Synopses & Reviews
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out.
* This book is about software piracy--what it is and how it's done
* This is the first book ever to describe how software is actually stolen and traded over the internet
* Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software
Synopsis
For every $2 worth of software purchased legally, $1 worth of software is pirated illegally. For the first time ever, the dark underground of how software is stolen and traded over the internet is revealed. The technical detail provided will open the eyes of software users and manufacturers worldwide! This book is a tell-it-like-it-is expos of how tens of billions of dollars worth of software is stolen every year.
Did you know that most of the software on your computer, and nearly every program you've heard of, can be obtained without charge? In less time than it would take you to drive down to your friendly neighborhood computer store and purchase a software program, you can download the exact same program from the internet for free! Obtaining something intended to be sold without paying is controversial to say the least. But whether you call if free for the asking, software piracy, or just out-and-out stealing; downloading, copying, and sharing software is being done by thousands of people everyday. This book explains the epidemic problem of software piracy in great detail for both software users and manufacturers.
Table of Contents
INTRODUCTION; WHY SOFTWARE IS PIRATED; TYPES OF SOFTWARE; TYPES OF CRACKS; HAZARDS, PRECAUTIONS, & SOLUTIONS; PIRATED SOFTWARE SOURCES; CRACKING ILLUSTRATED; USEFUL TOOLS; THE SOFTWARE COMPANIES FIGHT BACK; SUMMARY & CONCLUSION