1 / 6

Software Piracy

Software Piracy. By: Jakub Lapinski. History. Has been around since the 70s when the first personal computers came out on the market Early forms of software piracy consisted of groups and clubs where computer geeks exchanged the lasted software with one another.

Download Presentation

Software Piracy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Software Piracy By: Jakub Lapinski

  2. History • Has been around since the 70s when the first personal computers came out on the market • Early forms of software piracy consisted of groups and clubs where computer geeks exchanged the lasted software with one another. • Soon after this Bulletin Board Systems (BBS) . This allowed people to communicate with one another using phone modems. BBS made it a lot easy for people to share information and different software. • When internet became mainstream in 1992 so did software piracy. Internet provided a very easy way to transfer information to other people at speeds that were impossible before.

  3. Types of Software Piracy • CD-R Piracy: The illegal act of copying software using CD-R recording technology. • Hard-disk Loading: Occurs when an individual or company sells computers with preloaded with pirated software. • Internet Piracy: Uploading of commercial software to the internet for anyone to copy of download. • Soft Lifting: When a person purchases a single software program and installs it onto several different computers.

  4. Most Common Ways to Pirate • BitTorrent:BitTorrent is a peer-assisted, digital content delivery platform that provides the fastest, most efficient means of distributing, discovering, and consuming large, high-quality files on the Web. • P2P: Includes programs such as Naspster, Kazaa, Bear Share, and Limewire. P2P uses the bandwidth of the users on the actually network. The network is used to share content files containing audio, video, data or anything in digital format. • mIRC: is a shareware Internet Relay Chat client for Windows. Although it serves admirably as a simple chat utility, its integrated scripted language makes it extremely extensible and versatile.

  5. Ethical Aspect • Justification: The most commonly used excuse for using pirated software is that everyone else is doing it. For many people going along with the crowd is all the justification they need. • Morality: Why people use pirated software is really just a matter of personal opinion regarding stealing. Most people don’t see it any differently then taking an extra hour for their lunch break or making phone calls during company time. • Responsibility: Most people put the responsibility of software piracy on the actual software companies. Pirates are in it for the thrill of trying to crack the latest program before another group does. So they compare it to leaving your keys in the ignition of your which caused it to get stolen. People would say that it is your own fault for being irresponsible. So if a software company doesn’t do a good enough job a protecting their software it’s their own fault it was pirated in the first place.

  6. Melanie Griffith said in the movie A Stranger Among Us, “Within every honest man is a thief struggling to get out.”

More Related