DRM.

Slides:



Advertisements
Similar presentations
Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens.
Advertisements

Introduction to ikhlas ikhlas is an affordable and effective Online Accounting Solution that is currently available in Brunei.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 37 How iPods, iTunes, and Podcasting Work.
Internet Piracy. History In the 1980’s mail was used to distribute pirated material Pirated material originally consisted of copyrighted games, software,
ITE PC v4.0 Chapter 1 1 Operating Systems Computer Networks– 2.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Chapter 3: Storage Devices & Media ALYSSA BAO 1. 2 Solid State controls movements of electrons within a microchip Optical uses precision lasers to access.
Physical Media Copy Protection By Wesley Wilson. Background Software Developers are shying away from PC game development due to piracy Software Developers.
STORAGE DEVICES AND MEDIA BY: T.MINH. Backing Up Data Refers to the copying of files and data to different medium in case of problem with the main storage.
Practical PC, 7th Edition Chapter 3: Getting Started with Software
The Impact of Physical Security on Network Security
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Intellectual Property Rights An Overview of Laws, Licenses and Copyright Protection A Presentation by Team 9 Perhaps the Greatest Team Ever to Exist…EVER!
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Programming and Application Packages
Matthew Rothmeyer. Digital Rights Management (DRM) “ A class of technologies that are used by hardware manufacturers, publishers, copyright holders, and.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
W EB R ESOURCES Michelle Stabile. PODCAST Video podcast is a term used for the online delivery of video on demand video clip content via Atom or RSS enclosures.
Read more: piracy/
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Attack Plan Alex. Introduction This presents a step-by-step attack plan to clean up an infected computer This presents a step-by-step attack plan to clean.
Digital Rights Management Maxim Fastovsky. What is DRM? DRM technologies attempt to control use of digital media by preventing access, copying or conversion.
history, hardware, software, safety, and computer ethics
MAGNA COMICS. Computer security. System security Problems to the system: Complete shut down. Slow response to actions. Possibility of loosing files Identity.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
INTERNET SAFETY FOR KIDS
All about viruses, hacking and backups By Harriet Thomas.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Software Installation and Copyrights Basic Computer Concepts Installation Basics  Installation Process  Copy files from distribution disks.
Digital Rights Management Maxim Fastovsky. What is DRM? DRM technologies attempt to control use of digital media by preventing access, copying or conversion.
Commercial software.. Introduction.  Computer software comes in three different flavors: freeware, shareware, and commercial software. Freeware is free.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
MAINTENANCE GAME DESIGN. OBJECTIVES Name and identify the 3 types of maintenance Understand how maintenance was done before the use of networks Understand.
IPEmotion License Management PM (V1.2).
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
PDF Recovery Tool Fix Portable Document File Format.
Burn ISO Image File to USB Drive From:
Chapter 6 Protecting Your Files
Out-of-the-Box Day 2017.
Computer Note.
Office 365 is cloud-based productivity, hosted by Microsoft.
Chapter 3 Installing and Learning Software
Storage devices and media
Done By: Ashlee Lizarraga Ricky Usher Jacinto Roches Eli Gomez
Chapter 14: Protection Modified by Dr. Neerja Mhaskar for CS 3SH3.
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Cloud Storage - an introduction
Maintaining software solutions
1(844) How to fix Smart test failed Error Code 303 in HP
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
By Jake Schmitt, Seth Raleigh, Neil McLain
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Networking for Home and Small Businesses – Chapter 2
Ian Ramsey C of E School GCSE ICT Smart working Software choices.
Backing Up Files File Maintenance Unit.
TABE PC.
Technology Mrs. Huddleston
Copyright, Designs and Patents Act 1988
Watchdog Anti malware is reliable application and a multi engine scanner, which can detect various malicious files, worms, malware and other online threats.
Bodygram Plus Enterprise
Networking for Home and Small Businesses – Chapter 2
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
What is Information Security?
Online software and backups
Presentation transcript:

DRM

History Began since the 70’s Originally started on Floppys Ruined Value of Software Software touted being not copy protected.

Off-Disk Protection Codewords Code Wheels Manual Reference Difficult to copy sheets. Dongles

Back to On Disk Advance of CDs Burners were expensive, as were CDs False TOCs False Files

To Off Disk Again CD Keys Couldn’t use updating or online software features Unique to the program. Gave with the software. Later had limited usage

Software Solutions Pt 1 Safedisc Securom Basic check for CD Easily broken Securom More Aggressive software May not work with virtual drives Took longer to crack.

Software Solutions Pt. 2 Starforce Most aggressive of Software solutions Claimed to cause damage to computers. Difficult to remove from computer Claimed to have rootkits Massive backlash by users.

Modern DRM Pt. 1 DEGRADE / Altering Alters the program during runtime Subtle and hidden Seems like a bug Eventually becomes unusable. Primarily in video games

Modern DRM Pt. 2 Limited Activation Disallows the keys from being authorized X times. Difficult to Revoke Can sometimes be overly aggressive. Changes in hardware can cause a new authorization

Modern DRM Pt. 3 Online Only Usage Requires internet connectivity to function Program authorizes at all times. Can cause lag in personal usage elements Loss of internet can cause loss of program usage.

Modern DRM Pt. 4 Online Distribution Requires the Internet to receive Program Usually requires the internet to start program Some have offline mode Distributer holds onto software license. Sometimes has secondary DRM

Pros and Cons Pro Con Protects Software Prevents Illegal Copying Overly Aggressive DRM can hurt consumer Can prevent actual usage of program.

Future of DRM Cloud Based DRM Subscription Fees. What if the server goes down? What is the user purchasing?