HOME
*





Extended Copy Protection
Extended Copy Protection (XCP) is a software package developed by the British company First 4 Internet (which on 20 November 2006, changed its name to Fortium Technologies Ltd) and sold as a copy protection or digital rights management (DRM) scheme for Compact Discs. It was used on some CDs distributed by Sony BMG and sparked the 2005 Sony BMG CD copy protection scandal; in that context it is also known as the Sony rootkit. Security researchers, beginning with Mark Russinovich in October 2005, have described the program as functionally identical to a rootkit: a computer program used by computer intruders to conceal unauthorised activities on a computer system. Russinovich broke the story on his Sysinternals blog, where it gained attention from the media and other researchers. This ultimately led to a civil lawsuit and criminal investigations, which forced Sony to discontinue use of the system. While Sony eventually recalled the CDs that contained the XCP system, the web-based unin ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Linux
Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which includes the kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name "GNU/Linux" to emphasize the importance of GNU software, causing some controversy. Popular Linux distributions include Debian, Fedora Linux, and Ubuntu, the latter of which itself consists of many different distributions and modifications, including Lubuntu and Xubuntu. Commercial distributions include Red Hat Enterprise Linux and SUSE Linux Enterprise. Desktop Linux distributions include a windowing system such as X11 or Wayland, and a desktop environment such as GNOME or KDE Plasma. Distributions inten ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Computer Associates
CA Technologies, formerly known as CA, Inc. and Computer Associates International, Inc., is an American multinational corporation headquartered in New York City. It is primarily known for its business-to-business (B2B) software with a product portfolio focused on Agile software development, DevOps, and computer security software spanning across a wide range of environments such as a mainframe, distributed computing, cloud computing, and mobile devices. The company markets nearly 200 software products. Some of the best-known are ACF2 (security), TopSecret (security), Datacom (database), Easytrieve (report generator), IDMS (database), InterTest (debugging), Librarian, Panvalet (source code library management), and TLMS (tape library management). Through 2018, CA Technologies maintained offices in more than 40 countries and employed approximately 11,300 people. CA holds more than 1,500 patents worldwide, and has more than 900 patent applications pending. It was headquartered on L ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Slate (magazine)
''Slate'' is an online magazine that covers current affairs, politics, and culture in the United States. It was created in 1996 by former '' New Republic'' editor Michael Kinsley, initially under the ownership of Microsoft as part of MSN. In 2004, it was purchased by The Washington Post Company (later renamed the Graham Holdings Company), and since 2008 has been managed by The Slate Group, an online publishing entity created by Graham Holdings. ''Slate'' is based in New York City, with an additional office in Washington, D.C. ''Slate'', which is updated throughout the day, covers politics, arts and culture, sports, and news. According to its former editor-in-chief Julia Turner, the magazine is "not fundamentally a breaking news source", but rather aimed at helping readers to "analyze and understand and interpret the world" with witty and entertaining writing. As of mid-2015, it publishes about 1,500 stories per month. A French version, ''slate.fr'', was launched in February ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Digital Millennium Copyright Act
The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or services intended to circumvent measures that control access to copyrighted works (commonly known as digital rights management or DRM). It also criminalizes the act of circumventing an access control, whether or not there is actual infringement of copyright itself. In addition, the DMCA heightens the penalties for copyright infringement on the Internet. Passed on October 12, 1998, by a unanimous vote in the United States Senate and signed into law by President Bill Clinton on October 28, 1998, the DMCA amended Title 17 of the United States Code to extend the reach of copyright, while limiting the liability of the providers of online services for copyright infringement by their users. The DMCA's principal innovation in the field of copy ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Anti-circumvention
Anti-circumvention refers to laws which prohibit the circumvention of technological barriers for using a digital good in certain ways which the rightsholders do not wish to allow. The requirement for anti-circumvention laws was globalized in 1996 with the creation of the World Intellectual Property Organization's Copyright Treaty. Background Article 11 of WIPO Copyright Treaty "Obligations concerning Technological Measures" requires contracting parties to "...provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors in connection with the exercise of their rights under this Treaty or the Berne Convention and that restrict acts, in respect of their works, which are not authorized by the authors concerned or permitted by law." Article 12 of WIPO Copyright Treaty "Obligations concerning Rights Management Information" requires contracting parties to "...provide adequate and effective lega ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Chilling Effect (law)
In a legal context, a chilling effect is the inhibition or discouragement of the legitimate exercise of natural and legal rights by the threat of legal sanction. A chilling effect may be caused by legal actions such as the passing of a law, the decision of a court, or the threat of a lawsuit; any legal action that would cause people to hesitate to exercise a legitimate right (freedom of speech or otherwise) for fear of legal repercussions. When that fear is brought about by the threat of a libel lawsuit, it is called libel chill. A lawsuit initiated specifically for the purpose of creating a chilling effect may be called a Strategic Lawsuit Against Public Participation (SLAPP). "Chilling" in this context normally implies an undesirable slowing. Outside the legal context in common usage; any coercion or threat of coercion (or other unpleasantries) can have a chilling effect on a group of people regarding a specific behavior, and often can be statistically measured or be plain ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


File System Permissions
Most file systems include attributes of files and directories that control the ability of users to read, change, navigate, and execute the contents of the file system. In some cases, menu options or functions may be made visible or hidden depending on a user's permission level; this kind of user interface is referred to as permission-driven. Two types of permissions are widely available: traditional Unix file system permissions and access-control lists (ACLs) which are capable of more specific control. File system variations The original File Allocation Table file system has a per-file all-user read-only attribute. NTFS implemented in Microsoft Windows NT and its derivatives, use ACLs to provide a complex set of permissions. OpenVMS uses a permission scheme similar to that of Unix. There are four categories (system, owner, group, and world) and four types of access permissions (Read, Write, Execute and Delete). The categories are not mutually disjoint: World includes Group ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Kernel (computer Science)
The kernel is a computer program at the core of a computer's operating system and generally has complete control over everything in the system. It is the portion of the operating system code that is always resident in memory and facilitates interactions between hardware and software components. A full kernel controls all hardware resources (e.g. I/O, memory, cryptography) via device drivers, arbitrates conflicts between processes concerning such resources, and optimizes the utilization of common resources e.g. CPU & cache usage, file systems, and network sockets. On most systems, the kernel is one of the first programs loaded on startup (after the bootloader). It handles the rest of startup as well as memory, peripherals, and input/output (I/O) requests from software, translating them into data-processing instructions for the central processing unit. The critical code of the kernel is usually loaded into a separate area of memory, which is protected from access by applicatio ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




SunnComm
MediaMax CD-3 is a software package created by SunnComm which was sold as a form of copy protection for compact discs. It was used by the record label RCA Records/ BMG, and targets both Microsoft Windows and Mac OS X. Elected officials and computer security experts regard the software as a form of malware since its purpose is to intercept and inhibit normal computer operation without the user's authorization. MediaMax received media attention in late 2005 in fallout from the Sony XCP copy protection scandal. MediaMax is a second-generation system meant to address the problems of earlier copy-preventing schemes, where many types of playback devices had difficulty reading discs in normal use. MediaMax was first used on Anthony Hamilton's '' Comin' From Where I'm From'' in the United States; the first US No. 1 CD to use it was Velvet Revolver's '' Contraband''. (The European release of the Velvet Revolver album used Macrovision CDS-200 and the Japanese is without copy protect ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


MediaMax CD-3
MediaMax CD-3 is a software package created by SunnComm which was sold as a form of copy protection for compact discs. It was used by the record label RCA Records/ BMG, and targets both Microsoft Windows and Mac OS X. Elected officials and computer security experts regard the software as a form of malware since its purpose is to intercept and inhibit normal computer operation without the user's authorization. MediaMax received media attention in late 2005 in fallout from the Sony XCP copy protection scandal. MediaMax is a second-generation system meant to address the problems of earlier copy-preventing schemes, where many types of playback devices had difficulty reading discs in normal use. MediaMax was first used on Anthony Hamilton's '' Comin' From Where I'm From'' in the United States; the first US No. 1 CD to use it was Velvet Revolver's '' Contraband''. (The European release of the Velvet Revolver album used Macrovision CDS-200 and the Japanese is without copy protec ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Ripping
Ripping is extracting all or parts of digital content from a container. Originally, it meant to rip music out of Commodore 64 games. Later, the term was used to extract WAV or MP3 format files from digital audio CDs, but got applied as well to extract the contents of any media, including DVD and Blu-ray discs, and video game sprites. Despite the name, neither the media nor the data is damaged after extraction. Ripping is often used to shift formats, and to edit, duplicate or back up media content. A rip is the extracted content, in its destination format, along with accompanying files, such as a cue sheet or log file from the ripping software. To rip the contents out of a container is different from simply copying the whole container or a file. When creating a copy, nothing looks into the transferred file, nor checks if there is any encryption or not, and raw copy is also not aware of any file format. One can copy a DVD byte by byte via programs like the Linux dd command on ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]