Académique Documents
Professionnel Documents
Culture Documents
Counterfeit software
A type of software piracy that occurs when fake copies of software are produced
in such a way that they appear to be authentic.
Example: Counterfeit software would include the illegal copying and distribution
of computer software on CD or DVD .
Counterfeit software is commonly produced using a CD burner to copy the
software and photocopies are made of the manual. Counterfeit software is
usually sold at prices well below that of the retail price of the legitimate software.
OEM unbundling
OEM (Original Equipment Manufacturer) - is software that is only legally
sold with specified hardware
"unbundling" -refers to the act of selling software separately
is a type of software piracy that occurs when OEM software is separated from
the hardware it originally came bundled with when purchased.
Bundled- The Software and the hardware are sold together
Example: Software programs that are marked "not for resale" are often bundled
applications.
Computer hardware- which is the physical component of computers.
Computer hardware and software require each other and neither can be
realistically used without the other.
Example: monitor, mouse, keyboard, computer data storage, hard drive disk
(HDD)
the act of piracy occurs when these programs are copied and sold separately
from the hardware, this is a violation of the distribution contract between the
vendor and the software publisher.
Softlifting
Softlifting occurs when a person (or organization) purchases a single licensed
copy of a software program and installs it onto several computers, in violation of
the terms of the license agreement.
Example: sharing software with friends and co-workers and installing software on
home/laptop computers if not allowed to do so by the license.
In the corporate environment, softlifting is the most prevalent type of software
piracy - and perhaps, the easiest to catch.
Warez
Commercial programs that are made available to the public illegally.
Example: Computer software that has been pirated and distributed to the public.
The word warez is a plural form of ware, short for computer software.
Hard-Disk Loading
Hard-disk loading occurs when an individual or company sells computers
preloaded or installed with illegal copies of software.
Often this is done by the vendor as a means of encouraging the consumer to buy
certain hardware.
Cybercrime
also called computer crime, the use of a computer as an instrument to further
illegal ends, such as committing fraud, trafficking in child pornography and
intellectual property, stealing identities, or violating privacy.
The Cybercrime Prevention Act of 2012, officially recorded as Republic Act
No. 10175, is a law in the Philippines approved on September 12, 2012. It aims
to address legal issues concerning online interactions and the Internet in the
Philippines. Among the cybercrime offenses included in the bill are cyber
squatting, cybersex, child pornography, identity theft, illegal access to data and
libel
HACKING
Computer hacking, including the following types of activity:
1.Hacker (programmer subculture), activity within the computer
programmer subculture
subculture -is a group of people within a culture that differentiates themselves from
the larger culture to which they belong.
otherwise
3.Computer crime/Cyber crime
Make sure all computers you use in your home or business have the latest firewalls and
anti-virus software installed.
Keep up-to-date with the latest patches, especially for your browser.
Use a good-quality anti-spyware solution, and scan your computers regularly for any
pests.
Be careful about the types of websites you visit, what you click on, and what you
download. And make sure that everyone who uses your computer understands the
security risks and rules.
Scrutinize suspicious emails that may actually be phishing scams.
1. In the programmer subculture context a hacker is one who enjoys the intellectual
challenge of creatively overcoming and circumventing limitations of programming
systems and who tries to extend their capabilities The act of engaging in activities (such
as programming or other media) in a spirit of playfulness and exploration is termed
hacking. However the defining characteristic of a hacker is not the activities performed
themselves (e.g. programming), but the manner in which it is done: Hacking entails
some form of excellence, for example exploring the limits of what is possible, thereby
doing something exciting and meaningful.
2. In the computer security context, a hacker is someone who seeks and exploits
weaknesses in a computer system or computer network. Hackers may be motivated by
a multitude of reasons, such as profit, protest, challenge or enjoyment.
3.As discussed earlier
INTERNET FRAUD
The use of Internet services or software with Internet access to defraud victims or
to otherwise take advantage of them,
fraud-a wrongful or criminal deception intended to result in financial or
personal gain or a person or thing intended to deceive others
Example: by stealing personal information, which can even lead to identity theft.
Internet fraud can occur in chat rooms, email or on websites.
IDENTITY THEFT