HOME
*





SafeDisc
''SafeDisc'' is a copy protection program for Microsoft Windows applications and games distributed on optical disc. Created by Macrovision Corporation, it was aimed to hinder unauthorized disc duplication. The program was first introduced in 1998 and was discontinued on March 31, 2009. Although the stated use is to prevent piracy, many, including the Electronic Frontier Foundation, believe it is used to restrict one's fair-use rights. History There have been several editions of SafeDisc over the years. Each one has the goals of making discs harder to copy. The current revision is marketed as SafeDisc Advanced. The early versions of SafeDisc did not make the discs very difficult to copy. Recent versions 2.9+ could produce discs that are difficult to copy or reverse engineer, requiring specific burners capable of emulating the "weak sectors" and odd data formats that are characteristic of SafeDisc. Withdrawal of support Shortly after the release of Windows 10 in 2015, Microsoft ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Daemon Tools
DAEMON Tools is a virtual drive and optical disc authoring program for Microsoft Windows and Mac OS. Overview DAEMON tools was originally a successor of ''Generic SafeDisc emulator'' and incorporated all of its features. The program claims to be able to defeat most copy protection schemes such as SafeDisc and SecuROM. It is currently compatible with Windows XP, Windows Vista, Windows 7, Windows 8, and Windows 10. DAEMON Tools has a special mode for proper operation of copies of discs with advanced protection (SafeDisc, SecuRom and LaserLock, CDCOPS, StarForce and Protect CD), which are used on some discs with games. Editions Six editions of the product exist: Ultra, Lite, Pro Standard, Pro Advanced, Net and DT for Mac. A feature comparison is given below. Also, company provides two additional solutions for the data storage organization: DAEMON Tools USB 2 that allows sharing different types of USB devices between remote workstations and DAEMON Tools iSCSI Target 2 – a cross ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Alcohol 120%
Alcohol 120% is a disk image emulator created by Alcohol Soft. It can create and mount disc images in the proprietary Media Descriptor File format. Images in this format consist of a pair of .mds and .mdf files. Alcohol 120% can also convert image files to the ISO format. Alcohol Soft has cited it will not be developing an image editor for Alcohol 120%. The latest versions of Alcohol 120% comes with "Alcohol Cloaking Initiative for DRM" (A.C.I.D), which hides emulated drives from SecuROM 7 and SafeDisc 4. Features Alcohol 120%'s image making tool supports the following formats: *Media Descriptor File (default), consisting of a pair of .mds and .mdf *ISO image (.iso) Furthermore, Alcohol 120% can mount the following images: *CloneCD image, consisting of a trio of .ccd, .img, and .sub files *Raw images, consisting of a pair of .bin and .cue files Alcohol 120%'s image recording feature is capable of bypassing certain copy protection schemes, such as SafeDisc, SecuROM, and Da ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


SecuROM
SecuROM was a CD/DVD copy protection and digital rights management (DRM) product developed by Sony DADC. It aims to prevent unauthorised copying and reverse engineering of software, primarily commercial computer games running on Microsoft Windows. The method of disc protection in later versions is data position measurement, which may be used in conjunction with online activation DRM. SecuROM gained prominence in the late 2000s but generated controversy because of its requirement for frequent online authentication and strict key activation limits. A 2008 class-action lawsuit was filed against Electronic Arts for its use of SecuROM in the video game ''Spore''. Opponents, including the Electronic Frontier Foundation, believe that fair-use rights are restricted by DRM applications such as SecuROM. Software SecuROM limits the number of PCs activated at the same time from the same key and is not uninstalled upon removal of the game. SecuROM 7.x was the first version to include t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Software Blacklist
Software blacklisting is a tool used by manufacturers of software and music on CD and DVD to prevent copying. Essentially the software on the disc will audit the user's computer for certain types of virtual CD and CD authoring software, or for debugging software used by warez groups to create patches (known as cracks) that bypass copy protection schemes. If blacklisted software is found then certain actions are taken by the software on the game or music disc. Examples would be allowing the copying of the game to take place, but crashing the copied game when attempting to start it; allowing copies of games that will malfunction in subtle ways and simply disallowing the game to be run while this software exists. This software blacklisting can be seen as a countermeasure to virtual CD/CD burning software used to bypass copy protection schemes such as SecuROM, SafeDisc and LaserLock. In order to copy the CD, the user may have to copy the disc on another computer (real or virtual), ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Digital Signature
A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very high confidence that the message was created by a known sender (authenticity), and that the message was not altered in transit (integrity). Digital signatures are a standard element of most cryptographic protocol suites, and are commonly used for software distribution, financial transactions, contract management software, and in other cases where it is important to detect forgery or tampering. Digital signatures are often used to implement electronic signatures, which includes any electronic data that carries the intent of a signature, but not all electronic signatures use digital signatures.

[...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

TAGES
Tages was claimed as a founding prophet of Etruscan religion who is known from reports by Latin authors of the late Roman Republic and Roman Empire. He revealed a cosmic view of divinity and correct methods of ascertaining divine will concerning events of public interest. Such divination was undertaken in Roman society by priestly officials called ''haruspices''. The religious texts recording the revelations of Tages (and a few other prophets, mainly a female figure known as Vegoia) were called by the Romans the ''Etrusca Disciplina'' at least as early as the late republic. They were written in the Etruscan language, despite their Latin titles. None presently survive. The last author claiming to have read elements of the ''disciplina'' is the sixth-century John the Lydian, writing at Constantinople. Thus, knowledge of Tages comes mainly from what is said about him by the classical authors, which is a legendary and quasimythical view; John the Lydian suggested Tages is only a p ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Extended Copy Protection
Extended Copy Protection (XCP) is a computer software, software package developed by the British company First 4 Internet (which on 20 November 2006, changed its name to Fortium Technologies Ltd) and sold as a copy protection or digital rights management (DRM) scheme for Compact Discs. It was used on some CDs distributed by Sony BMG Music Entertainment, Sony BMG and sparked the Sony BMG copy protection rootkit scandal, 2005 Sony BMG CD copy protection scandal; in that context it is also known as the Sony rootkit. Security researchers, beginning with Mark Russinovich in October 2005, have described the program as functionally identical to a rootkit: a computer program used by computer intruders to conceal unauthorised activities on a computer system. Russinovich broke the story on his Sysinternals blog, where it gained attention from the media and other researchers. This ultimately led to a civil lawsuit and criminal investigations, which forced Sony to discontinue use of the system ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


CD-Cops
CD-Cops is the first CD-ROM protection that uses the geometry of the CD-ROM media rather than a hidden "mark". It was invented in 1996 by Danish Link Data Security, known for its Cops Copylock key-diskette security used in the 1990s by Lotus 1-2-3. Overview As a copy (CD-R or CD-ROM) will have a different geometry, Data Position Measurement needs to be used for copies. The geometry is not known before CDs have been produced, therefore a CD-code expressing the layout of the CD-ROM must be entered the first time a user runs the protected software. Using a special production process in some cases the CD-code is embedded on the CD-ROM. CD-Cops is popular for encyclopaedias/dictionaries and business applications but not used as much for games. DVD-Cops based on the same principles in 1998 was the first DVD-ROM The DVD (common abbreviation for Digital Video Disc or Digital Versatile Disc) is a digital optical disc data storage format. It was invented and developed in 1995 an ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Privilege Escalation
Privilege escalation is the act of exploiting a bug, a design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. The result is that an application with more privileges than intended by the application developer or system administrator can perform unauthorized actions. Background Most computer systems are designed for use with multiple user accounts, each of which has abilities known as privileges. Common privileges include viewing and editing files or modifying system files. Privilege escalation means users receive privileges they are not entitled to. These privileges can be used to delete files, view private information, or install unwanted programs such as viruses. It usually occurs when a system has a bug that allows security to be bypassed or, alternatively, has flawed design assumptions about how it will be used. Privilege escalation occurs in two ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Fair Use
Fair use is a doctrine in United States law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder. Fair use is one of the limitations to copyright intended to balance the interests of copyright holders with the public interest in the wider distribution and use of creative works by allowing as a defense to copyright infringement claims certain limited uses that might otherwise be considered infringement. Unlike "fair dealing" rights that exist in most countries with a British legal history, the fair use right is a general exception that applies to all different kinds of uses with all types of works and turns on a flexible proportionality test that examines the purpose of the use, the amount used, and the impact on the market of the original work. The doctrine of "fair use" originated in the Anglo-American common law during the 18th and 19th centuries as a way of preventing copyright law from being too rigidly applied ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


CloneCD
CloneCD is proprietary optical disc authoring software that makes exact, 1:1 copies of music and data CDs and DVDs, regardless of any Digital Rights Management (DRM) restrictions. It was originally written by Oliver Kastl and offered by Swiss company Elaborate Bytes, but due to changes in European copyright law, they were forced to take it off the market. The last version of CloneCD made by Elaborate Bytes was version 4.2.0.2. The software was subsequently sold by SlySoft, a company located in Antigua and Barbuda, whose legislation does not ban the circumvention of DRM schemes. Since 2016, it is sold by Belize/Latvia based RedFox. Region restrictions in older versions In older versions of "''CloneCD''," the features "''Amplify Weak Sectors''," "''Protected PC Games''," and "''Hide CDR Media''" were disabled in the United States of America and Japan. Changing the region and language settings in Windows (e. g. to Canadian English) and/or patches could unlock these features in the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Absolute Time In Pregroove
Absolute Time in Pregroove (ATIP) is a method of storing information on an optical medium, used on CD-R and CD-RW . ATIP information is only readable on CD-R and CD-RW drives, as read-only drives don't need the information stored on it. The information indicates if the disk is writable and information needed to correctly write to the disk. Usage ATIP is used as a method of putting data on an optical medium, specifically: * Manufacturer * Writable/Rewritable * Dye type * Spiral length in blocks * Rated speed * Audio These features are rather important to the function as it lets the drive know if it is writable. If the disc is re-writable, and the ATIP is damaged, it will not be able to write more than once. Also, it lets the drive know what the maximum write speed available for the disc is, and how much space (in blocks) the disc holds. Function Every writable disc has at least four layers: * Disc substrate – the bulk of the disc is 1.2 mm thick, and is usually injection mo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]