more computers Trial functions for games/applications  Vatari allows limited number of starts, time limited (as play time or as calendar time) Viper USB Key  HW login into user account, allows installing and playing games on other computers as long as USB is inserted  “offline” activation of games/applications
  • 16. Parental lock  Allows e.g. set number of hours a game can be played every day  Includes alert system, that provides email alerts to parents about played games  Includes LoJack, remote disabling of game/application on specific account or computer Travel & Play  Allows simultaneous installations on more devices, but play only on one at a time Social networking  Twitter / Facebook updates
  • 17. USID system  Application on each machine is unique  This allows forensic identification, passive software protection, also identification for call center, etc.
  • 18. andy.svakova@vatari.com www.vatari.com 00 421 915 104 103