Vous êtes sur la page 1sur 7

Software piracy

The unauthorized copying of software


Software - also known as computer programs, is the non-tangible component
of computers.
Examples: Microsoft office such as Microsoft word, Windows Operating system ,
Anti- virus applications, Games installed in your computers and many more.
By buying the software, you become a licensed user rather than an owner. You
are allowed to make copies of the program for backup purposes, but it is against
the law to give copies to friends and colleagues.
Some common types of software piracy include:
1. counterfeit software
2. OEM unbundling
3. softlifting
4. hard disk loading
5. corporate software piracy
6. Internet software piracy.

EULA- End-User License Agreement


the type of license used for most software.
a legal contract between the manufacturer and/or the author and the end user of
an application.
End User- is a person who uses a product
details how the software can and cannot be used and any restrictions that the
manufacturer imposes

Counterfeit software
A type of software piracy that occurs when fake copies of software are produced
in such a way that they appear to be authentic.
Example: Counterfeit software would include the illegal copying and distribution
of computer software on CD or DVD .
Counterfeit software is commonly produced using a CD burner to copy the
software and photocopies are made of the manual. Counterfeit software is
usually sold at prices well below that of the retail price of the legitimate software.

OEM unbundling
OEM (Original Equipment Manufacturer) - is software that is only legally
sold with specified hardware
"unbundling" -refers to the act of selling software separately
is a type of software piracy that occurs when OEM software is separated from
the hardware it originally came bundled with when purchased.
Bundled- The Software and the hardware are sold together
Example: Software programs that are marked "not for resale" are often bundled
applications.
Computer hardware- which is the physical component of computers.
Computer hardware and software require each other and neither can be
realistically used without the other.
Example: monitor, mouse, keyboard, computer data storage, hard drive disk
(HDD)
the act of piracy occurs when these programs are copied and sold separately
from the hardware, this is a violation of the distribution contract between the
vendor and the software publisher.

Softlifting
Softlifting occurs when a person (or organization) purchases a single licensed
copy of a software program and installs it onto several computers, in violation of
the terms of the license agreement.
Example: sharing software with friends and co-workers and installing software on
home/laptop computers if not allowed to do so by the license.
In the corporate environment, softlifting is the most prevalent type of software
piracy - and perhaps, the easiest to catch.

Open source software


is software whose source code is available for modification or enhancement by
anyone.
"Source code"- is the part of software that most computer users don't ever see;
it's the code computer programmers can manipulate to change how a piece of
software a "program" or "application" works.
Programmers who have access to a computer program's source code can
improve that program by adding features to it or fixing parts that don't always
work correctly.

Warez
Commercial programs that are made available to the public illegally.
Example: Computer software that has been pirated and distributed to the public.
The word warez is a plural form of ware, short for computer software.

Hard-Disk Loading
Hard-disk loading occurs when an individual or company sells computers
preloaded or installed with illegal copies of software.
Often this is done by the vendor as a means of encouraging the consumer to buy
certain hardware.

Corporate software piracy


May also be called corporate end-user piracy.
A type of software piracy that occurs when corporations underreport the number
of software installations acquired through volume purchase agreements.
Corporate software policy may also be an offence when software is installed on a
server with unrestricted staff access.

Internet software piracy


A type of software piracy that occurs when software, which is illegally obtained
through the Internet or downloaded from pirate Web sites that make software
available for download for free or in exchange for users who uploaded software.
Internet software piracy also includes the sale of counterfeit software on Internet
auction and classified ads Web sites.

Cybercrime
also called computer crime, the use of a computer as an instrument to further
illegal ends, such as committing fraud, trafficking in child pornography and
intellectual property, stealing identities, or violating privacy.
The Cybercrime Prevention Act of 2012, officially recorded as Republic Act
No. 10175, is a law in the Philippines approved on September 12, 2012. It aims
to address legal issues concerning online interactions and the Internet in the
Philippines. Among the cybercrime offenses included in the bill are cyber
squatting, cybersex, child pornography, identity theft, illegal access to data and
libel

HACKING
Computer hacking, including the following types of activity:
1.Hacker (programmer subculture), activity within the computer

programmer subculture
subculture -is a group of people within a culture that differentiates themselves from
the larger culture to which they belong.

2.Hacker (computer security), to access computer networks, legally or

otherwise
3.Computer crime/Cyber crime

How Computer Hacking Happens


Hacking attacks can be launched in a number of ways:

Attacking computers that don't have firewalls installed.


Installing keystroke loggers or other malicious code by hiding it in email attachments.
Exploiting browser vulnerabilities that have not been properly patched.
Exploiting weak or poorly protected passwords.
Hiding malicious code in downloads or free software.
Hiding malicious code in images on websites and waiting for unsuspecting users to click
on them.
Employees or other trusted users simply accessing an unprotected computer.
Exploiting poorly installed networks, and especially wireless home networks.

So What Can You Do About Computer Hacking?

Make sure all computers you use in your home or business have the latest firewalls and
anti-virus software installed.
Keep up-to-date with the latest patches, especially for your browser.
Use a good-quality anti-spyware solution, and scan your computers regularly for any
pests.
Be careful about the types of websites you visit, what you click on, and what you
download. And make sure that everyone who uses your computer understands the
security risks and rules.
Scrutinize suspicious emails that may actually be phishing scams.

1. In the programmer subculture context a hacker is one who enjoys the intellectual
challenge of creatively overcoming and circumventing limitations of programming
systems and who tries to extend their capabilities The act of engaging in activities (such
as programming or other media) in a spirit of playfulness and exploration is termed

hacking. However the defining characteristic of a hacker is not the activities performed
themselves (e.g. programming), but the manner in which it is done: Hacking entails
some form of excellence, for example exploring the limits of what is possible, thereby
doing something exciting and meaningful.
2. In the computer security context, a hacker is someone who seeks and exploits
weaknesses in a computer system or computer network. Hackers may be motivated by
a multitude of reasons, such as profit, protest, challenge or enjoyment.
3.As discussed earlier

INTERNET FRAUD
The use of Internet services or software with Internet access to defraud victims or
to otherwise take advantage of them,
fraud-a wrongful or criminal deception intended to result in financial or
personal gain or a person or thing intended to deceive others
Example: by stealing personal information, which can even lead to identity theft.
Internet fraud can occur in chat rooms, email or on websites.

IDENTITY THEFT

is a form of stealing someone's identity in which someone pretends to be


someone else by assuming that person's identity, usually as a method to gain
access to resources or obtain credit and other benefits in that person's name.
Identity theft also occurs when someone uses another's personally identifying
information, like their name, identifying number, or credit card number, without
their permission, to commit fraud or other crimes.

The 6 Types of Identity Theft


#1 New Account Fraud
Using anothers personal identifying information to obtain products and services using
that persons good credit standing. This fraud often requires use of the victims Social
Security number. Opening new utility, cell phone and/or credit card accounts are the
most prevalent forms of new account fraud.
#2 Account Takeover Fraud
Using another persons account numbers, such as a credit card number, to obtain
products and services using that persons existing accounts or extracting funds from a
persons bank account.
#3 Criminal Identity Theft
Someone commits a crime under another persons name. The thief, in the act of the
crime or upon arrest, poses as the identity theft victim. Often the perpetrator will have a
fake ID with the victims information but the imposters picture.
#4 Medical Identity Theft
The deadliest form of identity theft. Medical identity theft occurs when someone uses a
persons name and/or insurance informationwithout the persons knowledge or
consentto obtain medical services or goods, or to make false claims for medical
goods or services. Medical identity theft frequently results in erroneous entries being put
into the victims medical records, which in turn may lead to inappropriate and potentially
life-threatening decisions by medical staff.
#5 Business or Commercial Identity Theft
Using a businesss name to obtain credit or even billing those businesses clients for
products and services. Perpetrators who commit business identity theft are often
insiders current or ex-employees with direct access to operational documentation
of the business
#6 Identity Cloning
Encompasses all forms of identity theft. The thief is actually living and functioning as the
victim on purpose. They may be hiding in plain sight due to the fact they are running
from the law, evading child support or they could be mentally ill.

Vous aimerez peut-être aussi