TIP: Click on subject to list as thread! ANSI
echo: nopiracy
to: KIRK BAILEY
from: R.J. WOODS
date: 1996-05-16 12:29:00
subject: 3,5 Fd Protection

Like me first say you have GOOD points...However I don't like some of 
them......Read on...
 
 
KB> I only know a partial solution to copy protection.
KB> ANT data structure can be duplicated, BUT you can encrypt it to prev
KB> changes or reverse engineering it. Dongles are hardware devices whic
KB> are difficult to duplicate, which allow you to limit the number of
KB> copies you can use to 1- but good pirates copy the data in it and cr
KB> shells to intercept the data requests and supply the data required; 
KB> is usually possible to examine the mem field of a computer to see th
KB> decrypted program (it cannot run until decrypted) and capture that t
KB> file for later hacking. Much of this is a logical consequence of wha
KB> computer is and how they work. To truely prevent unauthorized
KB> duplication requires a medium of storage not easily duplicated by
KB> uesers, using write devices not commonly supported by existing hardw
KB> in the field. CD-ROM *WAS* suck a technique, and publishers jumped o
KB> this piracy resistant technology. Now that Write capable CD drives a
KB> coming down in price and becoming common, the old issues are coming 
KB> again.
 
With the 1gig+ HD's coming down in the price it becomes easier and 
easier for pirates to pirate a program. I have found one program that 
is really quite a good protection. (I don't do that stuff though) The 
program's name is Lemmings. Yes it is a game. However if you own a copy 
you can make backup copies legally.
 
 
KB> The best solution is to FEATURE the problem-shareware, low registrat
KB> fees, and PERSONAL ETHICS. If you really like it, encourage the
KB> pubisher with shipments of $$$. The alternative will be the licensin
KB> PROMS & EPROMS, shipping data as mask programmed rom cartridges, and
KB> making illegal of floppy and floppy drive sales except for replaceme
KB> on old systems.
 
You can NOT do that. It would be quite unfair. You would be selling 
"Damaged Goods". If they take away your way to distribute your data 
then HOW would we do so?
 
KB> To establish a social order, there need to be some limited rules.
KB> Pirates step outside these rules. So do Brigands, theives, and slave
KB> takers. Eack wants someone else to live and work for their benifit f
KB> no reward. Each makes some simple or convoluted claim to moral right
KB> the other person's labor. Each is a parasite.
KB>  
KB> DDT was invented to kill parasites.
 
I love doing this....Why do you call them parasites? Some pirates 
actually go out and buy the program for the upgrades, Manual, and tech 
support. (And sometimes just to support good software) So by calling 
all of them parasites then you are prejudios.......I thank you for your time...I hope to recive a good 
resonse....R.J. Woods
--- GEcho 1.10+
---------------
* Origin: PC-Quest Rochester, IN 219-223-7395 (1:227/139)

SOURCE: echomail via exec-pc

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.