Knowledge

Copy protection

Source 📝

128: 1276:, it refuses to boot, as the first of several checksums has failed. A second checksum will weed out most unauthorized copies of the game, but hacking the data to get past this checksum will trigger a third checksum that makes enemy encounters appear much more often than in an authorized copy, and if the player progresses through the game without giving up (or cracks this protection), a final checksum code will activate before the final boss battle, freezing the game and deleting all the save files. A similar copy protection system was used in 1089:) became creative about crippling the software in case it was duplicated. These games would initially show that the copy was successful, but eventually render themselves unplayable via subtle methods. Many games use the "code checksumming" technique to prevent alteration of code to bypass other copy protection. Important constants for the game - such as the accuracy of the player's firing, the speed of their movement, etc. - are not included in the game but calculated from the numbers making up the 940:
gain-control circuitry in VCRs, is said to "plug the analog hole" and make VCR-to-VCR copies impossible, although an inexpensive circuit is widely available that will defeat the protection by removing the pulses. Macrovision had patented methods of defeating copy prevention, giving it a more straightforward basis to shut down manufacture of any device that descrambles it than often exists in the DRM world. While used for pre-recorded tapes, the system was not adopted for television broadcasts;
273: 3314: 1608: 825:—was a card with color sequences at each grid reference that had to be entered before starting the game. This also prevented monochrome photocopying. It had been thought that the codes in the tables were based on a mathematical formula which could be calculated by using the row, line and page number if the formula was known, a function of the disk space requirement of the data. Later research proved that this was not the case. 1511:, if the game code detects what it believes to be an unauthorized copy, an invincible scorpion-like monster is spawned in the beginning of the game with high speeds, melee attacks, and attacks from a range with twin chainguns making the game extremely difficult and preventing the player from progressing further. Also in the level "Under the Iron Cloud", the player's character will spin out-of-control looking up in the air. 1029: 66: 25: 449:: regardless of any digital restrictions, if music can be heard by the human ear, it can also be recorded (at the very least, with a microphone and tape recorder); if a film can be viewed by the human eye, it can also be recorded (at the very least, with a video camera and recorder). In practice, almost-perfect copies can typically be made by tapping into the analog output of a player (e.g. the 602:, Sidekick can be used without accompanying documentation and is for a general audience. Kahn said, according to Pournelle, that "any good hacker can defeat the copy protection in about an hour"; its purpose was to prevent large companies from purchasing one copy and easily distributing it internally. While reiterating his dislike of copy protection, Pournelle wrote "I can see Kahn's point". 970: 1489:, a play-by-BBS strategy game, contained code in its server which would check all clients' submitted turns for suspect registration codes. Any player deemed to be using a cracked copy, or cheating in the game, would have random forces destroyed throughout the game by an unbeatable enemy called "The Tim Continuum" (after the game's author, Tim Wissemann). A similar commercial game, 327:. Digital restrictions management is a more general term because it includes all sorts of management of works, including copy restrictions. Copy restriction may include measures that are not digital. A more appropriate term may be "technological protection measures" (TPMs), which is often defined as the use of technological tools in order to restrict the use or access to a work. 1169:, if it detects an unauthorized copy, it does not inform the player immediately but instead progressively corrupts aspects of the game (such as reducing the weapon accuracy to zero) to the point that it eventually becomes unplayable. The message "Original discs don't FADE" will eventually appear if the game is detected as being an unauthorized copy. 1427:, a puzzle game for the Amiga, contained code that caused an unlicensed version of the game to behave as a demo. The game would play three levels sampled from throughout the game, and then give the message "You have completed three levels; however there are 100 levels to complete on the original disc." 1767:
granted a motion to deny the prosecution the usage of words she views as "pejorative". This list included the word "piracy", the use of which, the motion by the defense stated, would serve no purpose but to misguide and inflame the jury. The plaintiff argued the common use of the terms when referring
1751:
have criticized the use of the word "piracy" in these situations, saying that publishers use the word to refer to "copying they don't approve of" and that "they imply that it is ethically equivalent to attacking ships on the high seas, kidnapping and murdering the people on them". Certain forms of
1451:
copy protection system gave an obvious message if the lens-coded letters were entered incorrectly, but if the user soft-reset the machine, the areas of memory occupied by the game would be flooded with the message "THANK YOU FOR YOUR INTEREST IN OUR PRODUCT. NICE TRY. LOVE BJ/NJ" to prevent the user
896:
included a game called "What is Missing?" in which every fifth time the program was booted up, the player would see a pattern and have to refer to the back of the manual to find which of 12 objects from the spinner counting game would match the pattern seen on the back of the manual in order to open
1589:
The usage of copy protection payloads which lower playability of a game without making it clear that this is a result of copy protection is now generally considered unwise, due to the potential for it to result in unaware players with unlicensed copies spreading word-of-mouth that a game is of low
901:
All of these methods proved to be troublesome and tiring for the players, and as such greatly declined in usage by the mid-1990s, at which point the emergence of CDs as the primary video game medium made copy protection largely redundant, since CD copying technology was not widely available at the
484:
Copyright protection in content platforms also cause increased market concentration and a loss in aggregate welfare. According to research on the European Directive on copyright in the Digital Single Market on platform competition, only users of large platforms will be allowed to upload content if
368:
Opponents of copy protection argue that people who obtain free copies only use what they can get for free and would not purchase their own copy if they were unable to obtain a free copy. Some even argue that free copies increase profit; people who receive a free copy of a music CD may then go and
259:
Some methods of copy protection have also led to criticism because it caused inconvenience for paying consumers or secretly installed additional or unwanted software to detect copying activities on the consumer's computer. Making copy protection effective while protecting consumer rights remains a
1251:
has a copy protection that swings the camera as though the player was drunk. If the player enters a car and motorcycle or boat it will automatically throttle, making it difficult to steer. It also damages the vehicle, making it vulnerable to collisions and bullets. An update to the game prevented
585:
agreed: "I guarantee that whatever scheme you come up with will take less time to break than to think of it." While calling piracy "a threat to software development. It's going to dry up the software", he said "It's wrong to copy-protect programs ... There ought to be some way to stop without
1436:
a character named Zoe will tell the player outside the room containing the balloon to Midday Garden Home and several other areas that the player is using an unlicensed copy. This conversation purposely corrupts data. When corrupted, the game would not only remove stray gems and the ability to
534:
When computer software was still distributed in audio cassettes, audio copying was unreliable, while digital copying was time consuming. Software prices were comparable with audio cassette prices. To make digital copying more difficult, many programs used non-standard loading methods (loaders
468:
Since these basic technical facts exist, it follows that a determined individual will definitely succeed in copying any media, given enough time and resources. Media publishers understand this; copy protection is not intended to stop professional operations involved in the unauthorized mass
390:
refers to the technology used to attempt to frustrate copying, and not to the legal remedies available to publishers or authors whose copyrights are violated. Software usage models range from node locking to floating licenses (where a fixed number licenses can be concurrently used across an
833:
offered a rotating wheel with halves of pirate's faces. The game showed a face composed of two different parts and asked when this pirate was hanged on a certain island. The player then had to match the faces on the wheel, and enter the year that appeared on the island-respective hole. Its
939:
feature of VCRs by adding pulses to the vertical blanking sync signal. These pulses may negatively affect picture quality, but succeed in confusing the recording-level circuitry of many consumer VCRs. This technology, which is aided by U.S. legislation mandating the presence of automatic
1122:
detects that the game is cracked or a pirated copy, it will replace tips in loading screens with messages telling the player to buy the game. If a new game is created on the copied game, an additional effect will take place. As a more humorous nod to "piracy", Alan Wake will gain a black
437:
From a technical standpoint, it seems impossible to completely prevent users from making copies of the media they purchase, as long as a "writer" is available that can write to blank media. All types of media require a "player"—a CD player, DVD player, videotape player, computer or
874:" which contained information vital to the completion of the game. For example, the parchment found from Zork Zero contained clues vital to solving the final puzzle. However, whenever the player attempts to read the parchment, they are referred to the game package. 692:
The most common method was requiring the player to enter a specific word (often chosen at random) from the manual. A variant of this technique involved matching a picture provided by the game to one in the manual and providing an answer pertaining to the picture
717:(in the floppy version but not the CD version) required the user to input an astronaut's total duration in space (available in the manual) before the launch of certain missions. If the answer were incorrect, the mission would suffer a catastrophic failure. 572:
Pournelle disliked copy protection and, except for games, refused to review software that used it. He did not believe that it was useful, writing in 1983 that "For every copy protection scheme there's a hacker ready to defeat it. Most involve so-called
684:
were sometimes protected with an external user-interactive method that demanded the user to have the original package or a part of it, usually the manual. Copy protection was activated not only at installation, but every time the game was executed.
364:
Companies publish works under copyright protection because they believe that the cost of implementing the copy protection will be less than the revenue produced by consumers who buy the product instead of acquiring it through casually copied media.
1480:
would have the player's character attacked by two unbeatable "FBI Agents" if it detected a cracked version. The FBI agents would also appear when restoring a save which was created by such a version, even if the version restoring the save was
1538:, in which the player runs a game development company, will dramatically increase the piracy rate of the games the player releases to the point where no money can be made at all, and disable the player's ability to take any action against it 1584:
if the player is playing a pirated copy of the game it will remove the train control UI if it detects that it has been pirated, which effectively stonewalls the player at the train's tutorial section very early on and thus making the game
2994: 1735:), and various international governments to combat copyright infringement relating to various types of creative works, such as software, music and films. These measures often come in the form of copy protection measures such as 1289:, the game save mechanism did not work and the in-game galactic map caused the game to crash. As the galactic map is needed to travel to different sections of the game, the player became stuck in the first section of the game. 1369:
used a serial number for initial copy protection. However, if this check was bypassed, a second hidden check would activate causing a random factor to be introduced into the CD burning process, producing corrupted "coaster"
1298:
was used, the Build Mode would not work properly. Walls could not be built on the player's property, which prevented the player from building any custom houses. Some furniture and clothing selections would not be available
2839: 472:
Copying of information goods which are downloaded (rather than being mass-duplicated as with physical media) can be inexpensively customized for each download, and thus restricted more effectively, in a process known as
315:
may be more neutral terms. "Copy protection" is a misnomer for some systems, because any number of copies can be made from an original and all of these copies will work, but only in one computer, or only with one
1955:
Greg Short, Comment, Combatting Software Piracy: Can Felony Penalties for Copyright Infringement Curtail the Copying of Computer Software?, 10 Santa Clara Computer & High Tech. L.J. 221 (1994). Available at:
428:
From business standpoint, on the other hand, some services now try to monetize on additional services other than the media content so users can have better experience than simply obtaining the copied product.
1140:
was not hidden as such, the repercussions of missing the codes was unusual: the player ended up in jail (permanently), and the police officer gave a lengthy and condescending speech about software copying.
442:—which must be able to read the media in order to display it to a human. Logically, a player could be built that reads the media and then writes an exact copy of what was read to the same type of media. 647:
To limit reusing activation keys to install the software on multiple machines, it has been attempted to tie the installed software to a specific machine by involving some unique feature of the machine.
1437:
progress in certain areas but also make the final boss unbeatable, returning the player to the beginning of the game (and removing the save file at the same time) after about 8 seconds into the battle.
1242:
contained code that disabled Batman's glider cape, making some areas of the game very difficult to complete and a certain achievement/trophy impossible to unlock (gliding continuously for over 100m).
1178:, and will similarly diminish the accuracy of the player's weapons, as well as induce a "drunken vision" effect, where the screen becomes wavy, should the player be playing on an unauthorized copy. 391:
enterprise), grid computing (where multiple computers function as one unit and so use a common license) and electronic licensing (where features can be purchased and activated online). The term
1529:
detects an illegitimate or downloaded copy of the game, it will convert the entire game's text into the game's symbol based foreign language, Borginian, which cannot be translated in any way.
2986: 1326:
have a copy protection system that completely wipes out the player's forces briefly after a battle begins on an unlicensed copy. However, some who purchased the latter have encountered a
2508: 1419:. Data from the multitap was used to calculate the time limit of each level. If the multitap was missing, the time limit would be calculated as 0, causing the level to end immediately. 2665: 335:
Unauthorized copying and distribution accounted for $ 2.4 billion per year in lost revenue in the United States alone in 1990, and is assumed to be causing impact on revenues in the
2385: 1801: 372:
Some publishers have avoided copy-protecting their products on the theory that the resulting inconvenience to their users outweighs any benefit of frustrating "casual copying".
2835: 984: 1520:
and their sequels will run as if it were normal, but the Pokémon will not gain any experience points after a battle. This has since been solved by patching the game's files.
629:"is almost unusable without its manual of over 600 pages!". (The magazine was mistaken; the ST version was so widely pirated that the company threatened to discontinue it.) 2932: 1780:. In fact, infringement accounts for 23.8% of all internet traffic in 2013. In an effort to cut down on this, both large and small films and music corporations have issued 1093:
of other parts of the game. If the code is changed, the calculation yields a result which no longer matches the original design of the game and the game plays improperly.
913:, have encouraged consumers and other developers to embrace the reality of unlicensed copying and utilize it positively to generate increased sales and marketing interest. 1575:, copy protection will prevent its player character, Faith, from sprinting, making it impossible for players to jump over long gaps and progress further on a pirated copy. 1557:, players who pirated the game will have their ammunition replaced with chickens that inflict no damage and have very little knockback, rendering ranged combat impossible. 2312: 656:
could not be used because some machines do not have them. Some popular surrogate for a machine serial number were date and time (to the second) of initialization of the
409:, and are licenses that at the time they are issued, there is no actual user who will use them. That has some technical influence over some of their characteristics. 813: 2872: 2812: 2746: 307:, but critics argue that the term tends to sway the public into identifying with the publishers, who favor restriction technologies, rather than with the users. 1525: 3087: 2769: 1566:, if a player used an unlicensed copy of the game, he is not able to defeat the last boss (The Alpha Ceph), thus making it impossible to beat the game. 1322: 1201:
technology to safeguard against piracy by making races very difficult to win on a pirated version. The penultimate section of the game's manual states:
2586: 2028: 361:
Many media formats are easy to copy using a machine, allowing consumers to distribute copies to their friends, a practice known as "casual copying".
2083: 1225:
This game is protected by the FADE system. You can play with a pirated game- but not for long. The quality of a pirated game will degrade over time.
399:. To safeguard copy protection and license management technologies themselves against tampering and hacking, software anti-tamper methods are used. 538:
Unauthorized software copying began to be a problem when floppy disks became the common storage media. The ease of copying depended on the system;
3208: 3056: 2500: 2485: 1302:
A March 2009 update to the BeeJive IM iPhone app included special functionality for users of the unauthorized version: the screen would read "
3801: 2661: 1936: 1444:
console would freeze at startup and play the sound of an enraged jaguar snarling if the inserted cartridge failed the initial security check.
1362:
for copy protection; if it is missing, the program will randomly corrupt the points of the user's model during usage, destroying their work.
2232: 1404:, as the message that appears when it occurs is not hostile ("Plug joystick in port 1, press fire, and no more resetting/experting!"). 2105: 1495:, would issue empty turn updates for players with invalid registration codes, meaning that none of their orders would ever be carried out. 2207: 1400:
game if it detected that a cartridge-based copying device had attempted to interrupt it. This copy protection system also doubles as an
1376:, a BBS terminal package, would appear to operate normally if cracked but would insert a warning that a pirated copy was in use into the 988: 2262: 2048: 1898: 1917: 1351:
noises will play over the notes during a song, which then become invisible. The game will also freeze if the player tries to pause it.
948:
said in 1985 that Macrovision was "not good technology" because it reduced picture quality and consumers could easily bypass it, while
3155: 2375: 2003:
Staehler, Frank (2022). "Copyright Protection in the Digital Single Market: Potential Consequences for Content Platform Competition".
3752: 1804:
is used to prevent counterfeit bills from being produced by image editing software. Similar technology has been proposed to prevent
613:, stated that copy protection added about $ 0.50 per copy to the cost of production of a game. Other software relied on complexity; 2285: 2182: 2132: 1876: 1866: 461:
content in this way is more tedious, but the same principle applies: if it can be printed or displayed, it can also be scanned and
1960: 2928: 2639: 2316: 1377: 1136: 2906: 1672: 1113:, if the player entered in the wrong information, they could still play the game, but with substantially increased difficulty. 3729: 3017: 2716: 2690: 2448: 1469:
ID as an error ID, meaning that users can be identified by their Steam account when asking for help about the error over the
1161: 1644: 1306:" whenever the user tried to establish a connection to any IM service, then quickly switch to a YouTube clip from the movie 2411: 505:
Copy protection for computer software, especially for games, has been a long cat-and-mouse struggle between publishers and
1272:
to ensure that the game is being played on legitimate hardware. If the game detects that it is being played on a European
3760: 2862: 2609: 745: 2802: 2738: 3791: 3201: 1651: 1580: 780: 707: 1187:, where the screen blurred and distorted when playing a counterfeit copy, making it hard to safely pilot a helicopter. 688:
Several imaginative and creative methods have been employed, in order to be both fun and hard to copy. These include:
477:". They can be encrypted in a fashion which is unique for each user's computer, and the decryption system can be made 3692: 1691: 1072: 1010: 189: 171: 149: 109: 52: 1054: 142: 91: 3806: 3488: 1821: 1625: 713: 38: 3129: 1784:
takedown notices, filed lawsuits, and pressed criminal prosecution of those who host these file sharing services.
3742: 1856: 1658: 1343: 992: 494: 1629: 1477: 1039: 889: 76: 3079: 2963: 465:. With basic software and some patience, these techniques can be applied by a typical computer-literate user. 3555: 3194: 2779: 768: 462: 1640: 668:, however, the practice of locking has to add to these simple hardware parameters to still prevent copying. 2578: 2025: 817:), making the paper very difficult to photocopy. Another variant of this method—most famously used on the 3747: 3668: 3468: 3110: 2075: 1191: 829: 1719:
It includes, but is by no means limited to, the combined efforts of corporate associations (such as the
3724: 3682: 3338: 3150: 3145: 2987:"Fox Issues DMCA Takedown To Google Over SF Chronicle Article... Claiming It Was The Movie 'Chronicle'" 2343: 1752:
anti-piracy (such as DRM) are considered by consumers to control the use of the products content after
1740: 1156: 720:
Manuals containing information and hints vital to the completion of the game, like answers to riddles (
3171: 1516: 284: 3585: 3303: 3176: 2836:"What happens when pirates play a game development simulator and then go bankrupt because of piracy?" 1831: 1736: 1432: 1100:
had no outward signs of copy protection, but if it decided it was not a legitimate copy, it made the
379:
and license managers sometimes fail, are inconvenient to use, and may not afford the user all of the
376: 324: 2471: 1502:, as soon as the game was started, the player character would immediately shoot himself in the head. 3786: 3570: 3448: 3343: 3048: 136: 1933: 509:. These were (and are) programmers who defeated copy protection on software as a hobby, add their 3658: 3610: 3273: 3181: 1618: 1050: 665: 552:
doesn't lend itself to copy protection" so its users "haven't been too worried" about it, while "
87: 2228: 1914: 979:
may contain an excessive amount of intricate detail that may interest only a particular audience
1705: 1109: 936: 923: 756: 153: 2203: 3699: 3433: 2254: 1895: 1713: 1665: 1542: 1238: 1209:
Copying commercial games, such as this one, is a criminal offense and copyright infringement.
953: 517: 2898: 3719: 3631: 3580: 3525: 3393: 3366: 3348: 3246: 3217: 1861: 1836: 1797: 1793: 1764: 1373: 1280:, although it only uses one copy protection check at the beginning of the game (see below). 906: 722: 44: 3313: 535:
incompatible with standard BASIC loaders, or loaders that used different transfer speed).
8: 3503: 3278: 3236: 2770:"Keeping the Pirates at Bay: Implementing Crack Protection for Spyro: Year of the Dragon" 1547: 1247: 1183: 1046: 893: 807: 340: 256:. It also may be incorporated into digitally distributed versions of media and software. 83: 2174: 956:
said "we want to accommodate our subscribers and we know they like to tape our movies".
457:
jacks) and, once redigitized into an unprotected form, duplicated indefinitely. Copying
3687: 3615: 3520: 2807: 1957: 1841: 1805: 1507: 1401: 840:
had the same concept, but with magic potion ingredients. Other games that employed the
529: 439: 402: 3166: 2635: 1768:
to copyright infringement should invalidate the motion, but the Judge did not concur.
395:
refers to broad platforms which enable the specification, enforcement and tracking of
3735: 3493: 3428: 3378: 3325: 3283: 3231: 1871: 1594:
explicitly acknowledged this as a reason for including the explicit warning message.
734: 728: 633: 610: 506: 478: 422: 354:, DVDs, computer software discs, video game discs and cartridges, audio CDs and some 2408:"Copy Protection in Jet Set Willy: developing methodology for retrogame archaeology" 664:
of Ethernet cards (although this is programmable on modern cards). With the rise of
520:
or Internet sites that specialized in distributing unauthorized copies of software.
3704: 3644: 3408: 3398: 3293: 2894: 1985: 1744: 1571: 1423: 1355: 1215:
Copying and re-supplying games such as this one can lead to a term of imprisonment.
1145: 941: 792: 774: 750: 653: 615: 595: 396: 3025: 2712: 2686: 2434: 935:
versions only), Macrovision licensed to publishers a technology that exploits the
778:), or a radio frequency to use to communicate with a character to further a game ( 3595: 3575: 3473: 3288: 2032: 1964: 1940: 1921: 1902: 1851: 1846: 1534: 1466: 1153:); weaponsmiths require iron to produce weapons, so players could not amass arms. 885:, shipped with the game, which was used to descramble a code displayed on screen. 836: 740: 539: 513:
to the title screen, and then distribute the "cracked" product to the network of
474: 445:
At a minimum, digital copy protection of non-interactive works is subject to the
2407: 2049:"Zenith Z-100, Epson QX-10, Software Licensing, and the Software Piracy Problem" 1465:
if the game detects that it has been copied. The error also includes the user's
1256:, making it impossible to finish the game as some missions involve browsing the 3796: 3765: 3663: 3513: 3463: 3438: 3403: 3383: 3263: 3251: 2376:"Code wheels, poison, and star maps: the creative ways old games fought piracy" 1553: 1457: 1396: 1303: 1257: 910: 882: 801: 677: 344: 336: 2613: 2563: 2548: 2542: 2536: 2530: 3780: 3675: 3636: 3605: 3600: 3453: 3443: 3413: 2481: 2348: 949: 822: 649: 587: 991:
any relevant information, and removing excessive detail that may be against
3709: 3565: 3268: 3182:
Details on the RapidLok tracks copy protection system used on many releases
2867: 1777: 1441: 1391: 1327: 1308: 1090: 846: 641: 606: 599: 582: 221:
by preventing the reproduction of software, films, music, and other media.
3649: 3483: 3458: 3423: 3258: 2361: 2076:"LORD OF CHAOS MANOR : Hoping for a message from a long-lost friend" 1809: 1748: 1709: 1485: 1338: 1331: 1316: 1285: 1253: 1128: 1101: 860: 818: 762: 681: 661: 621: 450: 446: 413:
are issued after a certain user requires it. As an example, an activated
369:
buy more of that band's music, which they would not have done otherwise.
2026:
http://www.studio-nibble.com/countlegger/01/HistoryOfCopyProtection.html
375:
From the perspective of the end user, copy protection is always a cost.
272: 3714: 3530: 3478: 3361: 3241: 3186: 2903:
Free Software, Free Society: The Selected Essays of Richard M. Stallman
2439: 1796:
is used by many countries to prevent color photocopiers from producing
1294: 1264: 1086: 841: 695: 577:
copiers, which try to analyze the original disk and then make a copy".
493:
For information on individual protection schemes and technologies, see
458: 245: 2103: 3590: 3545: 3540: 3388: 3356: 2774: 2476: 2444: 1989: 1826: 1408: 1269: 1118: 866: 701: 657: 637: 510: 485:
the content is sufficiently valuable and network effects are strong.
454: 414: 351: 323:
The term is also often related to, and confused with, the concept of
225: 218: 3163:
Discusses and analyzes protections used on old floppy-based systems.
1607: 1057:. Statements consisting only of original research should be removed. 791:
code. This code was arranged in a grid, and had to be entered via a
787:
Some sort of code with symbols, not existing on the keyboard or the
94:. Statements consisting only of original research should be removed. 3550: 3508: 3371: 2955: 2380: 1732: 1562: 1470: 1412: 1348: 1150: 1124: 626: 556:
users, though, have always had the problem. So have those who used
553: 380: 355: 253: 249: 241: 1976:
Wallach, D.S. (Oct 2011). "Copy protection technology is doomed".
1159:
developed a unique and very subtle protection system for its game
1116:
As a more satirical nod to the issue, if the thriller-action game
3560: 3535: 3498: 1448: 1174: 928: 878: 871: 591: 557: 233: 2929:"MPAA Banned From Using Piracy and Theft Terms in Hotfile Trial" 1776:
Today copyright infringement is often facilitated by the use of
3418: 3333: 2579:"Pay-TV looks elsewhere as theatrical movies lose their appeal" 1491: 1416: 1366: 1359: 574: 561: 317: 237: 3167:
Comprehensive article on video game piracy and its prevention.
3160: 2555: 1753: 1381: 1104:
in the game invisible, making it impossible to play the game.
788: 514: 2956:"Piracy Rules the Web, Dominating 23.8% of Internet Traffic" 2341:"The Next Generation 1996 Lexicon A to Z: Copy Protection". 320:, or only with another device that cannot be easily copied. 1781: 1724: 1720: 1591: 1461:
enabled a copy protection mechanism that outputs the error
1273: 1198: 1166: 854: 549: 544: 469:
duplication of media, but rather to stop "casual copying".
2501:"Minecraft Creator Notch Tells Players to Pirate His Game" 2175:"WordPerfect ST / Proving why it's the IBM PC best seller" 2104:
Curran, Lawrence J.; Shuford, Richard S. (November 1983).
1085:
Over time, software publishers (especially in the case of
1728: 945: 932: 811:), or were visible only through a red transparent layer ( 578: 343:, leading to proposal of stricter copyright laws such as 229: 2662:"Bohemia Interactive Details Unique Anti-Piracy Methods" 632:
Copy protection sometimes causes software not to run on
3156:
Evaluating New Copy-Prevention Techniques for Audio CDs
2863:"Game Pirates Whine About Piracy in Game Dev Simulator" 2522: 1787: 3049:"The Pirate Bay Trial: The Official Verdict – Guilty" 2899:"Confusing Words and Phrases That Are Worth Avoiding" 1958:
http://digitalcommons.law.scu.edu/chtlj/vol10/iss1/7
1231:
Purchase only genuine software at legitimate stores.
754:), dialogue spoken by other characters in the game ( 1915:
Confusing Words and Phrases that are Worth Avoiding
1632:. Unsourced material may be challenged and removed. 3018:"RIAA Sues Music Startup Napster for $ 20 Billion" 2576: 1704:Anti-piracy measures are efforts to fight against 1526:Ace Attorney Investigations 2: Prosecutor's Gambit 1498:On a copied version of the original PC version of 1323:The Lord of the Rings: The Battle for Middle-Earth 1149:, the iron smelters only produced pigs (a play on 738:), keys to deciphering non-Latin writing systems ( 2607: 2570: 2158:Louie, Gilman (April 1989). "Low Shelf 'ST'eem". 2042: 2040: 1822:Copyright infringement § Preventive measures 1384:of any BBS the user called could clearly read it. 16:Protection of software, films, music, other media 3778: 2046: 1452:examining leftover code to crack the protection. 1283:In an unauthorized version of the PC edition of 676:During the 1980s and 1990s, video games sold on 3172:Several algorithms used to generate serial keys 3130:"The battle to stop 3D-printed guns, explained" 2124: 1924:, GNU Project - Free Software Foundation (FSF). 1252:unauthorised copies from accessing the in-game 2739:"Beejive IM Moves To Block Out iPhone Pirates" 2166: 2037: 1934:How do technological protection measures work? 1905:, filmfodder.com 2007. Retrieved 19 July 2007. 1771: 1127:over his right eye, complete with a miniature 3202: 2310: 2157: 303:Media corporations have always used the term 3127: 2803:"Serious Sam's DRM Is A Giant Pink Scorpion" 2713:"MOTHER 2 / EarthBound Anti-Piracy Measures" 2246: 2067: 1268:is well-documented for its extensive use of 799:". These tables were printed on dark paper ( 2767: 2761: 2283: 2151: 1330:that caused this copy protection scheme to 1220:Think of a pirated game as stolen property. 921:Starting in 1985 with the video release of 53:Learn how and when to remove these messages 3209: 3195: 2277: 2097: 1943:, World Intellectual Property Organization 598:because, unlike his company's unprotected 350:Copy protection is most commonly found on 224:Copy protection is most commonly found on 3753:Security information and event management 2469: 2336: 2334: 2130: 1727:), law enforcement agencies (such as the 1692:Learn how and when to remove this message 1073:Learn how and when to remove this message 1011:Learn how and when to remove this message 190:Learn how and when to remove this message 172:Learn how and when to remove this message 110:Learn how and when to remove this message 3216: 3077: 2953: 2172: 2020: 2018: 2002: 1877:Trade group efforts against file sharing 1867:Sony BMG copy protection rootkit scandal 1743:, such as Distil Networks or Incapsula. 135:This article includes a list of general 3108: 3046: 2984: 2860: 2833: 2024:Copy Protection: A History and Outlook 1975: 1951: 1949: 1380:login packet it transmitted, where the 1137:Zak McKracken and the Alien Mindbenders 432: 3779: 2800: 2432: 2388:from the original on 19 September 2020 2331: 586:creating products that are unusable". 3730:Host-based intrusion detection system 3190: 2997:from the original on 12 November 2020 2966:from the original on 27 February 2021 2935:from the original on 30 November 2013 2642:from the original on 19 February 2012 2373: 2073: 2015: 1532:The unlicensed version of indie game 1162:Operation Flashpoint: Cold War Crisis 330: 3802:Compact Disc and DVD copy protection 3059:from the original on 3 February 2021 2893: 2815:from the original on 8 December 2011 2749:from the original on 8 November 2012 2719:from the original on 9 February 2011 2693:from the original on 8 February 2010 2451:from the original on January 7, 2021 2414:from the original on 29 January 2019 2313:"Copy protection on virtual systems" 2255:"Two Firms Plan to Sell Apple Clone" 2252: 1946: 1739:, or measures implemented through a 1630:adding citations to reliable sources 1601: 1022: 963: 671: 500: 383:of the product they have purchased. 267: 121: 59: 18: 3761:Runtime application self-protection 3177:Copy Protection Analysis on the C64 3078:Boorstin, julia (6 February 2013). 2954:Boorstin, Julia (31 January 2011). 2689:. Afterdawn.com. 9 September 2009. 2265:from the original on 14 August 2021 1788:Anti-counterfeiting and gun control 1332:trigger when it was not supposed to 959: 766:), excerpts of the storyline (most 13: 3312: 3111:"Currency Detector Easy to Defeat" 3109:Ulbrich, Chris (14 January 2004). 2875:from the original on 8 August 2014 2577:Holsopple, Barbara (5 June 1985). 2488:from the original on June 4, 2010. 2463: 2426: 2364:issue 83, "Don't copy that floppy" 1581:The Legend of Zelda: Spirit Tracks 1463:"Unable to shade polygon normals" 814:Indiana Jones and the Last Crusade 708:James Bond 007; the Stealth Affair 636:, such as the Apple II-compatible 141:it lacks sufficient corresponding 14: 3818: 3693:Security-focused operating system 3139: 3090:from the original on 2 April 2016 3015: 2498: 2470:Whitehead, Dan (April 15, 2010). 2433:Barter, Pavel (August 22, 2007). 2131:Pournelle, Jerry (October 1984). 797:What is the code at line 3 row 2? 530:Bad sector § Copy protection 34:This article has multiple issues. 3489:Insecure direct object reference 3146:V-Max Copy Protection on the C64 3128:German Lopez (August 29, 2018). 2909:from the original on 31 May 2010 2842:from the original on 17 May 2021 2801:Walker, John (7 December 2011). 1606: 1415:peripheral that also acted as a 1390:, a music creation tool for the 1027: 968: 425:where the product is installed. 271: 260:problem with media publication. 126: 64: 23: 3743:Information security management 3121: 3102: 3071: 3040: 3009: 2978: 2947: 2921: 2887: 2854: 2827: 2794: 2768:Dodd, Gavin (17 October 2001). 2731: 2705: 2679: 2668:from the original on 2012-03-15 2654: 2628: 2612:. Settlers3.com. Archived from 2601: 2589:from the original on 5 May 2021 2511:from the original on 2020-11-06 2492: 2400: 2367: 2355: 2304: 2253:Mace, Scott (13 January 1986). 2235:from the original on 2016-04-26 2221: 2210:from the original on 2016-12-22 2196: 2185:from the original on 2016-12-22 2086:from the original on 2021-05-22 1857:List of copy protection schemes 1617:needs additional citations for 1344:Michael Jackson: The Experience 564:has copy protection features". 495:List of copy protection schemes 325:digital restrictions management 42:or discuss these issues on the 2311:Dominic Haigh (28 June 2010). 2047:Pournelle, Jerry (June 1983). 1996: 1969: 1927: 1908: 1888: 1597: 1478:Alternate Reality: The Dungeon 1455:An update to the sandbox game 1292:If an unauthorized version of 1143:In case of copied versions of 405:are also being referred to as 263: 1: 2985:Masnick, Mike (29 May 2012). 2374:Kelly, Andy (4 August 2020). 2284:Bobo, Ervin (February 1988). 1882: 1802:Counterfeit Deterrence System 1181:This system was also used in 1134:While the copy protection in 769:Advanced Dungeons and Dragons 714:Buzz Aldrin's Race Into Space 523: 2636:"FADE Game Copy Protections" 2173:Pearlman, Gregg (May 1988). 993:Knowledge's inclusion policy 916: 217:, is any measure to enforce 7: 3748:Information risk management 3669:Multi-factor authentication 3225:Related security categories 2181:. Vol. 7, no. 1. 1815: 1772:Anti-piracy in file sharing 1053:the claims made and adding 830:The Secret of Monkey Island 497:or relevant category page. 90:the claims made and adding 10: 3823: 3725:Intrusion detection system 3683:Computer security software 3339:Advanced persistent threat 2528:Some relevant patents are 2472:"Banging the DRM • Page 2" 2286:"Project: Stealth Fighter" 2074:Riley, John (1985-10-27). 1741:content protection network 1712:, and other violations of 1157:Bohemia Interactive Studio 644:with certain peripherals. 594:justified copy-protecting 527: 488: 3792:Digital rights management 3624: 3324: 3310: 3304:Digital rights management 3224: 3161:Disk Preservation Project 3047:enigmax (17 April 2009). 2861:Ernesto (29 April 2013). 2834:Patrick (29 April 2013). 2351:. March 1996. p. 32. 1832:Digital rights management 1590:quality. The authors of 1433:Spyro: Year of the Dragon 1394:, would transform into a 1278:Spyro: Year of the Dragon 3449:Denial-of-service attack 3344:Arbitrary code execution 3151:Copy Protection in depth 1514:An unauthorized copy of 1337:If a player pirated the 567: 560:, and I understand that 3807:Computer access control 3659:Computer access control 3611:Rogue security software 3274:Electromagnetic warfare 2608:Sven Liebich, Germany. 1812:rather than copyright. 1806:3D printing of firearms 1517:Pokémon Black and White 421:which is locked to the 156:more precise citations. 3705:Obfuscation (software) 3434:Browser Helper Objects 3318: 2005:Web of Science Primary 1706:copyright infringement 1234: 937:automatic gain control 881:system used a plastic 746:Ultima writing systems 732:), recipes of spells ( 711:used this technique). 640:, or even the genuine 619:in 1988 observed that 248:discs and cartridges, 3700:Data-centric security 3581:Remote access trojans 3316: 2564:U.S. patent 5,625,691 2549:U.S. patent 4,907,093 2543:U.S. patent 4,819,098 2537:U.S. patent 4,577,216 2531:U.S. patent 4,631,603 2160:Computer Gaming World 1714:intellectual property 1543:stand-alone expansion 1476:The Atari version of 1407:The Amiga version of 1239:Batman: Arkham Asylum 1206: 1172:FADE is also used in 528:Further information: 3632:Application security 3526:Privilege escalation 3394:Cross-site scripting 3247:Cybersex trafficking 3218:Information security 2583:The Pittsburgh Press 2204:"Word Perfect Furor" 2162:(letter). p. 4. 1939:14 June 2013 at the 1862:Software anti-tamper 1837:Digital watermarking 1798:counterfeit currency 1794:EURion constellation 1765:Kathleen M. Williams 1626:improve this article 723:Conquests of Camelot 433:Technical challenges 417:product, contains a 3279:Information warfare 3237:Automotive security 2561:One such patent is 2435:"Protect and Serve" 1248:Grand Theft Auto IV 1184:Take On Helicopters 1110:Sid Meier's Pirates 894:Broderbund Software 341:video game industry 3688:Antivirus software 3556:Social engineering 3521:Polymorphic engine 3474:Fraudulent dialers 3379:Hardware backdoors 3319: 3086:. Chennai, India. 3080:"The Weakest Link" 2808:Rock Paper Shotgun 2743:washingtonpost.com 2031:2009-12-13 at the 1963:2021-01-16 at the 1920:2013-06-03 at the 1901:2020-08-15 at the 1842:Floating licensing 1508:Serious Sam 3: BFE 1365:Older versions of 1354:Older versions of 1245:The PC version of 1038:possibly contains 440:video game console 393:license management 331:Business rationale 283:. You can help by 207:content protection 75:possibly contains 3774: 3773: 3736:Anomaly detection 3641:Secure by default 3494:Keystroke loggers 3429:Drive-by download 3317:vectorial version 3284:Internet security 3232:Computer security 2895:Stallman, Richard 2745:. 19 March 2009. 2638:. GameBurnWorld. 2080:Los Angeles Times 1894:Thomas Obnigene, 1872:Tamper resistance 1808:, for reasons of 1702: 1701: 1694: 1676: 1641:"Copy protection" 1195:(2003 video game) 1083: 1082: 1075: 1040:original research 1021: 1020: 1013: 744:series, see also 672:Early video games 611:Spectrum Holobyte 501:Computer software 407:Indirect Licenses 403:Floating licenses 397:software licenses 301: 300: 242:computer software 200: 199: 192: 182: 181: 174: 120: 119: 112: 77:original research 57: 3814: 3645:Secure by design 3576:Hardware Trojans 3409:History sniffing 3399:Cross-site leaks 3294:Network security 3211: 3204: 3197: 3188: 3187: 3134: 3133: 3125: 3119: 3118: 3106: 3100: 3099: 3097: 3095: 3075: 3069: 3068: 3066: 3064: 3044: 3038: 3037: 3035: 3033: 3024:. Archived from 3013: 3007: 3006: 3004: 3002: 2982: 2976: 2975: 2973: 2971: 2960:CNBC Media Money 2951: 2945: 2944: 2942: 2940: 2925: 2919: 2918: 2916: 2914: 2891: 2885: 2884: 2882: 2880: 2858: 2852: 2851: 2849: 2847: 2831: 2825: 2824: 2822: 2820: 2798: 2792: 2791: 2789: 2787: 2782:on 26 March 2008 2778:. Archived from 2765: 2759: 2758: 2756: 2754: 2735: 2729: 2728: 2726: 2724: 2709: 2703: 2702: 2700: 2698: 2683: 2677: 2676: 2674: 2673: 2664:. GamePolitics. 2658: 2652: 2651: 2649: 2647: 2632: 2626: 2625: 2623: 2621: 2605: 2599: 2598: 2596: 2594: 2585:. pp. C12. 2574: 2568: 2566: 2559: 2553: 2551: 2545: 2539: 2533: 2526: 2520: 2519: 2517: 2516: 2496: 2490: 2489: 2467: 2461: 2460: 2458: 2456: 2430: 2424: 2423: 2421: 2419: 2404: 2398: 2397: 2395: 2393: 2371: 2365: 2359: 2353: 2352: 2338: 2329: 2328: 2326: 2324: 2315:. Archived from 2308: 2302: 2301: 2299: 2297: 2281: 2275: 2274: 2272: 2270: 2250: 2244: 2243: 2241: 2240: 2225: 2219: 2218: 2216: 2215: 2200: 2194: 2193: 2191: 2190: 2170: 2164: 2163: 2155: 2149: 2148: 2146: 2144: 2133:"Minor Problems" 2128: 2122: 2121: 2119: 2117: 2112:. pp. 88–97 2106:"IBM's Estridge" 2101: 2095: 2094: 2092: 2091: 2071: 2065: 2064: 2062: 2060: 2044: 2035: 2022: 2013: 2012: 2000: 1994: 1993: 1990:10.1109/2.955098 1973: 1967: 1953: 1944: 1931: 1925: 1912: 1906: 1892: 1745:Richard Stallman 1697: 1690: 1686: 1683: 1677: 1675: 1634: 1610: 1602: 1356:Autodesk 3ds Max 1146:The Settlers III 1078: 1071: 1067: 1064: 1058: 1055:inline citations 1031: 1030: 1023: 1016: 1009: 1005: 1002: 996: 972: 971: 964: 960:Notable payloads 942:Michael J. Fuchs 888:Early copies of 883:prismatic device 795:at the request " 793:virtual keyboard 781:Metal Gear Solid 775:Wing Commander I 748:), maze guides ( 479:tamper-resistant 296: 293: 275: 268: 215:copy restriction 205:, also known as 195: 188: 177: 170: 166: 163: 157: 152:this article by 143:inline citations 130: 129: 122: 115: 108: 104: 101: 95: 92:inline citations 68: 67: 60: 49: 27: 26: 19: 3822: 3821: 3817: 3816: 3815: 3813: 3812: 3811: 3787:Copy protection 3777: 3776: 3775: 3770: 3620: 3320: 3308: 3299:Copy protection 3289:Mobile security 3220: 3215: 3142: 3137: 3126: 3122: 3107: 3103: 3093: 3091: 3076: 3072: 3062: 3060: 3045: 3041: 3031: 3029: 3028:on 27 June 2017 3014: 3010: 3000: 2998: 2983: 2979: 2969: 2967: 2952: 2948: 2938: 2936: 2927: 2926: 2922: 2912: 2910: 2892: 2888: 2878: 2876: 2859: 2855: 2845: 2843: 2832: 2828: 2818: 2816: 2799: 2795: 2785: 2783: 2766: 2762: 2752: 2750: 2737: 2736: 2732: 2722: 2720: 2715:. Starmen.Net. 2711: 2710: 2706: 2696: 2694: 2687:"Afterdawn.com" 2685: 2684: 2680: 2671: 2669: 2660: 2659: 2655: 2645: 2643: 2634: 2633: 2629: 2619: 2617: 2616:on 4 March 2001 2610:"Settlers3.com" 2606: 2602: 2592: 2590: 2575: 2571: 2562: 2560: 2556: 2547: 2541: 2535: 2529: 2527: 2523: 2514: 2512: 2497: 2493: 2468: 2464: 2454: 2452: 2431: 2427: 2417: 2415: 2406: 2405: 2401: 2391: 2389: 2372: 2368: 2360: 2356: 2347:. No. 15. 2344:Next Generation 2340: 2339: 2332: 2322: 2320: 2309: 2305: 2295: 2293: 2282: 2278: 2268: 2266: 2251: 2247: 2238: 2236: 2227: 2226: 2222: 2213: 2211: 2202: 2201: 2197: 2188: 2186: 2171: 2167: 2156: 2152: 2142: 2140: 2129: 2125: 2115: 2113: 2102: 2098: 2089: 2087: 2072: 2068: 2058: 2056: 2045: 2038: 2033:Wayback Machine 2023: 2016: 2001: 1997: 1974: 1970: 1965:Wayback Machine 1954: 1947: 1941:Wayback Machine 1932: 1928: 1922:Wayback Machine 1913: 1909: 1903:Wayback Machine 1893: 1889: 1885: 1852:License manager 1847:Cheat cartridge 1818: 1790: 1774: 1761:MPAA v. Hotfile 1698: 1687: 1681: 1678: 1635: 1633: 1623: 1611: 1600: 1535:Game Dev Tycoon 1295:The Sims 2 1260:for objectives. 1227: 1223: 1217: 1211: 1098:Superior Soccer 1079: 1068: 1062: 1059: 1044: 1032: 1028: 1017: 1006: 1000: 997: 983:Please help by 982: 973: 969: 962: 924:The Cotton Club 919: 907:game developers 844:system include 674: 570: 540:Jerry Pournelle 532: 526: 503: 491: 475:traitor tracing 435: 411:Direct Licenses 388:copy protection 333: 309:Copy prevention 305:copy protection 297: 291: 288: 281:needs expansion 266: 211:copy prevention 203:Copy protection 196: 185: 184: 183: 178: 167: 161: 158: 148:Please help to 147: 131: 127: 116: 105: 99: 96: 81: 69: 65: 28: 24: 17: 12: 11: 5: 3820: 3810: 3809: 3804: 3799: 3794: 3789: 3772: 3771: 3769: 3768: 3766:Site isolation 3763: 3758: 3757: 3756: 3750: 3740: 3739: 3738: 3733: 3722: 3717: 3712: 3707: 3702: 3697: 3696: 3695: 3690: 3680: 3679: 3678: 3673: 3672: 3671: 3664:Authentication 3656: 3655: 3654: 3653: 3652: 3642: 3639: 3628: 3626: 3622: 3621: 3619: 3618: 3613: 3608: 3603: 3598: 3593: 3588: 3583: 3578: 3573: 3568: 3563: 3558: 3553: 3548: 3543: 3538: 3533: 3528: 3523: 3518: 3517: 3516: 3506: 3501: 3496: 3491: 3486: 3481: 3476: 3471: 3466: 3464:Email spoofing 3461: 3456: 3451: 3446: 3441: 3436: 3431: 3426: 3421: 3416: 3411: 3406: 3404:DOM clobbering 3401: 3396: 3391: 3386: 3384:Code injection 3381: 3376: 3375: 3374: 3369: 3364: 3359: 3351: 3346: 3341: 3336: 3330: 3328: 3322: 3321: 3311: 3309: 3307: 3306: 3301: 3296: 3291: 3286: 3281: 3276: 3271: 3266: 3264:Cyberterrorism 3261: 3256: 3255: 3254: 3252:Computer fraud 3249: 3239: 3234: 3228: 3226: 3222: 3221: 3214: 3213: 3206: 3199: 3191: 3185: 3184: 3179: 3174: 3169: 3164: 3158: 3153: 3148: 3141: 3140:External links 3138: 3136: 3135: 3120: 3101: 3070: 3039: 3008: 2977: 2946: 2920: 2886: 2853: 2826: 2793: 2760: 2730: 2704: 2678: 2653: 2627: 2600: 2569: 2554: 2521: 2491: 2462: 2425: 2399: 2366: 2354: 2330: 2319:on 8 June 2010 2303: 2276: 2245: 2220: 2195: 2165: 2150: 2123: 2096: 2066: 2036: 2014: 1995: 1968: 1945: 1926: 1907: 1886: 1884: 1881: 1880: 1879: 1874: 1869: 1864: 1859: 1854: 1849: 1844: 1839: 1834: 1829: 1824: 1817: 1814: 1789: 1786: 1773: 1770: 1710:counterfeiting 1700: 1699: 1614: 1612: 1605: 1599: 1596: 1587: 1586: 1576: 1567: 1558: 1554:Crysis Warhead 1539: 1530: 1521: 1512: 1503: 1496: 1482: 1474: 1453: 1445: 1438: 1428: 1420: 1405: 1397:Space Invaders 1385: 1371: 1363: 1352: 1335: 1313: 1304:PC LOAD LETTER 1300: 1290: 1281: 1261: 1243: 1205: 1204: 1203: 1202: 1197:also utilizes 1193:IndyCar Series 1188: 1179: 1154: 1141: 1132: 1114: 1105: 1081: 1080: 1035: 1033: 1026: 1019: 1018: 976: 974: 967: 961: 958: 918: 915: 911:Markus Persson 899: 898: 886: 875: 858:games such as 851: 826: 802:Maniac Mansion 785: 735:King's Quest 3 729:King's Quest 6 718: 678:audio cassette 673: 670: 666:virtualization 569: 566: 548:in 1983 that " 525: 522: 502: 499: 490: 487: 434: 431: 419:Direct License 332: 329: 299: 298: 278: 276: 265: 262: 198: 197: 180: 179: 134: 132: 125: 118: 117: 72: 70: 63: 58: 32: 31: 29: 22: 15: 9: 6: 4: 3: 2: 3819: 3808: 3805: 3803: 3800: 3798: 3795: 3793: 3790: 3788: 3785: 3784: 3782: 3767: 3764: 3762: 3759: 3754: 3751: 3749: 3746: 3745: 3744: 3741: 3737: 3734: 3731: 3728: 3727: 3726: 3723: 3721: 3718: 3716: 3713: 3711: 3708: 3706: 3703: 3701: 3698: 3694: 3691: 3689: 3686: 3685: 3684: 3681: 3677: 3676:Authorization 3674: 3670: 3667: 3666: 3665: 3662: 3661: 3660: 3657: 3651: 3648: 3647: 3646: 3643: 3640: 3638: 3637:Secure coding 3635: 3634: 3633: 3630: 3629: 3627: 3623: 3617: 3614: 3612: 3609: 3607: 3606:SQL injection 3604: 3602: 3599: 3597: 3594: 3592: 3589: 3587: 3586:Vulnerability 3584: 3582: 3579: 3577: 3574: 3572: 3571:Trojan horses 3569: 3567: 3566:Software bugs 3564: 3562: 3559: 3557: 3554: 3552: 3549: 3547: 3544: 3542: 3539: 3537: 3534: 3532: 3529: 3527: 3524: 3522: 3519: 3515: 3512: 3511: 3510: 3507: 3505: 3502: 3500: 3497: 3495: 3492: 3490: 3487: 3485: 3482: 3480: 3477: 3475: 3472: 3470: 3467: 3465: 3462: 3460: 3457: 3455: 3454:Eavesdropping 3452: 3450: 3447: 3445: 3444:Data scraping 3442: 3440: 3437: 3435: 3432: 3430: 3427: 3425: 3422: 3420: 3417: 3415: 3414:Cryptojacking 3412: 3410: 3407: 3405: 3402: 3400: 3397: 3395: 3392: 3390: 3387: 3385: 3382: 3380: 3377: 3373: 3370: 3368: 3365: 3363: 3360: 3358: 3355: 3354: 3352: 3350: 3347: 3345: 3342: 3340: 3337: 3335: 3332: 3331: 3329: 3327: 3323: 3315: 3305: 3302: 3300: 3297: 3295: 3292: 3290: 3287: 3285: 3282: 3280: 3277: 3275: 3272: 3270: 3267: 3265: 3262: 3260: 3257: 3253: 3250: 3248: 3245: 3244: 3243: 3240: 3238: 3235: 3233: 3230: 3229: 3227: 3223: 3219: 3212: 3207: 3205: 3200: 3198: 3193: 3192: 3189: 3183: 3180: 3178: 3175: 3173: 3170: 3168: 3165: 3162: 3159: 3157: 3154: 3152: 3149: 3147: 3144: 3143: 3131: 3124: 3116: 3112: 3105: 3089: 3085: 3081: 3074: 3058: 3054: 3050: 3043: 3027: 3023: 3019: 3016:Menta, Rich. 3012: 2996: 2992: 2988: 2981: 2965: 2961: 2957: 2950: 2934: 2930: 2924: 2908: 2905:. GNU Press. 2904: 2900: 2896: 2890: 2874: 2870: 2869: 2864: 2857: 2841: 2837: 2830: 2814: 2810: 2809: 2804: 2797: 2781: 2777: 2776: 2771: 2764: 2748: 2744: 2740: 2734: 2718: 2714: 2708: 2692: 2688: 2682: 2667: 2663: 2657: 2641: 2637: 2631: 2615: 2611: 2604: 2588: 2584: 2580: 2573: 2565: 2558: 2550: 2544: 2538: 2532: 2525: 2510: 2506: 2502: 2499:Thier, Dave. 2495: 2487: 2483: 2482:Gamer Network 2479: 2478: 2473: 2466: 2450: 2446: 2442: 2441: 2436: 2429: 2413: 2409: 2403: 2387: 2383: 2382: 2377: 2370: 2363: 2358: 2350: 2349:Imagine Media 2346: 2345: 2337: 2335: 2318: 2314: 2307: 2291: 2287: 2280: 2264: 2260: 2256: 2249: 2234: 2230: 2224: 2209: 2205: 2199: 2184: 2180: 2176: 2169: 2161: 2154: 2139:. p. 317 2138: 2134: 2127: 2111: 2107: 2100: 2085: 2081: 2077: 2070: 2055:. p. 411 2054: 2050: 2043: 2041: 2034: 2030: 2027: 2021: 2019: 2010: 2006: 1999: 1991: 1987: 1984:(10): 48–49. 1983: 1979: 1972: 1966: 1962: 1959: 1952: 1950: 1942: 1938: 1935: 1930: 1923: 1919: 1916: 1911: 1904: 1900: 1897: 1891: 1887: 1878: 1875: 1873: 1870: 1868: 1865: 1863: 1860: 1858: 1855: 1853: 1850: 1848: 1845: 1843: 1840: 1838: 1835: 1833: 1830: 1828: 1825: 1823: 1820: 1819: 1813: 1811: 1807: 1803: 1799: 1795: 1785: 1783: 1779: 1769: 1766: 1762: 1757: 1755: 1750: 1746: 1742: 1738: 1734: 1730: 1726: 1722: 1717: 1715: 1711: 1707: 1696: 1693: 1685: 1674: 1671: 1667: 1664: 1660: 1657: 1653: 1650: 1646: 1643: –  1642: 1638: 1637:Find sources: 1631: 1627: 1621: 1620: 1615:This article 1613: 1609: 1604: 1603: 1595: 1593: 1583: 1582: 1577: 1574: 1573: 1572:Mirror's Edge 1568: 1565: 1564: 1559: 1556: 1555: 1550: 1549: 1544: 1540: 1537: 1536: 1531: 1528: 1527: 1522: 1519: 1518: 1513: 1510: 1509: 1504: 1501: 1497: 1494: 1493: 1488: 1487: 1483: 1479: 1475: 1472: 1468: 1464: 1460: 1459: 1454: 1450: 1446: 1443: 1439: 1435: 1434: 1429: 1426: 1425: 1421: 1418: 1414: 1410: 1406: 1403: 1399: 1398: 1393: 1389: 1386: 1383: 1379: 1375: 1372: 1368: 1364: 1361: 1357: 1353: 1350: 1346: 1345: 1340: 1336: 1333: 1329: 1325: 1324: 1319: 1318: 1314: 1311: 1310: 1305: 1301: 1297: 1296: 1291: 1288: 1287: 1282: 1279: 1275: 1271: 1267: 1266: 1262: 1259: 1255: 1250: 1249: 1244: 1241: 1240: 1236: 1235: 1233: 1232: 1228: 1226: 1222: 1221: 1216: 1212: 1210: 1200: 1196: 1194: 1189: 1186: 1185: 1180: 1177: 1176: 1171: 1170: 1168: 1164: 1163: 1158: 1155: 1152: 1148: 1147: 1142: 1139: 1138: 1133: 1130: 1126: 1121: 1120: 1115: 1112: 1111: 1106: 1103: 1099: 1096: 1095: 1094: 1092: 1088: 1077: 1074: 1066: 1056: 1052: 1048: 1042: 1041: 1036:This section 1034: 1025: 1024: 1015: 1012: 1004: 994: 990: 986: 980: 977:This section 975: 966: 965: 957: 955: 951: 950:Peter Chernin 947: 943: 938: 934: 930: 926: 925: 914: 912: 908: 903: 895: 891: 887: 884: 880: 876: 873: 869: 868: 863: 862: 857: 856: 852: 849: 848: 843: 839: 838: 832: 831: 827: 824: 823:Jet Set Willy 820: 816: 815: 810: 809: 804: 803: 798: 794: 790: 786: 783: 782: 777: 776: 771: 770: 765: 764: 759: 758: 753: 752: 747: 743: 742: 737: 736: 731: 730: 725: 724: 719: 716: 715: 710: 709: 704: 703: 698: 697: 691: 690: 689: 686: 683: 679: 669: 667: 663: 659: 655: 651: 650:Serial number 645: 643: 639: 635: 630: 628: 624: 623: 618: 617: 612: 608: 603: 601: 597: 593: 589: 588:Philippe Kahn 584: 580: 576: 575:nibble/nybble 565: 563: 559: 555: 551: 547: 546: 541: 536: 531: 521: 519: 516: 512: 508: 498: 496: 486: 482: 480: 476: 470: 466: 464: 460: 456: 452: 448: 443: 441: 430: 426: 424: 420: 416: 412: 408: 404: 400: 398: 394: 389: 384: 382: 378: 373: 370: 366: 362: 359: 357: 353: 348: 346: 342: 338: 328: 326: 321: 319: 314: 310: 306: 295: 292:November 2015 286: 282: 279:This section 277: 274: 270: 269: 261: 257: 255: 251: 247: 243: 239: 235: 234:Blu-ray discs 231: 227: 222: 220: 216: 212: 208: 204: 194: 191: 176: 173: 165: 155: 151: 145: 144: 138: 133: 124: 123: 114: 111: 103: 100:November 2011 93: 89: 85: 79: 78: 73:This article 71: 62: 61: 56: 54: 47: 46: 41: 40: 35: 30: 21: 20: 3710:Data masking 3298: 3269:Cyberwarfare 3123: 3114: 3104: 3092:. Retrieved 3083: 3073: 3061:. Retrieved 3053:TorrentFreak 3052: 3042: 3030:. Retrieved 3026:the original 3021: 3011: 2999:. Retrieved 2990: 2980: 2968:. Retrieved 2959: 2949: 2937:. Retrieved 2923: 2911:. Retrieved 2902: 2889: 2877:. Retrieved 2868:TorrentFreak 2866: 2856: 2844:. Retrieved 2829: 2817:. Retrieved 2806: 2796: 2784:. Retrieved 2780:the original 2773: 2763: 2751:. Retrieved 2742: 2733: 2721:. Retrieved 2707: 2695:. Retrieved 2681: 2670:. Retrieved 2656: 2644:. Retrieved 2630: 2618:. Retrieved 2614:the original 2603: 2591:. Retrieved 2582: 2572: 2557: 2524: 2513:. Retrieved 2504: 2494: 2475: 2465: 2453:. Retrieved 2438: 2428: 2416:. Retrieved 2402: 2390:. Retrieved 2379: 2369: 2357: 2342: 2321:. Retrieved 2317:the original 2306: 2294:. Retrieved 2292:. p. 51 2289: 2279: 2267:. Retrieved 2258: 2248: 2237:. Retrieved 2223: 2212:. Retrieved 2198: 2187:. Retrieved 2178: 2168: 2159: 2153: 2141:. Retrieved 2136: 2126: 2114:. Retrieved 2109: 2099: 2088:. Retrieved 2079: 2069: 2057:. Retrieved 2052: 2008: 2004: 1998: 1981: 1977: 1971: 1929: 1910: 1896:DVD Glossary 1890: 1791: 1778:file sharing 1775: 1760: 1759:In the case 1758: 1718: 1703: 1688: 1682:October 2009 1679: 1669: 1662: 1655: 1648: 1636: 1624:Please help 1619:verification 1616: 1588: 1579: 1570: 1561: 1560:In Crytek's 1552: 1546: 1545:to Crytek's 1533: 1524: 1515: 1506: 1499: 1490: 1484: 1462: 1456: 1442:Atari Jaguar 1431: 1422: 1395: 1392:Commodore 64 1388:Ubik's Musik 1387: 1342: 1321: 1315: 1309:Office Space 1307: 1293: 1284: 1277: 1263: 1246: 1237: 1230: 1229: 1224: 1219: 1218: 1214: 1213: 1208: 1207: 1192: 1182: 1175:ArmA II 1173: 1160: 1144: 1135: 1117: 1108: 1097: 1091:machine code 1084: 1069: 1060: 1037: 1007: 998: 985:spinning off 978: 922: 920: 904: 900: 890:The Playroom 865: 859: 853: 847:Star Control 845: 835: 828: 812: 806: 800: 796: 779: 773: 767: 761: 755: 749: 739: 733: 727: 721: 712: 706: 700: 694: 687: 682:floppy disks 675: 646: 642:Commodore 64 631: 620: 614: 607:Gilman Louie 604: 600:Turbo Pascal 583:Don Estridge 571: 543: 537: 533: 504: 492: 483: 471: 467: 444: 436: 427: 418: 410: 406: 401: 392: 387: 385: 374: 371: 367: 363: 360: 349: 334: 322: 313:copy control 312: 308: 304: 302: 289: 285:adding to it 280: 258: 223: 214: 210: 206: 202: 201: 186: 168: 159: 140: 106: 97: 74: 50: 43: 37: 36:Please help 33: 3650:Misuse case 3484:Infostealer 3459:Email fraud 3424:Data breach 3259:Cybergeddon 3022:MP3Newswire 2939:30 November 2362:Retro Gamer 2296:10 November 2143:October 23, 2011:(1): 73–94. 1810:gun control 1749:GNU Project 1598:Anti-piracy 1585:unbeatable. 1486:VGA Planets 1458:Garry's Mod 1411:featured a 1341:version of 1339:Nintendo DS 1317:Red Alert 2 1286:Mass Effect 1254:web browser 1129:Jolly Roger 1102:soccer ball 1087:video games 1063:August 2020 1001:August 2020 870:came with " 861:Beyond Zork 821:version of 819:ZX Spectrum 763:Dragon Wars 662:MAC address 622:WordPerfect 524:Early ages 447:analog hole 264:Terminology 154:introducing 3781:Categories 3715:Encryption 3591:Web shells 3531:Ransomware 3479:Hacktivism 3242:Cybercrime 2819:8 December 2753:6 December 2723:6 December 2697:6 December 2672:2011-11-10 2646:6 December 2620:6 December 2593:25 January 2515:2020-09-25 2455:January 7, 2440:GamesRadar 2418:30 January 2323:6 December 2269:16 October 2239:2016-12-22 2214:2016-12-22 2189:2016-12-22 2090:2021-05-22 2059:20 October 1883:References 1652:newspapers 1402:easter egg 1265:EarthBound 1047:improve it 989:relocating 909:, such as 842:code wheel 772:games and 696:Ski or Die 609:, head of 459:text-based 453:output or 352:videotapes 246:video game 226:videotapes 137:references 84:improve it 39:improve it 3546:Shellcode 3541:Scareware 3389:Crimeware 3349:Backdoors 3084:The Hindu 2775:Gamasutra 2477:Eurogamer 2445:Future US 2259:InfoWorld 2229:"ST USER" 1827:Core dump 1424:Nevermind 1409:Bomberman 1374:Terminate 1270:checksums 1165:. Dubbed 1119:Alan Wake 1051:verifying 917:Videotape 897:the game. 867:Zork Zero 757:Wasteland 751:Manhunter 702:4D Boxing 658:hard disk 638:Laser 128 542:wrote in 455:headphone 415:Microsoft 386:The term 381:legal use 252:and some 250:audio CDs 219:copyright 88:verifying 45:talk page 3720:Firewall 3625:Defenses 3551:Spamming 3536:Rootkits 3509:Phishing 3469:Exploits 3088:Archived 3057:Archived 2995:Archived 2991:Techdirt 2964:Archived 2933:Archived 2907:Archived 2873:Archived 2846:30 April 2840:Archived 2813:Archived 2786:28 March 2747:Archived 2717:Archived 2691:Archived 2666:Archived 2640:Archived 2587:Archived 2509:Archived 2486:Archived 2449:Archived 2412:Archived 2392:4 August 2386:Archived 2381:PC Gamer 2290:Compute! 2263:Archived 2233:Archived 2208:Archived 2183:Archived 2116:19 March 2084:Archived 2029:Archived 1978:Computer 1961:Archived 1937:Archived 1918:Archived 1899:Archived 1816:See also 1763:, Judge 1747:and the 1733:Interpol 1563:Crysis 3 1471:Internet 1413:multitap 1349:vuvuzela 1151:pig iron 1125:eyepatch 954:Showtime 627:Atari ST 625:for the 605:In 1989 596:Sidekick 507:crackers 339:and the 162:May 2009 3561:Spyware 3504:Payload 3499:Malware 3439:Viruses 3419:Botnets 3326:Threats 3094:26 July 2879:27 July 1666:scholar 1541:In the 1449:Lenslok 1299:either. 1045:Please 879:Lenslok 872:feelies 592:Borland 558:TRS-DOS 489:Methods 451:speaker 244:discs, 238:HD-DVDs 150:improve 82:Please 3755:(SIEM) 3732:(HIDS) 3616:Zombie 3353:Bombs 3334:Adware 3063:28 May 3032:28 May 3001:28 May 2970:28 May 2913:1 June 2546:; and 2505:Forbes 1800:. The 1716:laws. 1668:  1661:  1654:  1647:  1639:  1548:Crysis 1500:Postal 1492:Stars! 1481:legal. 1417:dongle 1370:disks. 1367:CDRWIN 1360:dongle 1358:use a 902:time. 837:sequel 808:Uplink 741:Ultima 634:clones 562:MS-DOS 318:dongle 139:, but 3797:Warez 3601:Worms 3596:Wiper 3514:Voice 3362:Logic 3115:WIRED 2179:Antic 1673:JSTOR 1659:books 1467:Steam 1382:sysop 1378:IEMSI 905:Some 892:from 789:ASCII 616:Antic 568:1980s 554:Apple 518:BBSes 515:warez 511:alias 463:OCRed 337:music 3367:Time 3357:Fork 3096:2013 3065:2013 3034:2013 3003:2013 2972:2013 2941:2013 2915:2010 2881:2014 2848:2013 2821:2011 2788:2008 2755:2010 2725:2010 2699:2010 2648:2010 2622:2010 2595:2015 2457:2021 2420:2019 2394:2020 2325:2010 2298:2013 2271:2020 2145:2013 2137:Byte 2118:2016 2110:BYTE 2061:2013 2053:BYTE 1792:The 1782:DMCA 1754:sale 1731:and 1725:MPAA 1723:and 1721:RIAA 1645:news 1592:FADE 1447:The 1440:The 1320:and 1274:SNES 1199:FADE 1190:The 1167:FADE 931:and 929:Beta 877:The 864:and 855:Zork 705:and 680:and 550:CP/M 545:BYTE 356:VCDs 345:PIPA 311:and 254:VCDs 230:DVDs 213:and 3372:Zip 1986:doi 1737:DRM 1729:FBI 1628:by 1578:In 1569:In 1523:If 1505:In 1430:In 1328:bug 1258:web 1107:In 1049:by 987:or 952:of 946:HBO 944:of 933:VHS 660:or 654:ROM 652:in 590:of 581:'s 579:IBM 377:DRM 287:. 86:by 3783:: 3113:. 3082:. 3055:. 3051:. 3020:. 2993:. 2989:. 2962:. 2958:. 2931:. 2901:. 2897:. 2871:. 2865:. 2838:. 2811:. 2805:. 2772:. 2741:. 2581:. 2540:; 2534:; 2507:. 2503:. 2484:. 2480:. 2474:. 2447:. 2443:. 2437:. 2410:. 2384:. 2378:. 2333:^ 2288:. 2261:. 2257:. 2231:. 2206:. 2177:. 2135:. 2108:. 2082:. 2078:. 2051:. 2039:^ 2017:^ 2009:61 2007:. 1982:34 1980:. 1948:^ 1756:. 1708:, 1551:, 1347:, 805:, 784:). 760:, 726:, 699:, 481:. 423:PC 358:. 347:. 240:, 236:, 232:, 228:, 209:, 48:. 3210:e 3203:t 3196:v 3132:. 3117:. 3098:. 3067:. 3036:. 3005:. 2974:. 2943:. 2917:. 2883:. 2850:. 2823:. 2790:. 2757:. 2727:. 2701:. 2675:. 2650:. 2624:. 2597:. 2567:. 2552:. 2518:. 2459:. 2422:. 2396:. 2327:. 2300:. 2273:. 2242:. 2217:. 2192:. 2147:. 2120:. 2093:. 2063:. 1992:. 1988:: 1695:) 1689:( 1684:) 1680:( 1670:· 1663:· 1656:· 1649:· 1622:. 1473:. 1334:. 1312:. 1131:. 1076:) 1070:( 1065:) 1061:( 1043:. 1014:) 1008:( 1003:) 999:( 995:. 981:. 927:( 850:. 693:( 473:" 294:) 290:( 193:) 187:( 175:) 169:( 164:) 160:( 146:. 113:) 107:( 102:) 98:( 80:. 55:) 51:(

Index

improve it
talk page
Learn how and when to remove these messages
original research
improve it
verifying
inline citations
Learn how and when to remove this message
references
inline citations
improve
introducing
Learn how and when to remove this message
Learn how and when to remove this message
copyright
videotapes
DVDs
Blu-ray discs
HD-DVDs
computer software
video game
audio CDs
VCDs

adding to it
dongle
digital restrictions management
music
video game industry
PIPA

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.