SlideShare a Scribd company logo
1 of 66
Download to read offline
Ethical Hacking and
CountermeasuresCountermeasures
Version 6
Module L
Software Piracy and
Warez
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.moneyweb.co.za/
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://ap.google.com/article/
Module Objective
This module will familiarize you with:
• Software Activation
• Process of Software Activation
This module will familiarize you with:
• Piracy
• Impacts of piracy
• Dongles
• Software Piracy Protection Strategies
• Warez
• Warez Distribution Methods
T l• Tools
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Software Activation Impacts of piracy Warez
Process of Software
Dongles
Warez Distribution
Activation
Dongles
Methods
Software Piracy
Protection Strategies
ToolsPiracy
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Software ActivationSoftware Activation
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Software Activation: Introduction
Software activation is the process of obtaining a license for softwareSoftware activation is the process of obtaining a license for software
so that it becomes active and ready to be used on the computer
This can be done automatically over the Internet or manually byThis can be done automatically over the Internet or manually by
phone, fax, or email
Only that software can be activated for which the license has alreadyO y a so a e ca be ac a ed o c e ce se as a eady
been purchased
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Process of Software Activation
• the software vendors register with the Software Activation Service
(SAS)
1 (SAS)
• After activation of the account of the software, the vendor can
2
te act vat o o t e accou t o t e so twa e, t e ve do ca
operate the account and generate Product Keys for their products
using the SAS website
3
• These Product Keys are then integrated with the vendor’s software
4
• Each copy of the software is labeled with the Product Key and sold
to the end-users
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
4
Process of Software Activation
(cont’d)(cont d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Process of Software Activation
(cont’d)(cont d)
• The end-user buys or downloads the product from the vendor and installs it on a
t
5 computer
• During installation, an Authentication Number consisting of the unique
6
During installation, an Authentication Number consisting of the unique
Computer ID and time stamp is sent from the end-user’s computer along with
the Product Key to the Software Activation Service
7
• Product Key and Authentication Number are validated and a License Key is sent
to the end-user’s computer
8
• Now the end-user can start using the software
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
8
Process of Software Activation
(cont’d)(cont d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
PiracyPiracy
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://business.scotsman.com/
Piracy
Software piracy is the illegal distribution and/or
reproduction of a product for business or personal use
Each of the following activity is a form of software
piracy:
• An individual copying software for a friend
• A business under-reporting the number of computers using
the software
S di d d f i d• Sending your username and password to friends
• Downloading cracks or key generators to by-pass security
features
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Piracy Over Internet
Internet piracy is the uploading of commercial software on to the Internet for
anyone to copy commercial software from any of the servicesy py y
It includes making available the pirated software over the Internet and offering
it for sale
Internet piracy is the most rapidly expanding type of piracy and the most
difficult form to combat
• Auction Site Piracy
Internet piracy can take many forms:
Auction Site Piracy
• This type of piracy occurs when seller burns software on to CD-ROMs,
and offers it for online selling
• Bulletin Board Services & News group piracy
• FTP Sites
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
FTP Sites
• In this, FTP allows the pirates to download or upload the files to the site
Piracy Over Internet
Auction Site
Piracy
Sample of
FTP pirates
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.siia.net/
Piracy Over Internet
• A website that allows users to download
commercial/legitimate software for free ofWarez commercial/legitimate software for free of
charge
Warez
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.siia.net/
Piracy Over Internet
Peer-to-Peer
• Due to the distributed and anonymous nature of P2P sites,
these are used for distribution of unauthorized software and
contentcontent
Cracks/Serial Numbers sites
• Cracks are small files that circumvent copyright protection and
the key generator is an application that uses the serial number
or CD key-generating algorithm to create fakeor CD key-generating algorithm to create fake
Internet Relay Chat
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Piracy Over Internet (cont’d)
Site provides crack
and serial number
services
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.siia.net/
Abusive Copies
Abusive Copies occur when a single legitimately acquired CD
d l d d i f ft i d t i t llor downloaded version of a software program is used to install
the software on multiple PC's
The original copy of the software is licensed to be installed
only on a single machine or to be used by no more than one
person at a time
A large percentage of abusive copies are made by users who
would purchase licensed copies if they do not have an option
of making an abusive copyof making an abusive copy
Installation of an abusive copy is convenient rather than lack
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
py
of motivation or resources to purchase
Pirated Copies
Pirated copies are unlicensed physical copies of an original program
CD h f d d ld b illi i f i dCD that are manufactured and sold by an illicit manufacturing and
distribution operation
They are misrepresented to the end-user as legitimate versions of
the program and sold at close to full price
They are also grouped with several other programs on a CD in a
clearly pirated and typically steeply discounted bundle
Fake pirated copies are a major income loss for software companies
i h t l t f ll t il i th t ld th i b
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
since purchases at close to full retail price that would otherwise be
routed through the legitimate distribution system are being lost
Cracked Copies
These are the original copies of the software that are
modified by crackers to prevent any copyright protection
mechanism that may have been implemented in the program
The modification is performed by disassembling the
executable program and searching for copyrighted segments
Those segments are then directly modified to disable them
Cracked versions of programs are distributed in an
underground fashion on the Internet
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Impacts of Piracy
Local software companies have lost their
income by competition with pirated softwarey p p
from abroad
Government lost tax revenuesGovernment lost tax revenues
Most of the employees lost their jobs due top y j
lack of a legitimate market
By using Internet and Peer-to-Peer (P2P)y us g te et a d ee to ee ( )
networks piracy rates has been increased
Over 60% of Internet traffic is driven by P2P
d l d h h l l h h l l f
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
downloading which clearly shows the level of
piracy on Internet
Software Piracy Rate in 2006
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Software Piracy rates in the year 2006 Source: http://arstechnica.com
Piracy Blocking
Piracy is not neutral like other infrastructural modes but
di h di h k d i d fmediates the media that work under its command of
reproduction
piracy requires particular conditions for recording, transmitting
and retrieving data
Constant copying wears down data storage, degrading image
and sound, disturbing the signal of media content with the noise
produced by the means of reproductionproduced by the means of reproduction
Dealers involve s in pirated media by reproduction of original
cop and recording data on cheap tapes b the use of poor
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
copy and recording data on cheap tapes by the use of poor
quality machines
Software Copy Protection
BackgroundersBackgrounders
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.thisdayonline.com/
CD Key Numbers
CD key is a software activation number that
ll t i t ll ft th PCallow user to install software on the PC
It is supplied by the software vendor with
the CD as a label attached to the case
User must enter the CD key during theUser must enter the CD key during the
installation of software
The CD key number entered by the userThe CD key number entered by the user
must match the pattern stored the on CD
Sometime this CD key is different for each
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
y
user or sometime it is only different for the
different production runs of the software
CD Key Numbers (cont’d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Dongles
This is a copy protection mechanism used by some
application
It is hardware device used to connect printer port, USB portp p , p
or serial port on a PC
It checks to see that the correct dongle in place whenIt checks to see that the correct dongle in place when
protected media starts
These are more difficult to install and use because theyThese are more difficult to install and use because they
require special hardware driver
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
They can work with the use of printer and scanner
Media Limited Installations
Media Limited Installations is a copy protection mechanism used
b f li iby software applications
It referred to as the Media Limited method, because it requires
the program can be installed from a re writable media such as athe program can be installed from a re-writable media such as a
floppy disc
The installation program counts each installation to an installThe installation program counts each installation to an install
counter on the re-writable media
When the specified installation counter is exceed then noWhen the specified installation counter is exceed then no
additional installation will be allowed
It requires a floppy disc that cannot be copied by normal accessible
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
It requires a floppy disc that cannot be copied by normal accessible
disk copying methods.
Protected Media
It is a copy protection mechanism used by someIt is a copy protection mechanism used by some
software applications
This mechanism requires the computer must contain a
CD-ROM to allow software operations
When program is start, this method will check for the
presence of the CD every certain number of times
This mechanism need the installation media must be
manufactured in a manner that cannot be copied by
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
manufactured in a manner that cannot be copied by
normal accessible disk copying methods
Hidden Serial Numbers
It is a copy protection mechanism that creates a pseudo-random serial number after installation and
hides the number on the PC
The serial number is hidden in either an encrypted file or in a special system file location like the registry
The user must complete registration process to allow full operation of the programThe user must complete registration process to allow full operation of the program
During the registration, the user sends the serial number into the application vendor, who verifies that
this user is a legitimate
The application vendor then sends the customer with the correct password for that serial number
When the application starts, it reads the value of the serial number and checks that the password entered
by the user for that serial number is correct or notby o b o o o
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Digital Right Management
(DRM)(DRM)
DRM restricts the use of digital files in order to protect the
i t t f i ht h ldinterests of copyright holders
DRM technologies can control file access, altering, sharing,
i i ti d icopying, printing, and saving
DRM technology may be contained within the operating system,
f i h l h d f d iprogram software, or in the actual hardware of a device
Some DRM technologies have been developed with little scope for
i iprivacy protection
DRM systems can prevent the anonymous consumption of
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
content
Copy Protection for DVD
The copy protection system tries to prevent illicit copies from
being made from either the analog or digital I/O channels of DVDbeing made from either the analog or digital I/O channels of DVD
recorders
The DVD copy protection system is designed to support a copy
generation management system
This requires at least two bits of information to be associated with
a piece of video indicating one of the following copy states:
• Copy_never
• Copy_once
• Copy_no_more
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
py_ _
• Copy_freely
WarezWarez
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source:
http://www.informationweek.com/news/
Warez
Warez is used by software "pirates" to describe software
that has been stripped of its copy-protection and made
available on the Internet for downloadingavailable on the Internet for downloading
The most popular downloads at warez sites includep p
applications from major vendors such as Microsoft,
Symantec, Macromedia, and Adobe Systems
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Types of Warez
Apps / Appz
Cracks / Crackz
Games / Gamez
iMoviez
NoCD/NoDVD/FixedExe
TV-Rips
Mp3Mp3
E-Bookz/ebooks/e-books
Scriptz
TemplatesTemplates
DOX
0-Day Warez
MVids
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Warez Distribution
Warez is distributed by the cracker or cracking crew, it is then compiled and
lit i t i fil f isplit into .rar or .zip files for compression
An “ nfo or file id diz” is created to promote who created the releaseAn .nfo or file_id.diz is created to promote who created the release
The release is moved to the of couriers group, then they will upload it tog p y p
private FTP server known as Topsites
Release then downloaded by the users of FTP server and spread to IRCy p
channels, sharing sites and to p2p protocols such as BitTorren
From there the release can be downloaded by millions of users all over the
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
From there the release can be downloaded by millions of users all over the
world
Distribution Methods
Mail
Modem
File Transfer Protocol (FTP) and File eXchange Protocol
(FXP)
Xabi Direct Client Connection
Hypertext Transfer Protocol (HTTP)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Peer-to-peer (P2P) clients such as eMule (ED2K) Limewire,
Warez P2P (iP2P), and BitTorrent (BT)
ToolsTools
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Crypkey
http://www.crypkey.com/p // yp y /
CrypKey is a leading global provider of software copy protection and licenseCrypKey is a leading global provider of software copy protection and license
management solutions
CrypKey products are PC-compatible, including Windows 98, Windows NT,
Windows 2000, Windows 2003, Windows ME, and Windows XP
CrypKey protection intelligently manages network licensing on Microsoft
networks
CrypKey protection is fully compatible with all installer systems on the market
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Crypkey: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EnTrial Tool
The EnTrial Administrator is used to create a unique Generated Code
d U l k K f h d t/ k i t ll tiand Unlock Key for each product/package installation
Personal ID:
• It is unique for each computer
• It is a combination of both hardware and software that compose the
installation computerinstallation computer
Generated Code:
• The Generated Code is "baseline" from which the "Unlock Key" is created
Unlock Key:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Unlock Key is created using the Personal ID and the Generated Code
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EnTrial Tool: Distribution File
Along with the required EnTrial binaries a EnTrialAlong with the required EnTrial binaries, a EnTrial
Distribution file is required in each software
distribution created
After creating the basic package, information ing p g
the Distribution File Creation GUI can be filled out
Create the Distribution (trr) File by clicking the
"Save As Application Reference File"
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
pp
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EnTrial Tool: Distribution File
EnTrial SDK will record the date and time that the software runs for the first
timetime
The SDK will return the remaining number of trial days to the software
SDK will return the following:
• Expiration Date
• Number of Trials
• Demo
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EnTrial Tool: Product & Package
Initialization DialogInitialization Dialog
Products and Package information that is entered in the Initialization
Dialog:Dialog:
Product Name:
• For a consistent user experience, each product should be named according to the name of the
software applicationpp
Product ID:
• The Product ID should be an alpha-numeric string
Licensing:
• EnTrial is licensed per product
Package Name:
• Packages can be named as to their functionality such as "20 user Add-On“
Package Code:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Package Code:
• The Package Code should be an alpha-numeric string
Product & Package Initialization
Dialog: ScreenshotDialog: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EnTrial Tool: Add Package GUI
Click the Packages link on the Distribution Files Tab to bring up the Add
Package GUIPackage GUI
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tool: DF_ProtectionKit
This is a software toolkit that allow any developer to protect its developed software
against piracy and illegal copies in one single row of codeg p y g p g
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Crack Killer
Crack Killer is a database application that enables software
authors to track and report web sites hosting cracks serials andauthors to track and report web sites hosting cracks, serials, and
pirated versions of their software
It uses a solid database engine that keeps track of active andg p
inactive pirate software sites
Software vendors can use this software to track sites thatSoftware vendors can use this software to track sites that
contain links to pirated versions of their software
After entering the sites and e-mail contacts for these sites, theyAfter entering the sites and e mail contacts for these sites, they
can send a tailored complaint notice
CA l i i l b
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
DMCA complaint notices can also be sent
Crack Killer: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Logic Protect
Logic Protect is a reliable anti-piracy, copy protection,Logic Protect is a reliable anti piracy, copy protection,
software activation, and license management system
It provides high level of security and protection against illegal
software copying and distribution
It offers unprecedented level of protection for applications
that require access to Internet
It supports all kinds of software activation (including Phone
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
pp ( g
Activation and Software-as-a-Service (SaaS) features)
Logic Protect: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Software License Manager
Software License Manager is used to store important information about yourg p y
applications
It provides security for information such as:It provides security for information such as:
Serial numbers
Software information
Vendor information
License information
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Billing information
Software License Manager:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Quick License Manager
Quick License Manager creates professional and secureQuick License Manager creates professional and secure
license keys to protect your software against piracy
It creates permanent or evaluation (trial) license keys in a
snap
It can create generic keys that are not bound to a PC or
computer-bound license keys
With Quick License Manager, you can add licensing to your
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Q g , y g y
software application in less than 1 hour
Quick License Manager:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tool: WTM CD Protect
WTM CD Protect Protect our CD against illegal copWTM CD Protect - Protect your CD against illegal copy
It provides more profit with less illegal copies
It is used to create your own copy protection for your
music, video, or data cds
This copy protection system is easy to use and has a
strong protection
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
strong protection
WTM CD Protect: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
Software activation is the process of obtaining a license for software
so that it becomes active and ready to be used on the computer
Software piracy is the illegal distribution and/or reproduction of a
product for business or personal use
Some software applications use a copy protection mechanism which
is referred by end-users as a Dongle
Warez is used by software "pirates" to describe software that has been
stripped of its copy-protection and made available on the Internet for
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
stripped of its copy protection and made available on the Internet for
downloading
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

More Related Content

What's hot (20)

File000152
File000152File000152
File000152
 
File000150
File000150File000150
File000150
 
File000142
File000142File000142
File000142
 
Ce hv6 module 62 case studies
Ce hv6 module 62 case studiesCe hv6 module 62 case studies
Ce hv6 module 62 case studies
 
File000148
File000148File000148
File000148
 
File000151
File000151File000151
File000151
 
File000138
File000138File000138
File000138
 
Ce hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetCe hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internet
 
File000139
File000139File000139
File000139
 
File000149
File000149File000149
File000149
 
File000143
File000143File000143
File000143
 
File000144
File000144File000144
File000144
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilities
 
Ceh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingCeh v5 module 22 penetration testing
Ceh v5 module 22 penetration testing
 
File000175
File000175File000175
File000175
 
Ceh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceCeh v5 module 08 denial of service
Ceh v5 module 08 denial of service
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
 
CHFI 1
CHFI 1CHFI 1
CHFI 1
 
Ceh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypotCeh v5 module 19 evading ids firewall and honeypot
Ceh v5 module 19 evading ids firewall and honeypot
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 

Similar to Ce hv6 module 50 software piracy and warez

iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTjonspav
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software PiracyHeather Bauer
 
Ce hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesCe hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesVi Tính Hoàng Nam
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Propertymanagement 2
 
Ce hv8 module 18 buffer overflow
Ce hv8 module 18 buffer overflowCe hv8 module 18 buffer overflow
Ce hv8 module 18 buffer overflowMehrdad Jingoism
 
SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTHunny Jummani
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnovDetecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnovEric Vanderburg
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkwokk1d337
 
Ce hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsCe hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsVi Tính Hoàng Nam
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfRijuDasgupta
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software PiracyPallavi Agarwal
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesSejahtera Affif
 
Understanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksUnderstanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksCyphort
 

Similar to Ce hv6 module 50 software piracy and warez (20)

iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software Piracy
 
Soft piracy
Soft piracySoft piracy
Soft piracy
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Ce hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesCe hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniques
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Property
 
Ce hv8 module 18 buffer overflow
Ce hv8 module 18 buffer overflowCe hv8 module 18 buffer overflow
Ce hv8 module 18 buffer overflow
 
SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENT
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnovDetecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
 
Ce hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwordsCe hv6 module 59 how to steal passwords
Ce hv6 module 59 how to steal passwords
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdf
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 
Ce hv6 module 63 botnets
Ce hv6 module 63 botnetsCe hv6 module 63 botnets
Ce hv6 module 63 botnets
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Impacts of ICT on social effects
Impacts of ICT on social effectsImpacts of ICT on social effects
Impacts of ICT on social effects
 
Spyware
SpywareSpyware
Spyware
 
Understanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksUnderstanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value Attacks
 

More from Vi Tính Hoàng Nam

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)Vi Tính Hoàng Nam
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)Vi Tính Hoàng Nam
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnVi Tính Hoàng Nam
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108Vi Tính Hoàng Nam
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesVi Tính Hoàng Nam
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQVi Tính Hoàng Nam
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EVi Tính Hoàng Nam
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhVi Tính Hoàng Nam
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhVi Tính Hoàng Nam
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhVi Tính Hoàng Nam
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhVi Tính Hoàng Nam
 

More from Vi Tính Hoàng Nam (20)

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
 
Catalogue 2015
Catalogue 2015Catalogue 2015
Catalogue 2015
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
 
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁTCATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
 
Các loại cáp mạng
Các loại cáp mạngCác loại cáp mạng
Các loại cáp mạng
 
Catalogue 10-2014-new
Catalogue 10-2014-newCatalogue 10-2014-new
Catalogue 10-2014-new
 
Qtx 6404
Qtx 6404Qtx 6404
Qtx 6404
 
Camera QTX-1210
Camera QTX-1210Camera QTX-1210
Camera QTX-1210
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Ce hv6 module 50 software piracy and warez

  • 1. Ethical Hacking and CountermeasuresCountermeasures Version 6 Module L Software Piracy and Warez
  • 2. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.moneyweb.co.za/
  • 3. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://ap.google.com/article/
  • 4. Module Objective This module will familiarize you with: • Software Activation • Process of Software Activation This module will familiarize you with: • Piracy • Impacts of piracy • Dongles • Software Piracy Protection Strategies • Warez • Warez Distribution Methods T l• Tools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 5. Module Flow Software Activation Impacts of piracy Warez Process of Software Dongles Warez Distribution Activation Dongles Methods Software Piracy Protection Strategies ToolsPiracy EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 6. Software ActivationSoftware Activation EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 7. Software Activation: Introduction Software activation is the process of obtaining a license for softwareSoftware activation is the process of obtaining a license for software so that it becomes active and ready to be used on the computer This can be done automatically over the Internet or manually byThis can be done automatically over the Internet or manually by phone, fax, or email Only that software can be activated for which the license has alreadyO y a so a e ca be ac a ed o c e ce se as a eady been purchased EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 8. Process of Software Activation • the software vendors register with the Software Activation Service (SAS) 1 (SAS) • After activation of the account of the software, the vendor can 2 te act vat o o t e accou t o t e so twa e, t e ve do ca operate the account and generate Product Keys for their products using the SAS website 3 • These Product Keys are then integrated with the vendor’s software 4 • Each copy of the software is labeled with the Product Key and sold to the end-users EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited 4
  • 9. Process of Software Activation (cont’d)(cont d) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 10. Process of Software Activation (cont’d)(cont d) • The end-user buys or downloads the product from the vendor and installs it on a t 5 computer • During installation, an Authentication Number consisting of the unique 6 During installation, an Authentication Number consisting of the unique Computer ID and time stamp is sent from the end-user’s computer along with the Product Key to the Software Activation Service 7 • Product Key and Authentication Number are validated and a License Key is sent to the end-user’s computer 8 • Now the end-user can start using the software EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited 8
  • 11. Process of Software Activation (cont’d)(cont d) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 12. PiracyPiracy EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 13. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://business.scotsman.com/
  • 14. Piracy Software piracy is the illegal distribution and/or reproduction of a product for business or personal use Each of the following activity is a form of software piracy: • An individual copying software for a friend • A business under-reporting the number of computers using the software S di d d f i d• Sending your username and password to friends • Downloading cracks or key generators to by-pass security features EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 15. Piracy Over Internet Internet piracy is the uploading of commercial software on to the Internet for anyone to copy commercial software from any of the servicesy py y It includes making available the pirated software over the Internet and offering it for sale Internet piracy is the most rapidly expanding type of piracy and the most difficult form to combat • Auction Site Piracy Internet piracy can take many forms: Auction Site Piracy • This type of piracy occurs when seller burns software on to CD-ROMs, and offers it for online selling • Bulletin Board Services & News group piracy • FTP Sites EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited FTP Sites • In this, FTP allows the pirates to download or upload the files to the site
  • 16. Piracy Over Internet Auction Site Piracy Sample of FTP pirates EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.siia.net/
  • 17. Piracy Over Internet • A website that allows users to download commercial/legitimate software for free ofWarez commercial/legitimate software for free of charge Warez EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.siia.net/
  • 18. Piracy Over Internet Peer-to-Peer • Due to the distributed and anonymous nature of P2P sites, these are used for distribution of unauthorized software and contentcontent Cracks/Serial Numbers sites • Cracks are small files that circumvent copyright protection and the key generator is an application that uses the serial number or CD key-generating algorithm to create fakeor CD key-generating algorithm to create fake Internet Relay Chat EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 19. Piracy Over Internet (cont’d) Site provides crack and serial number services EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.siia.net/
  • 20. Abusive Copies Abusive Copies occur when a single legitimately acquired CD d l d d i f ft i d t i t llor downloaded version of a software program is used to install the software on multiple PC's The original copy of the software is licensed to be installed only on a single machine or to be used by no more than one person at a time A large percentage of abusive copies are made by users who would purchase licensed copies if they do not have an option of making an abusive copyof making an abusive copy Installation of an abusive copy is convenient rather than lack EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited py of motivation or resources to purchase
  • 21. Pirated Copies Pirated copies are unlicensed physical copies of an original program CD h f d d ld b illi i f i dCD that are manufactured and sold by an illicit manufacturing and distribution operation They are misrepresented to the end-user as legitimate versions of the program and sold at close to full price They are also grouped with several other programs on a CD in a clearly pirated and typically steeply discounted bundle Fake pirated copies are a major income loss for software companies i h t l t f ll t il i th t ld th i b EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited since purchases at close to full retail price that would otherwise be routed through the legitimate distribution system are being lost
  • 22. Cracked Copies These are the original copies of the software that are modified by crackers to prevent any copyright protection mechanism that may have been implemented in the program The modification is performed by disassembling the executable program and searching for copyrighted segments Those segments are then directly modified to disable them Cracked versions of programs are distributed in an underground fashion on the Internet EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 23. Impacts of Piracy Local software companies have lost their income by competition with pirated softwarey p p from abroad Government lost tax revenuesGovernment lost tax revenues Most of the employees lost their jobs due top y j lack of a legitimate market By using Internet and Peer-to-Peer (P2P)y us g te et a d ee to ee ( ) networks piracy rates has been increased Over 60% of Internet traffic is driven by P2P d l d h h l l h h l l f EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited downloading which clearly shows the level of piracy on Internet
  • 24. Software Piracy Rate in 2006 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Software Piracy rates in the year 2006 Source: http://arstechnica.com
  • 25. Piracy Blocking Piracy is not neutral like other infrastructural modes but di h di h k d i d fmediates the media that work under its command of reproduction piracy requires particular conditions for recording, transmitting and retrieving data Constant copying wears down data storage, degrading image and sound, disturbing the signal of media content with the noise produced by the means of reproductionproduced by the means of reproduction Dealers involve s in pirated media by reproduction of original cop and recording data on cheap tapes b the use of poor EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited copy and recording data on cheap tapes by the use of poor quality machines
  • 26. Software Copy Protection BackgroundersBackgrounders EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 27. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.thisdayonline.com/
  • 28. CD Key Numbers CD key is a software activation number that ll t i t ll ft th PCallow user to install software on the PC It is supplied by the software vendor with the CD as a label attached to the case User must enter the CD key during theUser must enter the CD key during the installation of software The CD key number entered by the userThe CD key number entered by the user must match the pattern stored the on CD Sometime this CD key is different for each EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited y user or sometime it is only different for the different production runs of the software
  • 29. CD Key Numbers (cont’d) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 30. Dongles This is a copy protection mechanism used by some application It is hardware device used to connect printer port, USB portp p , p or serial port on a PC It checks to see that the correct dongle in place whenIt checks to see that the correct dongle in place when protected media starts These are more difficult to install and use because theyThese are more difficult to install and use because they require special hardware driver EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited They can work with the use of printer and scanner
  • 31. Media Limited Installations Media Limited Installations is a copy protection mechanism used b f li iby software applications It referred to as the Media Limited method, because it requires the program can be installed from a re writable media such as athe program can be installed from a re-writable media such as a floppy disc The installation program counts each installation to an installThe installation program counts each installation to an install counter on the re-writable media When the specified installation counter is exceed then noWhen the specified installation counter is exceed then no additional installation will be allowed It requires a floppy disc that cannot be copied by normal accessible EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited It requires a floppy disc that cannot be copied by normal accessible disk copying methods.
  • 32. Protected Media It is a copy protection mechanism used by someIt is a copy protection mechanism used by some software applications This mechanism requires the computer must contain a CD-ROM to allow software operations When program is start, this method will check for the presence of the CD every certain number of times This mechanism need the installation media must be manufactured in a manner that cannot be copied by EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited manufactured in a manner that cannot be copied by normal accessible disk copying methods
  • 33. Hidden Serial Numbers It is a copy protection mechanism that creates a pseudo-random serial number after installation and hides the number on the PC The serial number is hidden in either an encrypted file or in a special system file location like the registry The user must complete registration process to allow full operation of the programThe user must complete registration process to allow full operation of the program During the registration, the user sends the serial number into the application vendor, who verifies that this user is a legitimate The application vendor then sends the customer with the correct password for that serial number When the application starts, it reads the value of the serial number and checks that the password entered by the user for that serial number is correct or notby o b o o o EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 34. Digital Right Management (DRM)(DRM) DRM restricts the use of digital files in order to protect the i t t f i ht h ldinterests of copyright holders DRM technologies can control file access, altering, sharing, i i ti d icopying, printing, and saving DRM technology may be contained within the operating system, f i h l h d f d iprogram software, or in the actual hardware of a device Some DRM technologies have been developed with little scope for i iprivacy protection DRM systems can prevent the anonymous consumption of EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited content
  • 35. Copy Protection for DVD The copy protection system tries to prevent illicit copies from being made from either the analog or digital I/O channels of DVDbeing made from either the analog or digital I/O channels of DVD recorders The DVD copy protection system is designed to support a copy generation management system This requires at least two bits of information to be associated with a piece of video indicating one of the following copy states: • Copy_never • Copy_once • Copy_no_more EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited py_ _ • Copy_freely
  • 36. WarezWarez EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 37. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.informationweek.com/news/
  • 38. Warez Warez is used by software "pirates" to describe software that has been stripped of its copy-protection and made available on the Internet for downloadingavailable on the Internet for downloading The most popular downloads at warez sites includep p applications from major vendors such as Microsoft, Symantec, Macromedia, and Adobe Systems EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 39. Types of Warez Apps / Appz Cracks / Crackz Games / Gamez iMoviez NoCD/NoDVD/FixedExe TV-Rips Mp3Mp3 E-Bookz/ebooks/e-books Scriptz TemplatesTemplates DOX 0-Day Warez MVids EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 40. Warez Distribution Warez is distributed by the cracker or cracking crew, it is then compiled and lit i t i fil f isplit into .rar or .zip files for compression An “ nfo or file id diz” is created to promote who created the releaseAn .nfo or file_id.diz is created to promote who created the release The release is moved to the of couriers group, then they will upload it tog p y p private FTP server known as Topsites Release then downloaded by the users of FTP server and spread to IRCy p channels, sharing sites and to p2p protocols such as BitTorren From there the release can be downloaded by millions of users all over the EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited From there the release can be downloaded by millions of users all over the world
  • 41. Distribution Methods Mail Modem File Transfer Protocol (FTP) and File eXchange Protocol (FXP) Xabi Direct Client Connection Hypertext Transfer Protocol (HTTP) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Peer-to-peer (P2P) clients such as eMule (ED2K) Limewire, Warez P2P (iP2P), and BitTorrent (BT)
  • 42. ToolsTools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 43. Tool: Crypkey http://www.crypkey.com/p // yp y / CrypKey is a leading global provider of software copy protection and licenseCrypKey is a leading global provider of software copy protection and license management solutions CrypKey products are PC-compatible, including Windows 98, Windows NT, Windows 2000, Windows 2003, Windows ME, and Windows XP CrypKey protection intelligently manages network licensing on Microsoft networks CrypKey protection is fully compatible with all installer systems on the market EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 44. Crypkey: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 45. EnTrial Tool The EnTrial Administrator is used to create a unique Generated Code d U l k K f h d t/ k i t ll tiand Unlock Key for each product/package installation Personal ID: • It is unique for each computer • It is a combination of both hardware and software that compose the installation computerinstallation computer Generated Code: • The Generated Code is "baseline" from which the "Unlock Key" is created Unlock Key: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Unlock Key is created using the Personal ID and the Generated Code
  • 46. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 47. EnTrial Tool: Distribution File Along with the required EnTrial binaries a EnTrialAlong with the required EnTrial binaries, a EnTrial Distribution file is required in each software distribution created After creating the basic package, information ing p g the Distribution File Creation GUI can be filled out Create the Distribution (trr) File by clicking the "Save As Application Reference File" EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited pp
  • 48. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 49. EnTrial Tool: Distribution File EnTrial SDK will record the date and time that the software runs for the first timetime The SDK will return the remaining number of trial days to the software SDK will return the following: • Expiration Date • Number of Trials • Demo EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 50. EnTrial Tool: Product & Package Initialization DialogInitialization Dialog Products and Package information that is entered in the Initialization Dialog:Dialog: Product Name: • For a consistent user experience, each product should be named according to the name of the software applicationpp Product ID: • The Product ID should be an alpha-numeric string Licensing: • EnTrial is licensed per product Package Name: • Packages can be named as to their functionality such as "20 user Add-On“ Package Code: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Package Code: • The Package Code should be an alpha-numeric string
  • 51. Product & Package Initialization Dialog: ScreenshotDialog: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 52. EnTrial Tool: Add Package GUI Click the Packages link on the Distribution Files Tab to bring up the Add Package GUIPackage GUI EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 53. Tool: DF_ProtectionKit This is a software toolkit that allow any developer to protect its developed software against piracy and illegal copies in one single row of codeg p y g p g EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 54. Tool: Crack Killer Crack Killer is a database application that enables software authors to track and report web sites hosting cracks serials andauthors to track and report web sites hosting cracks, serials, and pirated versions of their software It uses a solid database engine that keeps track of active andg p inactive pirate software sites Software vendors can use this software to track sites thatSoftware vendors can use this software to track sites that contain links to pirated versions of their software After entering the sites and e-mail contacts for these sites, theyAfter entering the sites and e mail contacts for these sites, they can send a tailored complaint notice CA l i i l b EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited DMCA complaint notices can also be sent
  • 55. Crack Killer: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 56. Tool: Logic Protect Logic Protect is a reliable anti-piracy, copy protection,Logic Protect is a reliable anti piracy, copy protection, software activation, and license management system It provides high level of security and protection against illegal software copying and distribution It offers unprecedented level of protection for applications that require access to Internet It supports all kinds of software activation (including Phone EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited pp ( g Activation and Software-as-a-Service (SaaS) features)
  • 57. Logic Protect: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 58. Tool: Software License Manager Software License Manager is used to store important information about yourg p y applications It provides security for information such as:It provides security for information such as: Serial numbers Software information Vendor information License information EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Billing information
  • 59. Software License Manager: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 60. Tool: Quick License Manager Quick License Manager creates professional and secureQuick License Manager creates professional and secure license keys to protect your software against piracy It creates permanent or evaluation (trial) license keys in a snap It can create generic keys that are not bound to a PC or computer-bound license keys With Quick License Manager, you can add licensing to your EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Q g , y g y software application in less than 1 hour
  • 61. Quick License Manager: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 62. Tool: WTM CD Protect WTM CD Protect Protect our CD against illegal copWTM CD Protect - Protect your CD against illegal copy It provides more profit with less illegal copies It is used to create your own copy protection for your music, video, or data cds This copy protection system is easy to use and has a strong protection EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited strong protection
  • 63. WTM CD Protect: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 64. Summary Software activation is the process of obtaining a license for software so that it becomes active and ready to be used on the computer Software piracy is the illegal distribution and/or reproduction of a product for business or personal use Some software applications use a copy protection mechanism which is referred by end-users as a Dongle Warez is used by software "pirates" to describe software that has been stripped of its copy-protection and made available on the Internet for EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited stripped of its copy protection and made available on the Internet for downloading
  • 65. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 66. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited