Software Piracy: Guide


SUBMITTED BY: Biohazard

DATE: Sept. 6, 2015, 2:51 a.m.

FORMAT: Text only

SIZE: 60.5 kB

HITS: 1326

  1. Software Piracy in the Information Age
  2. Index
  3. 1. Introduction
  4. 2. Software piracy methods
  5. 3. Small scale piracy methods
  6. 4. Large scale piracy methods
  7. 4.1. BBS
  8. 4.2. Internet
  9. 4.3. IRC
  10. FTP offers
  11. Trading
  12. Offerbots
  13. 4.4. Ftp sites
  14. 4.5. Usenet
  15. 4.6. Email
  16. 4.7. WWW
  17. 5. Commercial piracy
  18. 5.1. CDR
  19. 6. Copyprotection
  20. 6.1. Hardware protection
  21. 6.2. Software protection
  22. Serials
  23. CD-keys
  24. Manual check
  25. Registration
  26. Limiting installations
  27. Certificates
  28. 7. Anti-piracy organizations
  29. 7.1. Legal measures
  30. 7.2. Corporate audits
  31. 7.3. Contacting anti-piracy organizations
  32. 7.4. Education
  33. 7.5. Economics
  34. 8. Conclusion
  35. 1. Introduction
  36. In today’s rapidly changing world of advanced technology, computers and the
  37. software to run them have become integral parts of our society. The relative
  38. leap in recent technology has contributed to a boom in the sales and general use
  39. of computers. This is also due in no small part to the birth and growth of the
  40. Internet. A virtual world of entertainment and technology is now available at
  41. the fingertips of the average person. Once the domain of programmers and serious
  42. users, the Internet has opened the door to anyone with the slightest interest.
  43. The spread of home computing and the parallel growth in the business world has
  44. resulted in booming software industry. However, along with the spread of
  45. software has come a significant proliferation of software piracy. The issue of
  46. software piracy, the illegal copying or duplication of software, is rapidly
  47. growing in importance. As the software market continues to grow, so does the
  48. demand for stolen software. The issue of software piracy can be described on two
  49. levels, akin to the two stages of software: development and the end product. The
  50. protection of software at the developmental level can be very complex with many
  51. individual issues. Many of these issues are as yet unresolved and yet to be
  52. decided in a court of law. We will concentrate on the latter stage of software
  53. development, the end product. In order to gain a firm grasp on the subject, we
  54. will first define piracy, including the legal, monetary and ethical issues. We
  55. will then move on to the methods of software theft breaking them down into small
  56. and large-scale components. From there we will examine the protection of
  57. software through both industrial and legal means. Finally, we will deal with the
  58. social and ethical implications of software piracy in our society.
  59. Software piracy, precisely defined, is the unauthorized use, duplication or
  60. theft of software. In the past decade software theft has become a very serious
  61. problem. With the exponential increase in the consumer market for computers and
  62. software, the demand for black market, or stolen software has skyrocketed.
  63. Conservative analysis conducted by the Software Publisher’s Association
  64. estimated lost revenue due to software piracy in the U.S. alone came to $1.05
  65. billion in 1994. This was approximately 25% of a $4.2 billion market. These
  66. figures only account for the business market. The size of the consumer market
  67. reached 1.3 billion in that same year. While the exact size of consumer piracy
  68. is unknown, we can safely assume that it constitutes a large portion of the
  69. losses to the software industry. These domestic problems pale with comparison to
  70. those present in international markets, where the estimated piracy rate is close
  71. to 49% or $8 billion. This economic impact threatens to impede the development
  72. of new software products and the availability of current ones. This problem
  73. affects everyone, from the software publishers to the legitimate user. The
  74. continued loss to the software industry could have harmful implications to the
  75. future of software development. In order to protect the economic viability of
  76. the software industry, laws have been enacted to protect software companies and
  77. their products.
  78. The protection of computer software under the law has gone through significant
  79. changes in recent years. The first attempt to protect software and its
  80. developers was made in the late 1960’s. Software was officially recognized by
  81. the United States Copyright Office as a form of literary expression and hence
  82. protected under copyright laws. The most comprehensive protection legislation in
  83. this area was made in the Copyright Act of 1976. This act gave a sharper
  84. definition of software and its development and provided more firm guidelines as
  85. to its protection. Amendments in 1980 brought this act more in line with
  86. advances in technology. According to Title 17 of the US code, it is illegal to
  87. make or distribute copies of copyrighted material without authorization. The
  88. only exception was made in the user’s right to make a single backup copy for
  89. archival purposes. In 1990 Congress approved the Software Rental Amendments Act
  90. which prohibits the commercial rental, leasing, or lending of software without
  91. the express written permission of the copyright holder. Individuals are allowed
  92. to possess the original software program and one backup copy for their personal
  93. use. No other copies are to be made without specific authorization from the
  94. copyright owner. In late 1992, Congress passed an amendment to Title 18 of US
  95. code, instituting criminal penalties for copyright infringement of software. The
  96. penalties include imprisonment of up to five years, fines up to $250,000, or
  97. both, for unauthorized reproduction or distribution of 10 or more copies of
  98. software with a total retail value exceeding $2500. As we’ll see below these
  99. laws these laws, in practice, have relatively little power in the prevention of
  100. software piracy.
  101. In order to understand the ethical implications of software piracy, it is
  102. necessary to outline the basic principles of ethics that apply to the
  103. engineering industry. These principles can be separated into six categories: 1.
  104. Loyalty, 2. Truth, honesty, and trustworthiness, 3. Respect for human life and
  105. welfare (including posterity), 4. Fair Play, 5. Openness, and 6. Competence. Any
  106. participation in the illegal duplication of software is in direct contradiction
  107. to the principles of truth, honesty and trustworthiness. From there it becomes
  108. more difficult to derive conflicts with the basic ethical principles. The theft
  109. of software can be said to conflict with the fourth and fifth basic ethical
  110. principle, fair play and openness, respectively. In purchasing a piece of
  111. software, you are entering into a tacit agreement with the producer, that you
  112. will respect the law and his rights. In duplicating that software, you are
  113. breaking that contract and the confidence of the supplier. Thus, you are
  114. violating the right of fair play with that person and in turn your openness to
  115. comply with the agreement. Finally, a farther analogy can be drawn to the
  116. engineer’s responsibility to respect the community around him. The act of
  117. breaking the law is indicative of total disregard for the structure of the
  118. society and the laws that bind it. This in turn shows little regard for the
  119. individuals within that society. In summary, software piracy has serious ethical
  120. implications for the engineer that in turn can be extended to the average user.
  121. 2. Software piracy methods
  122. The methods by which software is pirated can be small scale and large scale. The
  123. small-scale methods include user-to-user sharing and user group sharing. The
  124. large scale methods include software rental and compact disk manufacturing.
  125. 3. Small scale piracy
  126. Small-scale piracy can be defined as piracy without financial motives. The
  127. people and organizations that are involved in small-scale piracy are usually
  128. trying to get software for personal use, or are looking for fame by distributing
  129. software faster than others. There are many methods involved in distributing
  130. software without profit. These include user-to-user copying and user group
  131. sharing, and each of those can be performed in a variety of ways.
  132. Perhaps the most common way that people copy software is by sharing it with
  133. those around them. A friend or coworker tells you "Oh, I got such a great
  134. program yesterday". You’re intrigued, and ask for a copy. He then gives you the
  135. floppy disks, you install the program and return it the next day. Simple, quick,
  136. no harm done you don’t see a problem with this. What you don’t realize is that
  137. what you’ve done was in fact copyright infringement, and the software company
  138. can now sue you and your friend for damages.
  139. Borrowing diskettes or CD-ROMs is not the only way that people can share
  140. commercial software. Making copies and mailing it to your friend, posting a copy
  141. of the disks on your private FTP site, emailing an archived file all are ways
  142. that you can make that great program reach your friend, relative, coworker,
  143. boss. Perhaps you are doing this as a personal favor, or perhaps you feel that
  144. they won’t afford it, or you’re doing this to show off your assets. Either way,
  145. you’re breaking the law.
  146. User-to-user copying has some other implications, the most important of which is
  147. economic. Say that you purchase some software and let five of your friends copy
  148. it. Each of them, in turn, will let five of their friends copy the software as
  149. well. After only three such cycles, over 125 people have this software. This is
  150. incredible exponential growth. Consider the impact on the software developers of
  151. only one such pirated program. In our scenario, the company receives only
  152. 1/125th of their expected profits.
  153. An original software purchaser has to consider many issues. First, although
  154. there was no intent to defraud the software company, it is an inevitable result.
  155. Second, the copy that these other people now have on their computers usually has
  156. the purchaser’s name and/or serial number. Thus, if any of those people are
  157. caught pirating software, it will be traced back to the original purchaser.
  158. 4. Large scale piracy
  159. A much more serious type of piracy is called User Group Sharing. Here, there
  160. exists an organized method for distributing commercial software to many people
  161. at once. Some of these methods include Bulletin Board System Distribution, the
  162. Internet, Internet Relay Chat, File Transfer Protocol, Newsgroups, electronic
  163. mail, and the World Wide Web.
  164. 4.1. BBS
  165. A Bulletin Board System (BBS) is a small-scale electronic online service that is
  166. run from a personal computer. Anyone with a Personal Computer and a modem can
  167. connect to a BBS and participate in the services that it offers. Even though
  168. BBSs were much more popular before the acceptance of the Internet as a mass
  169. communication tool, there are still about 50,000 of them in operation. Most
  170. software and hardware companies keep their own BBSs to permit people from around
  171. the world to download software updates of fixes or to get the latest drivers.
  172. The majority of Bulletin Boards are, however, user-run and located on someone’s
  173. home personal computers.
  174. The personal BBS are easy to setup and maintain, and are not financially
  175. unbearable. Most of them require a dedicated computer system running special BBS
  176. software, several modems, and a few phone lines. The person who operates a
  177. Bulletin Board is often called the Sysop (short for System Operator). BBSs
  178. differ in many areas. Some offer membership on a fee-based basis, others are
  179. free for everyone, still others are by invitation only. The personal BBSs
  180. usually pick a central theme around which they tailor most of their services.
  181. Examples include music-oriented systems, systems dedicated to the Creation
  182. theory of biological development, or systems computer programming. Some Sysops
  183. decide to allow for, or center their BBSs around piracy.
  184. The pirate BBSs (or "elite" systems, as they are often known as in the pirate
  185. community) range from those that are casually "elite" to those that specialize
  186. in pirated software. The casually "elite" systems are those where the Sysop is
  187. (by negligence or on purpose) indifferent to the contents of files being
  188. exchanged in the "file transfer" area of the system. These systems usually
  189. specialize in other subjects, and piracy remains one of their unmentioned
  190. features.
  191. The specifically-pirate BBSs usually specialize even further. There are
  192. general-purpose systems, where users are encouraged to upload any commercial
  193. software that they might have access to. Other systems are more selective, and
  194. require that the software has to be new (within three months of its release,
  195. within a month, a week, two days, or sometimes even before release) or that the
  196. software has to be of a certain type (games, application software, productivity
  197. utilities, etc.). These BBSs usually require some sort of referral or
  198. authentication before they will accept a user. This consists of new user
  199. passwords (which must be received personally from current members), referrals
  200. (where when applying for membership, one must tell the Sysop names of some other
  201. current members who will vouch the new user), and payment of memberships. Most
  202. of these safeguards are in place to serve two purposes to keep software
  203. "quality" high, and to prevent detection.
  204. People on these "elite" Bulletin Boards range from people looking for software
  205. to download, to those who are seeking to promote their piracy group by uploading
  206. the greatest number of files. Most of the people on these systems know well what
  207. they’re doing is illegal, and most Sysops take great care to warn all users
  208. about potential FBI crackdowns. These are always expected, even though they
  209. happen very rarely. Most claims that "such-and-such BBS got shutdown" often
  210. heard on elite BBSs are invalid. Over time, Sysops have come up with preventive
  211. measures designed to clear the Sysop of responsibility in case of a crackdown.
  212. These usually consist of short warnings stating that copying commercial software
  213. is illegal, and that the user is breaking the law by downloading a file. Another
  214. attempt is to masquerade as non-profit libraries and make use of special
  215. exemptions that are allocated to these libraries. Carefully-worded notices warn
  216. users that they may "rent" the software from a BBS for a period of 24 hours (or
  217. some similar period of time), after which they must destroy the copy. This has
  218. the appearance of a legal operation (to be discussed separately later), however
  219. BBSs most often do not have a state-recognized non-profit operations license and
  220. are thus not non-profit libraries. The checkout warnings are nothing but ways to
  221. make users feel that they are participating in a legitimate activity and protect
  222. the Sysops.
  223. The law and pirate Bulletin Boards have rarely met. The combination of laws used
  224. to persecute Sysops allows for loopholes for Sysops who do not charge for access
  225. to the BBSs. The 1994 case of USA vs. David LaMacchia set a precedent, which has
  226. not so far been challenged. In the case, an undergraduate student at the
  227. Massachusetts Institute of Technology (MIT) set up and operated an open
  228. Internet-based BBS for the period of over a month. The court ruled, however,
  229. that under current laws, it was impossible to prosecute the defendant. The judge
  230. stated that the government’s "interpretation of the wire fraud statute would
  231. serve to criminalize the conduct of not only persons like LaMacchia, but also
  232. the myriad of home computer users who succumb to the temptation to copy even a
  233. single software program for private use"
  234. [http://swissnet.ai.mit.edu/dldf/dismiss-order.html]. As a side note, the judge
  235. noted that he hoped for stricter laws, which would permit persecution of
  236. non-profit system operators. The decision for this case was based partially on
  237. an earlier interstate mail fraud case, which was not connected to software in
  238. any way.
  239. In March of 1995, the US District Court for Massachusetts sentenced a BBS Sysop
  240. Richard Kenadek to 24 months probation with 6 months home confinement. Kenadek
  241. was an operator of the "Davy Jones Locker" bulletin board from his private
  242. residence. After an FBI raid, he pleaded guilty to criminal copyright
  243. infringement for using his BBS for the "unauthorized distribution of copyrighted
  244. software for financial gain." The key in this plea is the phrase "for financial
  245. gain". As soon as money changes hands, the activity can be considered criminal
  246. and judged accordingly. This case was the first time that a bulletin board
  247. operator was charged under the criminal statute of the copyright law, according
  248. to Sandra A. Sellers, the SPA director of Litigation.
  249. Bulletin Board Systems, though rapidly losing popularity, continue to be
  250. significant sources of piracy. The relative inexpensiveness of running a BBS
  251. combined with the ease of electronic software transport quickly breed piracy.
  252. Anti-piracy efforts are hindered by the system operators’ altruistic way of
  253. running these bulletin boards. US laws currently only apply to for-profit
  254. ventures. Still, efforts in curbing BBS piracy are expanding, and as new laws
  255. are created more lawsuits will begin to appear where system operators become
  256. responsible for their systems’ contents.
  257. 4.2. Internet
  258. The Internet became a major channel for illegally distributing copyrighted
  259. software only in the last decade. Five main methods for Internet distribution
  260. that will be examined are the Internet Relay Chat (IRC), File Transfer Protocol
  261. (FTP), Internet newsgroups (USENET), Electronic messaging (Email), and the World
  262. Wide Web (WWW). Each of the four has different characteristics, and involves a
  263. different method for transmitting the software from the distributor to the user.
  264. Of all the methods for obtaining large amounts of pirated software, the Internet
  265. Relay Chat is the most reliable and quickest; although it is harder to use.
  266. Interestingly, this is one of the least-investigated sides of the Internet, and
  267. is arguably the hardest medium for enforcing the rules.
  268. Internet Relay Chat (IRC) is a computer teleconferencing system which has
  269. recently gained widespread popularity. Designed in 1988 by Jarkko Oikarinen as a
  270. replacement to the UNIX talk program, it allows for users from all over the
  271. world to connect to a server that’s part of the IRC network and chat with anyone
  272. on any other server on that network. On a typical night, there are anywhere from
  273. 5000 to 15000 people chatting with each other. Actual numbers depend on time of
  274. the day, day of the week, and network stability.
  275. As a chatting system, IRC has some alternatives. Using IRC, people may engage in
  276. "private" chats, where they can send messages that only the intended recipient
  277. can read. People can create and join special discussion channels, where their
  278. messages will be shown to everybody. They may also use special DCC (Direct
  279. Client-to-Client) capabilities that allow for chatting and file transfer. By
  280. design the system is very flexible e.g. as upon not locating a certain
  281. discussion channel, a user may just create one.
  282. The IRC system also allows for control. The person who creates the channel is
  283. considered its operator. The operator can invite other users to join this
  284. channel, allow and disallow a user to join (on a temporary or even a permanent
  285. basis), punt people from the channel if necessary, and can grant operator
  286. privileges to others. On certain channels, operators play almost no role and
  287. utilize their positions to control excessive flooding (which occurs when a user
  288. sends so much information in a row that it, in the opinion of the operator,
  289. seriously interferes with the conversation).
  290. IRC uses a very simple system for differentiating between users who are
  291. currently connected to it. Each user picks a nickname based on his or her own
  292. preference, and logs into an IRC server. The IRC server either accepts the
  293. nickname or tells the user that the nickname is already in use and waits for a
  294. new one. The user can also optionally produce an email address that the server
  295. keeps in the database of current users. Other IRC users can then look up
  296. someone’s information based on their nickname.
  297. The inherent problem is that a user is not bound to reveal his or her identity
  298. in any way. The nickname can be unrelated, and the email address can be a fake.
  299. In fact, the only knowledge that someone has about some other IRC user is where
  300. this user is logging in from. This lack of information about users, coupled with
  301. the extensible system and a live presence of other humans at the same time as
  302. you’re there is an opportunity which pirates could not pass by. On the three
  303. major IRC networks there are currently dozens of round-the-clock channels which
  304. specialize in ways to illegally obtain software. The technical aspects of IRC
  305. file exchange are even more inhibiting to investigations.
  306. On one typical evening, there were over 11,000 people connected to EFnet (Eris
  307. Free network, the largest of the three worldwide IRC networks). These people
  308. were dispersed over a range of more than 3,000 different channels. Some of the
  309. channels had up to 100 people while others had just one. (For a channel to
  310. exist, at least one person must be in it.)
  311. The piracy channels, most of which start with or contain the word "warez" (which
  312. is pirate jargon for illegally obtained commercial copyrighted software), number
  313. over 85. On the sample evening, there were 931 instances of people logged in to
  314. the "warez" channels (note that a person may be on more than one channel at
  315. once, but keeping track of more than four at the same time is a rare occurrence
  316. on IRC).
  317. 4.3. IRC
  318. FTP site offers
  319. Piracy takes different forms on IRC. Some channels offer "FTP sites", others
  320. advertise other people’s public offers, and yet others are discussion-style
  321. channels where people request software that they need. The "FTP site" channels
  322. usually have an automated moderator. Channel users find FTP sites that currently
  323. carry pirated material and submit the Internet addresses to the automatic
  324. moderator (also known on IRC as a "bot", from the word robot). The moderators
  325. will then broadcast the site’s coordinate to others in the same channel. A
  326. variation is a channel where people post Internet addresses themselves. These
  327. addresses usually consist of the 4-digit Internet Protocol (IP) number, the
  328. user-name and password that are needed for logging into the system. Sometimes,
  329. the posters also mention a "ratio" of, for example, 4-to-1. This means that the
  330. operators of this FTP site are requesting that users upload at least one fourth
  331. of the megabytes that they download. This will be discussed a bit later. Below
  332. are some of the messages that may be posted in FTP site channels:
  333. RaiNMaNP9 Get da warez at 207.33.217.17 use the name warez and the password is
  334. you email address ! this ftp sucks someone told me lastnight!and he's down by
  335. the river!
  336. trade_it has a site up at 205.219.156.88. Come get your warez here!
  337. l/p: warez 1:3
  338. <CryoFlame> Come to my FTP 199.69.76.123 l:warez p:warez 1:5 ratio
  339. <Maximus> Go to 165.91.2.150 \ Login & Pass: warez \ Change port to
  340. PORT:80 \ Upload:Download rate is 1:4 \ Most of yer warez files yer looking for
  341. (i.e. MS Office Pro 97 \ Visual Basic 4.0 \ Hellbender \ MS Pub97 \ WinNT 4.0
  342. and server \ Adobe Photoshop 4.0 Beta list goes on and on!!!
  343. <Wronski> 206.29.242.29 l&p:warez 1:3
  344. Another type of a channel is one where people simply type a message stating what
  345. they’re looking for (or what software they have for others to pirate). Other IRC
  346. users then read the messages, and can enter private chat with the person who
  347. posted the message. These channels are usually the most popular ones, as anyone
  348. who desires a certain software package can go and see what the other dozens of
  349. people offer on the channel. Most pirates on these channels deal in trades (as
  350. in, they only send software if the other user has some other software to send
  351. back). Below are a few examples of messages from this type of a channel:
  352. Trading
  353. [Gordon] will trade for Police Quest 1: vga.. msg me
  354. _triax_ wonders if anyone know if Leisure Suit Larry 7 been released yet....
  355. |StompeR| is looking for a site with the NEWEST Visual Basic /msg me
  356. AoS is looking for Diskeeper, Mathematica, and Microsoft Assembler (MASM). /msg
  357. me for trade
  358. Blaspheri is looking for need 4 speed.../msg me
  359. boy20co is looking for a aol acct, or generator, will give perm ftp site away.X)
  360. butthead is looking for Speed Haste full, PLEAZ /MSG ME IF U HAVE IT!! PERM
  361. ACCOUNT ON FTP SITE!!!
  362. cf wonders is anyone knows if leisure suit larry 7 has been released yet...
  363. Chia_Pet is looking for Marathon2...Ne1 have it?
  364. Jeff just wants lemmings paintball
  365. jussa looking for REalms of Arkania disks1,6-9 and Daggerfall disks47-53 pls
  366. /msg for trade :)
  367. Milo looking for reg number of discplay 3.3
  368. Monte needs a ppp dailer for MSDOS. /msg me if you have one. Thanks.
  369. NailBomb needs sites for: Uninstaller 4.0, and Adobe Type Manager Deluxe..../msg
  370. me...thanks......
  371. <KriS1> ne1 diablo site /msg 4 trade
  372. <lizards> i need a photoshop site
  373. <lucy4> i know how to crack eudora pro 3.0 upgrade but i didn't finish d/ling
  374. the intall.exe file from qualcomms site and now they took it off... if anyone
  375. has the file please let me know
  376. <MaSTaWaR> SprWalker: I have flight sim 97
  377. <Nelson> ne1 has osr3, any Koei games or settlers 2. Plz msg me.
  378. <RaSun> looking for links386 can anyone help
  379. <sector6> looking for death rally (for free) Help a newbie!!!
  380. <Smallnuts> I needz Pixar's Renderman and Mesh Paint 3D, msg me.
  381. <Spawn27> does ne1 know were I can get abuse
  382. <Spawn27> I looking for abuse can ne help????
  383. <SprWalker> anyone have Ms FlightSim 5.1? /msg for trade...
  384. <Sraiser> how many more disk of office 97 to go? i need it all d/l by 9 am in
  385. the morning
  386. <Sraiser> ncognito your one in a million now is 20 disk all so i can d/l it for
  387. work tomorrow and also have it on my new pc
  388. <Sraiser> ne1 have wordperfect latest vers
  389. <tanfold> i need crescent internet toolpak msg me 4 trade
  390. <Tembler> Does anyone have MS flightsim 95!??! please msg me for trade!!!
  391. <Tembler> I have some pretty good warez to trade for that game
  392. <Tembler> make it msflightsim95
  393. <True__> looking for Death Rally../msg
  394. Offerbots
  395. Finally, the third major type of a "warez" channel on IRC is one where users
  396. compile a special software listing, and send a message to the automatic channel
  397. moderator notifying it of this software. The "bot" then automatically posts all
  398. such listings in a similarly formatted way. Here is a short sample of output
  399. from such a channel:
  400. <EtC-ReLaY> ( EtC Offerer: KfZ-DcC ) _#4_ 39x [2.8M] [ETN]Arena Designer Pro
  401. v2.5[10-27]
  402. <EtC-ReLaY> ( EtC Offerer: NVC-AADCC ) _#1_ 79x [9.7M] Radin Fighter 2 [10/25]
  403. <EtC-ReLaY> ( EtC Offerer: NvC-AADCC ) _#2_ 21x [6.2M] Hot Dog web editor - da
  404. best one of am all [10/26]
  405. <EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#1_ 0x [4.8M] [10/24] MS Money 97 Retail
  406. [RAGE]
  407. <EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#2_ 2x [9.7M] [10/24] Raiden Fighter 2
  408. [EPI]
  409. <EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#3_ 0x [166k] [10/25] Diablo DEMO Hack
  410. Pack [NVC]
  411. <EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#4_ 1x [7.4M] [10/25] Fighter Duel:
  412. SPECIAL EDITION [PSG]
  413. <EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#5_ 1x [7.0M] [10/25] GemStorm c
  414. Malachite Games [RFX]
  415. <EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#6_ 3x [6.5M] [10/27] Amok c GT
  416. Interactive [RZR]
  417. <EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#7_ 1x [7.3M] [10/27] Gray Stone Saga 2
  418. c Hwaei Co Chinese [KYL]
  419. <EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#8_ 1x [5.2M] [10/27] VocalTec4s IPhone
  420. 4.5.0.3 [MNC]
  421. <EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#9_ 1x [7.0M] [10/27] ULT Soccer Manager
  422. 2 c SIERRA [HYB]
  423. <EtC-ReLaY> ( EtC Offerer: PMODE-DCC ) _#1_ 24x [142k] PMODE/W v1.30 - DOS
  424. Extender For WATCOM C/C++
  425. <EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#1_ 313x [ 29k] Key Gen. for Quake
  426. Shareware CD
  427. <EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#2_ 86x [1.0M] WinPGP ver 5.0
  428. <EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#3_ 900x [5.3M] Eudora PRO ver 3.0 Final
  429. <EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#4_ 50x [1.7M] Agent 99F 16 Bit cracked
  430. <EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#5_ 301x [1.5M] Agent 99F 32 Bit cracked
  431. <EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#6_ 279x [7.9M] CleanSweep ver 3 beta3
  432. <EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#7_ 28x [1.1M] NetTerm 3.2.3 32Bit
  433. *cracked*
  434. <EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#8_ 15x [1.5M] WARFTPD ver 1.52 Final
  435. <EtC-ReLaY> ( EtC Offerer: RnS|DcC1 ) _#1_ 47x [2.4M] Quake Track 2 by NiN
  436. <EtC-ReLaY> ( EtC Offerer: RnS|DcC1 ) _#2_ 28x [4.4M] Fell on Black Days by
  437. Soundgarden
  438. <EtC-ReLaY> ( EtC Offerer: RnS|DcC1 ) _#3_ 38x [4.8M] Never Leave Me Alone by
  439. Nate Dogg
  440. <EtC-ReLaY> ( EtC Offerer: RnS|DcC1 ) _#4_ 24x [5.5M] Days of our livez by Bone
  441. <EtC-ReLaY> ( EtC Offerer: RnS|DcC1 ) _#5_ 49x [2.3M] Mario 64 Main Theme
  442. <EtC-ReLaY> ( EtC Offerer: sam-dcc ) _#1 _ 57x [539k] [SAM] [1021] The collector
  443. v1.13
  444. <EtC-ReLaY> ( EtC Offerer: sam-dcc ) _#10_ 82x [666k] [SAM] [1026] BookIt! PRO
  445. Win 95/NT
  446. <EtC-ReLaY> ( EtC Offerer: sam-dcc ) _#11_ 192x [267k] [SAM] [1026]
  447. DomainSearcher Win 95/NT
  448. During a sample one-hour period, over 289 megabytes of files were offered
  449. through this "EtC-ReLaY" bot. Since a file may be downloaded by as many as 20
  450. people at the same time, the total volume of files transferred with the help of
  451. EtC-ReLaY is amazing. Moreover, EtC-ReLaY is not the only service that offers
  452. this kind of a feature. On EFnet, one might find well over 10 such free offer
  453. channels.
  454. The mechanism for physically sending and receiving files through IRC is very
  455. simple even for beginners to use. If a person wants send a file to another user,
  456. all that needs to be typed by the sender in is a command, the name of the user,
  457. and a filename. To receive a file that is listed in a channel by a bot like
  458. EtC-ReLaY (see above), the target user executes a command, and the offerer’s
  459. system will automatically initiate the transfer.
  460. 4.4. FTP sites
  461. A fourth form of user group sharing is File Transfer Protocol (FTP) is a method
  462. to transfer files over the Internet. Created in the early 1970s at MIT, it has
  463. become a standard feature of many operating systems. FTP is probably the most
  464. convenient way to send files over the Internet. It is also very easy to detect
  465. the location of an FTP site, which is a reason why many of these sites are
  466. active for only a day or two. They are brought down by their operators to escape
  467. detection.
  468. The basics of FTP are simple. A server computer is chosen, and FTP server
  469. software is set up on it. At that point, anyone on the Internet who has the
  470. address of the computer and user information needed to log into the system can
  471. access files in the server machine’s storage. The addresses and user information
  472. can be distributed in person, or over the Internet via the World Wide Web, IRC
  473. or USENET newsgroups.
  474. Using FTP is very simple. There are many well-written FTP client programs that
  475. will let a user get and put files using the FTP Internet protocol. Pirates have
  476. also come up with their own FTP client called "WarezFTP" which has special
  477. features that certain pirates might want to use. For example, WarezFTP will
  478. detect and display names of hidden directories which are often created on FTP
  479. sites. If you are not using a program like WarezFTP, you will not know that a
  480. directory exists, but a pirate will be able to enter it and trade files.
  481. The motive behind putting up FTP sites (which is a very risky enterprise, since
  482. Internet Service Providers usually notify the SPA and sometimes even the FBI
  483. when they suspect illegal activity) is not commercial gain. In fact, most
  484. pirates lose money by paying excessive Internet connection fees. Sometimes a
  485. pirate may spend even more money while paying a hacker for a cracking job the
  486. hacker removes any copyright protection that might be embedded in the software.
  487. Usually cracking is done for free, but on some occasions where the pirates
  488. desire speed and accuracy, the cracker is paid large sums. The reasons why
  489. pirates put up FTP sites are to distribute any software that they have in hopes
  490. of getting something in return from other pirates, or to spread the popularity
  491. of a piracy group of which they might be members.
  492. Monitoring activity on FTP sites is harder than doing that on Bulletin Board
  493. Systems. Whereas on a BBS one can usually see the list of last few users and one
  494. usually has a full list of members; it is always easy to get in touch with
  495. someone who has recently logged on to the system. With FTP sites, there is
  496. almost no identification anywhere except for the FTP log file, which is usually
  497. stored on the server computer. The FTP log contains Internet addresses of all
  498. log-ins.
  499. 4.5. Usenet
  500. Another method of user group sharing is through Newsgroups. Newsgroups on the
  501. Internet (USENET) are results of an early attempt to create a thread-based
  502. virtual conversation medium. Not unlike a bulletin board system, users can post
  503. messages to a specialized "forum". However, unlike a BBS, USENET is a network
  504. consisting of many servers. A post made to one server is then sent across the
  505. whole USENET network in hopes that it gets everywhere. There are over 20,000
  506. different newsgroups, with topics ranging from Fans of Bill Gates to technical
  507. discussions relating to the operation of a blender. Internet newsgroups are
  508. distinguished by a specialized naming structure. For example, a newsgroup which
  509. concerns itself with humorous posts is called rec.humor (rec. stands for
  510. recreation), newsgroups with pornographic material start with
  511. alt.binaries.pictures.erotica (alt. is short for alternative) and a computer
  512. newsgroup announcing new products for Microsoft Windows may be called
  513. comp.os.ms-windows.announce (comp. is short for computer). Not surprisingly,
  514. also, the newsgroups that pirates frequent are called alt.binaries.warez and
  515. alt.warez.ibm-pc.
  516. Piracy on newsgroups is an option that many have considered and tried, but due
  517. to technical problems that are now noticeable in the structure of USENET, is
  518. very impractical. What some pirates do is they locate a service which will post
  519. any message (including data information which could be an illegally obtained
  520. piece of software) without specifying the poster’s name. The technical problems
  521. surface when the post first occurs. Due to the nature of USENET, most messages
  522. have to be encoded in a special way to be compatible with old USENET servers.
  523. This scheme actually expands the size of the posted file. Also, if the posted
  524. file is too big and has been split up into several parts (as is often the case),
  525. not all parts are necessarily replicated to other servers. So for example,
  526. someone may post a 5-megabyte software package to USENET. Due to encoding and
  527. part size, it turns into 20 parts. Only 10 or 15 of those make it to most
  528. servers, and since all parts are needed to re-assemble the program, the posting
  529. was useless. Due to the relatively low volume of files being transferred over
  530. USENET, it has not been even a minor focus in the software companies’ recent
  531. efforts to curtail piracy
  532. 4.6. Email
  533. Email, by far the most popular feature of the Internet, is also the first method
  534. that was invented for Internet communications. A recent standard for Multimedia
  535. Internet Mail Extensions (MIME), has indirectly aided the spread of email-based
  536. piracy by permitting email software to correctly encode files for transmission
  537. over global networks. Using email, a user may "attach" any file to an email
  538. message. If the addressee’s email inbox will allow large messages, pirates will
  539. trade huge files using this relatively private method. Fortunately, most
  540. people’s inboxes have a set maximum size of 1 to 5 megabytes, which is barely
  541. enough for even the smallest commercial application program. Thus, email has not
  542. been a major method for pirate file exchange.
  543. WWW
  544. The World Wide Web (WWW), an extremely popular Internet communications medium,
  545. is one of the most recent advances in Internet technologies. Invented in 1991 by
  546. a few scientists at the CERN physics laboratories in Switzerland, the World Wide
  547. Web is a one-way TV-like medium where content providers may post any information
  548. they desire.
  549. In the beginnings of the World Wide Web, most pirates were very uncomfortable
  550. with posting their file collections in such a public way. Anyone on the Internet
  551. may access the publicly posted information, and there is virtually no way to
  552. restrict investigation by proper authorities. Lately however, as the Web grew in
  553. size and became less manageable, more and more pirates are putting up their
  554. information online. They no longer feel threatened. The only way to take this
  555. information down is to persuade the Internet Service Provider (ISP) to shut off
  556. the pirate’s service. Since most ISPs realize that by cutting off someone’s
  557. service they will be viewed as Internet censors which usually leads to loss of
  558. customers they are reluctant to block anyone’s service.
  559. 5. Commercial piracy
  560. While the methods above involve an active pirating population, the profitable
  561. distribution of stolen software defines another side of the market on a larger
  562. scale. This market involves the sale of illegally duplicated software in large
  563. quantities. These large-scale pirates work only for the profit involved in the
  564. redistribution of illegal software. The two major components of large scale
  565. piracy are software rental and compact disk manufacturing.
  566. While it has always been illegal to rent unauthorized copies of software, until
  567. 1990 it was legal to rent the original versions. Loss of revenues that was
  568. associated with these rentals prompted the US Congress to pass the Computer
  569. Software Rental Amendments Act of 1990. This act makes it possible for software
  570. publishers to explicitly prohibit rental in the license agreement.
  571. Interestingly, an exception to the law was created specifically for non-profit
  572. libraries. These could rent original software without express permission from
  573. the publisher.
  574. 5.1. CDR
  575. The second major component of large scale piracy is the duplication of computer
  576. compact disks. The advent of software distribution via compact disks offered
  577. developers a level of protection unavailable with conventional floppy disks. The
  578. ability to duplicate these disks was limited by the expense of CD-R’s, or
  579. compact disk writers. However, with advances in technology, the prices of these
  580. CD copiers have come down considerably. Current CD-R’s can be purchased for
  581. around $500 dollars. This has lead to a considerable growth in the availability
  582. of pirated software on CD’s. The large volume of storage available on a CD had
  583. also previously limited copying by potential pirates. These limitations are no
  584. longer an issue with the ability to copy directly to another CD. The production
  585. of counterfeit CD’s has become a considerable part of illegal pirating of
  586. software.
  587. The distribution of counterfeit CD’s can take two forms. These CD’s can be
  588. explicitly marked as illegal copies or can be cleverly disguised as the
  589. original. The former is the most common form of distribution. With explicit
  590. markings or simply no disguise at all, the purchaser is generally aware of the
  591. illegal nature of the product. However, with duplicate packaging of the some
  592. stolen software, the ability of the user to distinguish between the legitimate
  593. and not becomes very difficult.
  594. The volume of pirated software has also grown with the advent of CD copying.
  595. With the large available storage on one CD, numerous programs can be copied and
  596. stored on a single disk. This has significantly eased the difficulties of
  597. distributing these stolen programs. The growth of CD duplication is evidenced by
  598. the influx of counterfeit CD software from the foreign market. These copies are
  599. distributed rapidly and efficiently to a large market. In summary, the
  600. production of CD software has become a significant component of the pirating
  601. industry.
  602. 6. Copyprotection
  603. In light of the many effective methods of software piracy, the protection of
  604. software programs has become increasingly difficult. The battle to protect the
  605. software industry is a never-ending struggle, as pirates continually find new
  606. ways to illegally copy and distribute software. (With software piracy so
  607. prevalent, what can software developers do to protect their intellectual
  608. property?) The software industry has invested a serious amount of time into the
  609. development of new forms of protection. Alongside the industry, many Anti-Piracy
  610. Organizations and campaigns have arisen to combat the flood of illegal software.
  611. The first and most important component of the software protection is that
  612. engineered by the industry itself. We will explore what approaches have been
  613. taken in the past, what approaches are currently being used and other methods
  614. software developers have used to fight this growing problem. We will look in
  615. depth at each of these approaches and see their successes and at what cost.
  616. 6.1. Hardware protection
  617. Let us first start with hardware solutions to the software piracy issue. The
  618. best known methods are dongles. Dongles are hardware "keys" which allow
  619. applications to be run on PCs and servers. This hardware "key" must be purchased
  620. separately from the application. Therefore the software developers configure the
  621. software to require the dongle. This is an extremely successful approach,
  622. however, at great cost. It costs approximately $30 per dongle. This means that
  623. for a $30 application the cost is now double. This fact has made this solution
  624. very limited. It is used almost only on very high-end applications because of
  625. its cost. Dongles have been the only real approach employed by software
  626. developers that uses hardware to help fight piracy.
  627. 6.2. Software protection
  628. The most common approach for fighting software piracy has been with software.
  629. Among the approaches used have been serial numbers, CD-keys, encryption, manual
  630. references, registration requirements, and installation restrictions. We will
  631. take a look at each of these in depth.
  632. Serials
  633. The use of serial numbers requires that the user enter a serial number before
  634. they can install application. Many applications use this method including such
  635. prominent titles as Fauve Matisse, Janna Contact, Abode Photoshop, etc. When
  636. installing one of these applications you are required to enter a serial number
  637. usually found in the software manual before you can successfully complete the
  638. installation. The idea behind this is that it requires the user not only to have
  639. the software but also the manual.
  640. However, this approach has been easily defeated. Many of the very popular
  641. software titles have their serial numbers available on the World Wide Web. This
  642. limits the effectiveness of serial numbers! Another problem with serial numbers
  643. is that there are serial number crackers. These crackers are applications that
  644. are designed to find the necessary serial number to get past the serial number
  645. check.
  646. CD-keys
  647. Microsoft offers a similar strategy with their software titles. It is called the
  648. CD-Key. It is a "serial number" located on the back of the CD case. It is a
  649. ten-digit number and is required to complete the installation of a Microsoft
  650. software product.
  651. As with serial numbers there are ways to defeat this check. First all of the
  652. CD-KEYs uses the same scheme (xxx-xxxxxxx). If a person finds the scheme used to
  653. create the CD-KEY then they can use all Microsoft products.
  654. Another technique is a specialized form of a serial number check. It is called
  655. the Certificate of Authenticity (COA) and is a way for end-users to be assured
  656. that their OEM (Original Equipment Manufacturer) is authentic. The COA is a 20
  657. digit alphanumeric number that must be entered before the end-user can use the
  658. Microsoft operating system that came their OEM computer. With a large range of
  659. possible combinations, the difficulty is relatively high for cracking these
  660. serial numbers.
  661. Manual check
  662. Manual references are another of the approaches that software developers employ
  663. to fight software piracy. This is used mainly on games. Every time the game is
  664. launched a code (usually in the form of a unique word) is required before the
  665. game can be played. A prime example is the games Stunts by Brøderbund. Every
  666. time you launch the game it specifies a page, paragraph, and word to enter from
  667. the manual. The idea is that you must have the manual to play the game so that
  668. you cannot just get a copy of the game and start playing.
  669. This method has two major drawbacks. The first is that it is a hassle for paying
  670. customer to go through every time he wants to play the game. The second is that
  671. there are ways around this manual reference. You could photocopy the manual or
  672. write down a few of the unique words and then just keep launching the game until
  673. one of them shows up.
  674. Registration
  675. A very different approach to software piracy protection has been to force
  676. registration in various ways. Registration might require payment (most cases) or
  677. simply just registering your name and address etc. Some software developers use
  678. the method of encryption to protect their software. They lock the software with
  679. a "software key" and the software will only work if the user gets the "key" from
  680. software developer. The software developer can then force the user to register
  681. before he releases the key. Using this approach, the developer can create a
  682. unique key for every user. Some developers did not like the idea of forcing
  683. registration and have instead shipped the software key with the application.
  684. This second method is not as effective as the first. Both approaches have a
  685. distinct use for applications that are distributed via electronic and on-line
  686. distribution.
  687. Other software developers force registration by creating some limit for the use
  688. of an application prior to registration. For example, limiting the number of
  689. launches before registration. This approach is used primarily in shareware,
  690. freeware, and demos. An example of this approach is employed in Quicken SE by
  691. Intuit.
  692. Another common approach instead of the number of launches is to limit the number
  693. of days that the application will run before registration is required. This is
  694. used particularly in shareware, freeware, and demos. An example of this is
  695. Netscape Navigator beta applications, which limit the use of the application to
  696. 30 days. Once again, when you register the application this limit is removed.
  697. Limiting installations
  698. In a radical attempt at a new method Microsoft proposed limiting the number of
  699. installations of Office 97 to a total of 3. This technique was soon abandoned as
  700. many people complained to Microsoft. Obviously Public Relations have a priority
  701. over piracy concerns.
  702. Certificates
  703. All of the previous approaches are ways to protect the software from being
  704. pirated after it is purchased. Some manufacturers like Microsoft have gone a
  705. step further. Microsoft decided to fight software piracy from the retail store.
  706. To do this they placed a Certificate of Authenticity (COA) on the side of the
  707. box. This COA contains 3 hidden, and non-reproducible watermarks making it
  708. nearly impossible for pirates to copy the box . Therefore, when a user sees a
  709. box without this COA it is safe for him to assume that it is a pirated version
  710. of the Microsoft software.
  711. 7. Anti-Piracy Organizations
  712. The second component of the protection of software comes from the numerous
  713. organizations that have been formed to combat software piracy. These
  714. organizations use advertisements and legal action to fight against the rising
  715. tide in the illegal duplication of software.
  716. Though there are many organizations which are fighting against software piracy,
  717. the largest and most active of these are The Software Publishers Association
  718. (SPA) and The Business Software Alliance (BSA). Both are international
  719. organizations whose members include software developers, distributors,
  720. retailers, consultants, and essentially any other groups which are concerned
  721. with the industry’s growth. Through cooperative work with the government, the
  722. SPA and BSA enforce anti-piracy laws through active measures such as filing
  723. lawsuits, conducting raids, and undertaking audit programs.
  724. 7.1. Legal measures
  725. Over a thousand lawsuits, against both large groups and individuals, have been
  726. filed by the SPA and BSA. The penalty for software piracy is high for the
  727. violator - up to $100,000 per copyright infringement and a maximum 5-year prison
  728. term. On March 1, of this year, SPA filed a lawsuit against a junior college
  729. located in Florida for using illegal copies of software on its computers. The
  730. settlement reached by the plaintiff and defendant resulted in a fine of $135,000
  731. along with removal of the illegal copies and repurchase of new ones. On July 4,
  732. 1996, BSA successfully prosecuted two Hong Kong citizens with prison terms under
  733. the new Copyright (Amendment) Ordinance. Yip Chi Hung, the owner of a software
  734. shop in Hong Kong was sentenced to 6 months in jail plus a fine of HK$51,000.
  735. Kwok Po, Yip’s supplier of wholesale pirated CD-ROMs, was sentenced a total of
  736. 16 months in jail and fined HK$308,000. Just recently, this past October 10, SPA
  737. filed 5 civil lawsuits for software piracy on behalf of the software
  738. corporations Adobe Systems, Inc., Claris Corp., Corel Corp., Datastorm
  739. Technologies Inc., and Novel Inc. Three were against Internet service providers
  740. (ISPs), and two were against individual violators. The three ISPs Community
  741. ConneXion, Inc., GeoCities, Inc., and Tripod Inc. had pirated software,
  742. unauthorized serial numbers, links to ftp "warez" sites, and cracker/hacker
  743. utilities posted on their webpages. With the help of the ISPs, two individuals
  744. were tracked down as the responsible posters of the copyright infringing
  745. material. Though it is certain that software copyright laws are being violated
  746. in this case, there is controversy over whether or not the ISPs, which offer
  747. free space for individuals to design their own Web pages, should be responsible
  748. for the material that is posted by their users. Internet analyst Chris Stevens
  749. voiced his opinion, stating "They need to go after the people who post pirated
  750. software, not the host. That’s like suing the phone company for receiving
  751. obscene phone calls." As an illustration showing that nobody is above the laws
  752. of copyright protection, a hospital in Chicago, Illinois was fined $161,000 for
  753. using illicit copies of software. In fact, with the increase of computerization
  754. in hospitals, these institutions should be given increased special scrutiny,
  755. according to Bob Kruger, Vice President of Enforcement for BSA.
  756. 7.2. Corporate audits
  757. An alternative to litigation, is conducting what are called corporate audits. If
  758. investigators report a corporation as having violated copyright laws, SPA will
  759. often ask the corporation to allow an audit of its software in place of taking
  760. the matter to court. During an audit, the contents of each computer are compared
  761. with the company’s purchase receipts of software. If any illegal copies are
  762. found, the company will agree to pay the retail price for each copy, destroy
  763. these illegal copies, and replace them with legitimate ones. For the most part,
  764. these audits have been met with cooperation by the company who would much rather
  765. settle the issue in a confidential, private matter than dragging everything to
  766. court. If the company does refuse to submit to an audit, SPA will then file a
  767. lawsuit against them.
  768. 7.3. Contacting anti-piracy organizations
  769. To help them in their search for copyright criminals, the SPA, BSA and software
  770. giant Microsoft have established a hot-line (1-800 toll free number) which
  771. people can call in to report suspicions of software piracy. The numbers are
  772. 1-800-388-7478 for SPA, 1-800-688-BSA1 for BSA and 1-800-RULEGIT for Microsoft.
  773. Most investigations start off with a tip through this hot-line. Everyday, 30 to
  774. 40 calls are received, mostly from employees and consultants for software firms.
  775. Together with law enforcement officers from the government, the anti-piracy
  776. organizations will pursue these leads and often arrest the violator through a
  777. sting operation. Besides calling in to give tips on copyright violators, the
  778. public can also call in to receive information about preventing software piracy.
  779. 7.4. Education
  780. In addition to playing cops and robbers with software pirates all over the
  781. world, the SPA and BSA are also committed to teaching the public the degrading
  782. effects of software piracy using propagandistic methods, and helping companies
  783. prevent copyright violations through educational courses and software utilities.
  784. Noticing the prevalence of software piracy everywhere, the anti-piracy
  785. organizations are trying to change the cultural view that copying and buying
  786. illegal versions of software is okay. The SPA, especially, has undergone
  787. extensive efforts to make the public aware of the illegality of software piracy.
  788. Free brochures for the general public with titles such as "Software Use and the
  789. Law" and "Is it Okay to Copy My Colleague’s Software?" contain information about
  790. copyright laws and demonstrate the legal extent of using software. "It Could
  791. Have Been So Easy" is a seven minute video intended for companies, showing what
  792. can happen if one is found guilty of copyright infringement, and also giving
  793. advice on maintaining an efficient software management program. Another video
  794. called "Don’t Copy That Floppy" is a rap/hip-hop music video attracting the
  795. younger generation that educates them in ethical problems with pirating
  796. software. Both these videos can be purchased for $20 and $15 dollars
  797. respectively.
  798. In addition to distributing brochures and videos which educate the public on the
  799. legal and ethical ramifications of software piracy, the SPA offers a free
  800. software tool called the Self-Audit Kit that allows companies to maintain an
  801. inventory of all the software on their systems. This way any accidental use of
  802. pirated software can be detected and quickly remedied. The software comes in 6
  803. different languages and is also available for the Macintosh. A more effective
  804. tool of education is the SPA Certified Software Manager Course (CSM). This
  805. course gives computer professionals the skills needed to organize a software
  806. management program for their company. They are also taught the legal aspects of
  807. software use and how to "optimize the legal use of software." This course is
  808. currently taught in the USA, England, France, Germany and Singapore and will
  809. soon extend to China, India and several Latin American countries.
  810. 7.5. Economics
  811. Software piracy is an economic and legal problem that impacts every community.
  812. Software piracy is something very new to many people. A lot people don’t know
  813. about it and others don’t think it is illegal when they copy software from the
  814. floppy disk. "Many people don’t see a harm in it," says Robert Holleyman,
  815. president of the Business Software Alliance (BSA). "Business owners would never
  816. think of asking their employees to steal computers, but many of those same
  817. business people don’t think twice about buying one or two programs and
  818. duplicating them for all the PCs in their office." Many people convicted of
  819. copyright violations are simply naive or ignorant of the law. For example, "A
  820. misguided computer technician had take an application intended for five bean
  821. counters and install it every where in the operation department." Another
  822. example is a mother, "Miki Casalino, in whose house Novell found the ‘Planet
  823. Gallifrey BBS’ which she admitted was run by her son, though she only learned of
  824. the alleged illegal software after it was too late." The problem is that all of
  825. them are "innocent" but on the other hand, they are violating the copyright of
  826. the software. We must concede that copying software, like drinking and driving,
  827. is something that everybody disapproves of, yet most people do at least one. "Of
  828. 300 PC-using managers questioned earlier this year by MORI, a market-research
  829. group, 55% admitted to copying software illegally."
  830. A contribution to the seduction of computer users is the fact that using the
  831. pirated software is as good as using the legal software but the prices are
  832. better. In addition, it has been said that " From the user’s standpoint there’s
  833. virtually no risk to using pirated software." And it is not hard to copy
  834. software. All that is needed is a computer, the empty diskettes, and of course
  835. the software program you want to have.
  836. Finally, the fact is that few people are actually prosecuted each year for
  837. software copyright infringement, and most offenses don’t warrant maximum fines
  838. or jail time. Human nature being what it is, software piracy persists.
  839. Most people know that copying the software is illegal, but they still do it. The
  840. reason is very simple. They can make a lot of money from doing it and the
  841. consequences are nil or avoidable. According to Iritani "It was a check forgery
  842. case that led deputies to the quiet Rowland Heights cull-de-sac. But they found
  843. at the home of Ming Chin Jin and his wife, Pifen Lo, was $400,000 worth of
  844. counterfeit copies of Microsoft’s Encarta’s 95 CD-ROM encyclopedia and 48,000
  845. fake holograms from China." Indeed, high profits and minimal penalties make this
  846. form of high-tech crime a criminal’s dream and a police officer’s nightmare.
  847. Iritani wrote, "most cases are not prosecuted for the lack of evidence or end up
  848. in civil court, where monetary penalties have proven to be ineffective." The
  849. making of a counterfeiting lab are very easy to acquire and relative
  850. inexpensive. According to Iritani, all they need are "a computer, a disk or
  851. CD-ROM duplication machine, a laser printer, a shrink-wrap machine and someone
  852. willing to produce the labels and packaging."
  853. 8. Conclusion
  854. Software piracy exists. We covered the basic definition of software piracy, the
  855. methods involved, the potential solutions, and the social implications. In
  856. conclusion, let us address two questions
  857. The first question is "What can you do avoid piracy and pirated software?" Your
  858. options as a user are to purchase authentic software and to report violations.
  859. In this way you protect yourself and the software industry from the damages of
  860. software piracy. As mentioned before there are numerous ways to assure you are
  861. purchasing authentic software. Be aware of words and warnings, such as "warez"
  862. that are "red flags" of pirated software. Remember that there are hotlines
  863. available to report software piracy and report any suspicious sites.
  864. The second question one should address is "Why shouldn’t you pirate?" Reasons
  865. for not pirating software include the legal consequences as well as ethical and
  866. moral issues. The legal consequences can include fines or jail time while the
  867. ethical issues can effect your reputation and standing in the professional and
  868. personal community. Piracy won’t be eliminated until users determine as a
  869. community that it is wrong and take a united stand to eliminate it.
  870. --Original author: Ilya
  871. --Reformatting, Subtitles, Index: Mr.F

comments powered by Disqus