The article delineates the main differences between a licensed product and a counterfeit copy, also analyzes the ways and methods of protecting the product. Additionally, it presents a list of tools with brief descriptions used by crackers (hackers) to crack programs and some of the basic methods of hacking a product. The research hinges on the statistics on the use of pirated products among the CIS countries provided by BSA (Business Software Alliance), set up in 1988, which represents the interests of the world's largest software developers and fights against copyright infringement on the software created by its members. As a result, the study presents some comments on the nature of the analyzed software protection products and suggests r...
The article proves that the separation of technologies for committing fraud on the Internet allows y...
This paper has been written in order to provide a complete insight into computer criminal presenting...
This paper is an attempt to substantiate the fact that socio economic issue has to be put into consi...
Numerous types of software piracy known today, have several prevention techniques which has been est...
The main objective of this work is to critically evaluate a sufficient portion of the circuit proble...
This article presents an overview of software products designed to protect software against unauthor...
The computer program has recently become a common part of everyday life of the modern society wherea...
Software Piracy Abstract This master thesis deals with software piracy, and other phenomena that com...
Information security is one of the most important sphere in Cybernetics. And for Russia this problem...
This document gives information about Hacking. Some Types of hacking, some tools of hacking and some...
When critical assets or functionalities are included in a piece of software accessible to the end us...
Zloćudni kod koristi vrlo složene metode zaštite od reverznog inženjerstva čija zadaća je što više o...
Counterfeiting is a challenge to companies, cus-tomers and markets all over the world. Besides the e...
(English): This bachelor thesis is oriented on description of hacking in modern information society ...
The article is of interest to managers and scientists at all levels who deal with combating cyber th...
The article proves that the separation of technologies for committing fraud on the Internet allows y...
This paper has been written in order to provide a complete insight into computer criminal presenting...
This paper is an attempt to substantiate the fact that socio economic issue has to be put into consi...
Numerous types of software piracy known today, have several prevention techniques which has been est...
The main objective of this work is to critically evaluate a sufficient portion of the circuit proble...
This article presents an overview of software products designed to protect software against unauthor...
The computer program has recently become a common part of everyday life of the modern society wherea...
Software Piracy Abstract This master thesis deals with software piracy, and other phenomena that com...
Information security is one of the most important sphere in Cybernetics. And for Russia this problem...
This document gives information about Hacking. Some Types of hacking, some tools of hacking and some...
When critical assets or functionalities are included in a piece of software accessible to the end us...
Zloćudni kod koristi vrlo složene metode zaštite od reverznog inženjerstva čija zadaća je što više o...
Counterfeiting is a challenge to companies, cus-tomers and markets all over the world. Besides the e...
(English): This bachelor thesis is oriented on description of hacking in modern information society ...
The article is of interest to managers and scientists at all levels who deal with combating cyber th...
The article proves that the separation of technologies for committing fraud on the Internet allows y...
This paper has been written in order to provide a complete insight into computer criminal presenting...
This paper is an attempt to substantiate the fact that socio economic issue has to be put into consi...