Warez
   HOME

TheInfoList



OR:

Warez is a common computing and broader cultural term referring to
pirated software Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, su ...
(i.e. illegally copied, often after deactivation of anti-piracy measures) that is distributed via the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
. Warez is used most commonly as a
noun A noun () is a word that generally functions as the name of a specific object or set of objects, such as living creatures, places, actions, qualities, states of existence, or ideas.Example nouns for: * Living creatures (including people, alive, d ...
, a plural form of ''ware'' (short for
computer software Software is a set of computer programs and associated documentation and data. This is in contrast to hardware, from which the system is built and which actually performs the work. At the lowest programming level, executable code consists ...
), and is intended to be pronounced like the word wares . The circumvention of copy protection ( cracking) is an essential step in generating warez, and based on this common mechanism, the software-focused definition has been extended to include other copyright-protected materials, including movies and games. The global array of
warez group A warez group is a tightly organised group of people involved in creating and/or distributing warez such as movies, music or software ("warez") in The Scene. There are different types of these groups in the Scene: ''release groups'' and ''courier ...
s has been referred to as "The Scene", deriving from its earlier description as "the
warez scene The Warez scene, often referred to as The Scene, is a worldwide, underground, organized network of pirate groups specializing in obtaining and illegally releasing digital media for free before their official sale date. The Scene distributes all fo ...
". Distribution and trade of
copyright A copyright is a type of intellectual property that gives its owner the exclusive right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, education ...
ed works without payment of fees or royalties generally violates national and international copyright laws and agreements. The term warez covers supported as well as unsupported (
abandonware Abandonware is a product, typically software, ignored by its owner and manufacturer, and for which no official support is available. Within an intellectual rights contextual background, abandonware is a software (or hardware) sub-case of the g ...
) items, and legal prohibitions governing creation and distribution of warez cover both profit-driven and "enthusiast" generators and distributors of such items.


Terminology

Warez, and its
leet Leet (or "1337"), also known as eleet or leetspeak, is a system of modified spellings used primarily on the Internet. It often uses character replacements in ways that play on the similarity of their glyphs via reflection or other resemblance. ...
speak form ''W4r3z'', Note, this definition, contrary to this article statements and statements at the Oxford citation, suggests that the term's origin and pronunciation were "influenced by the anglicized pronunciation of Juarez, a Mexican city known for smuggling." are plural representations of the word "ware" (short for computer software), and are terms used to refer to " rated software distributed over the Internet," that is, " ftware that has been illegally copied and made available" Note, this definition is also identical to that in the British English version of this publisher's dictionary. e.g., after having "protection codes de-activated". "Cracking", or circumventing copy protection, is an essential part of the warez process," and via this commonality, the definition focused on computer software has been extended to include other forms of material under copyright protection, especially movies. As Aaron Schwabach notes, the term covers both supported and unsupported materials (the latter unsupported, termed
abandonware Abandonware is a product, typically software, ignored by its owner and manufacturer, and for which no official support is available. Within an intellectual rights contextual background, abandonware is a software (or hardware) sub-case of the g ...
), and legal recourses aimed at stemming the creation and distribution of warez are designed to cover both profit-driven and "enthusiast" practitioners. The earlier edition is , with same publisher and access date. Pages referenced at 247f are to the 2014 edition, while pages referenced to 307ff are to the 2006 edition, in both cases with page number appearing in superscript, in "rp" markup. Hence, the term refers to copyrighted works that are distributed without fees or royalties and so traded in general violation of copyright law. The term ''warez,'' which is intended to be pronounced like the word "wares" (/ˈwɛərz/), was coined in the 1990s; its origin is with an unknown member of an underground computing circle, but has since become commonplace among Internet users and the mass media. It is used most commonly as a noun: "My neighbour downloaded 10 gigabytes of warez yesterday"; but has also been used as a verb: "The new Windows was warezed a month before the company officially released it". The global collection of warez groups has been referred to as "The
Warez Scene The Warez scene, often referred to as The Scene, is a worldwide, underground, organized network of pirate groups specializing in obtaining and illegally releasing digital media for free before their official sale date. The Scene distributes all fo ...
," or more ambiguously "The Scene." Pages are as appear in the superscripted "rp" markup, inline. While the term 'piracy' is commonly used to describe a significant range of activities, most of which are unlawful, the relatively neutral meaning in this context is "...mak nguse of or reproduc ngthe work of another without authorization". Some groups (including the GNU project of the
Free Software Foundation The Free Software Foundation (FSF) is a 501(c)#501(c)(3), 501(c)(3) non-profit organization founded by Richard Stallman on October 4, 1985, to support the free software movement, with the organization's preference for software being distributed ...
, FSF) object to the use of this and other words such as "theft" because they represent an attempt to create a particular impression in the reader:The FSF advocates the use of terms like "prohibited copying" or "unauthorized copying", or "sharing information with your neighbor." Hence, the term "software pirate" is controversial; FSF derides its use, while many self-described pirates take pride in the term, and some groups (e.g.,
Pirates with Attitudes Pirates With Attitudes (PWA) was a major international warez release group between 1992 and 2000. The group was established by two former International Network of Crackers members known by the pseudonyms Orion and BarManager. PWA was also very wel ...
) fully embrace it. ''Direct download DLsites'' are web locations that index links to locations where files can be directly downloaded to the user's computer; many such sites link to free
file hosting service A file-hosting service, cloud-storage service, online file-storage provider, or cyberlocker is an internet hosting service specifically designed to host user files. It allows users to upload files that could be accessed over the internet afte ...
s, for the hosting of materials. DDL sites do not directly host the material and can avoid the fees that normally accompany large file hosting.


Motivations and arguments

The production and/or distribution of warez is illegal in most countries due to the protections provided in the
TRIPS Agreement The Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) is an international legal agreement between all the member nations of the World Trade Organization (WTO). It establishes minimum standards for the regulation by nat ...
. Software infringers generally exploit the international nature of the
copyright A copyright is a type of intellectual property that gives its owner the exclusive right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, education ...
issue to avoid law enforcement in specific countries. Violations are typically overlooked in poorer
third world The term "Third World" arose during the Cold War to define countries that remained non-aligned with either NATO or the Warsaw Pact. The United States, Canada, Japan, South Korea, Western European nations and their allies represented the " First ...
countries, and other countries with weak or non-existent protection for intellectual property. Additionally, some first world countries have loopholes in legislation that allow the warez to continue. There is also a movement, exemplified by groups like
The Pirate Party Pirate Parties International (PPI) is an international non-profit and non-governmental organization with headquarters in Brussels, Belgium. Formed in 2010, it serves as a worldwide organization for Pirate Parties, currently representing 39 ...
and scholars at
The Mises Institute Ludwig von Mises Institute for Austrian Economics, or Mises Institute, is a libertarian nonprofit think tank headquartered in Auburn, Alabama, United States. It is named after the Austrian School economist Ludwig von Mises (1881–1973). It wa ...
, that the very idea of
intellectual property Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, cop ...
is an
anathema Anathema, in common usage, is something or someone detested or shunned. In its other main usage, it is a formal excommunication. The latter meaning, its ecclesiastical sense, is based on New Testament usage. In the Old Testament, anathema was a cr ...
to free society. This is in contrast to some of the more traditional
open source Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized sof ...
advocates such as
Lawrence Lessig Lester Lawrence Lessig III (born June 3, 1961) is an American academic, attorney, and political activist. He is the Roy L. Furman Professor of Law at Harvard Law School and the former director of the Edmond J. Safra Center for Ethics at Harvard ...
, who advocate for middle ground between freedom and intellectual property.


Legality

Generally, there are four elements of criminal copyright infringement: the existence of a valid copyright, that copyright was infringed, the infringement was willful, and the infringement was either substantial, or for commercial gain (at levels often set by
statute A statute is a formal written enactment of a legislative authority that governs the legal entities of a city, state, or country by way of consent. Typically, statutes command or prohibit something, or declare policy. Statutes are rules made by le ...
). Offering warez is generally understood to be a form of
copyright infringement Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, s ...
that is punishable as either a
civil wrong Civil may refer to: *Civic virtue, or civility *Civil action, or lawsuit * Civil affairs *Civil and political rights * Civil disobedience *Civil engineering * Civil (journalism), a platform for independent journalism *Civilian, someone not a mem ...
or a
crime In ordinary language, a crime is an unlawful act punishable by a State (polity), state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definit ...
. Often sites hosting torrent files claim that they are not breaking any laws because they are not offering the actual data, rather only a link to other places or peers that contain the infringing material. However, many prosecution cases and convictions argue to the contrary. For instance, Dimitri Mader, the French national who operates a movie distribution warez site, Wawa-Mania, was fined 20,000 € and sentenced, in absentia, to a year in jail by a European court (after fleeing France for the Philippines), for his role in managing the site. In the U.S., through 2004, more than 80 individuals had been prosecuted and convicted for trade in warez products (under the
NET Act The United States No Electronic Theft Act (NET Act), a federal law passed in 1997, provides for criminal prosecution of individuals who engage in copyright infringement under certain circumstances, even when there is no monetary profit or commer ...
and other statutes), for movie and software pirating in particular, with a number of individuals being imprisoned, including some enthusiast traders. However, laws and their application to warez activities may vary greatly from country to country; for instance, while Wawa-Mania is under sanction in France, it remains in operation via a host in Moldova, and through use of an Ecuadorian top-level domain. Hence, while high-profile web hosts and domain providers generally do not permit the hosting of warez, and delete sites found to be hosting them, private endeavours and small commercial entities continue to allow the trade in warez to continue. And, in some countries, and at some times, software "piracy" has been encouraged, and international and usual national legal protections ignored. A dispute between
Iran Iran, officially the Islamic Republic of Iran, and also called Persia, is a country located in Western Asia. It is bordered by Iraq and Turkey to the west, by Azerbaijan and Armenia to the northwest, by the Caspian Sea and Turkmeni ...
and United States over membership in
WTO The World Trade Organization (WTO) is an intergovernmental organization that regulates and facilitates international trade. With effective cooperation in the United Nations System, governments use the organization to establish, revise, and e ...
and subsequent U.S. block of Iran's attempts at full-membership has led Iran to encourage the copying of U.S. software; hence, there has been a subsequent surge in Iranian "warez" and "crackz" websites (as Iranian laws do not forbid hosting them inside Iran). The same policy has been adopted by Antigua, and others.


Distribution

Warez are often distributed outside of The Scene (a collection of warez groups) by torrents (files including tracker info, piece size, uncompressed file size, comments, and vary in size from 1 k, to 400 k.) uploaded to a popular P2P website by an associate or friend of the cracker or cracking crew. An nfo or
FILE ID.DIZ FILE_ID.DIZ is a plain-text file containing a brief description of the content of archive formats, archive to which it belongs. Such files were originally used in archives distributed through bulletin board systems (BBSes) and is still used in the ...
is often made to promote who created the release. It is then leeched (downloaded) by users of the tracker and spread to other sharing sites using P2P, or other sources such as
newsgroups A Usenet newsgroup is a repository usually within the Usenet system, for messages posted from users in different locations using the Internet. They are discussion groups and are not devoted to publishing news. Newsgroups are technically distinct ...
. From there, it can be downloaded by millions of users all over the world. Often, one release is duplicated, renamed, then re-uploaded to different sites so that eventually, it can become impossible to trace the original file. Another increasingly popular method of distributing Warez is via one-click hosting websites. In the early 1990s, warez were often published on bulletin boards that had a warez section.


Rise of software infringement

Unauthorized copying has been an ongoing phenomenon that started when high quality, commercially produced software was released for sale. Whether the medium was cassette tape or floppy disk, cracking enthusiasts found a way to duplicate the software and spread it without the permission of the maker. Thriving bootlegging communities were built around the
Apple II The Apple II (stylized as ) is an 8-bit home computer and one of the world's first highly successful mass-produced microcomputer products. It was designed primarily by Steve Wozniak; Jerry Manock developed the design of Apple II's foam-m ...
,
Commodore 64 The Commodore 64, also known as the C64, is an 8-bit home computer introduced in January 1982 by Commodore International (first shown at the Consumer Electronics Show, January 7–10, 1982, in Las Vegas). It has been listed in the Guinness ...
, the
Atari 400 The Atari 8-bit family is a series of 8-bit home computers introduced by Atari, Inc. in 1979 as the Atari 400 and Atari 800. The series was successively upgraded to Atari 1200XL , Atari 600XL, Atari 800XL, Atari 65XE, Atari 130XE, Atari 800XE ...
and
Atari 800 The Atari 8-bit family is a series of 8-bit home computers introduced by Atari, Inc. in 1979 as the Atari 400 and Atari 800. The series was successively upgraded to Atari 1200XL , Atari 600XL, Atari 800XL, Atari 65XE, Atari 130XE, Atari 800XE ...
line, the
ZX Spectrum The ZX Spectrum () is an 8-bit computing, 8-bit home computer that was developed by Sinclair Research. It was released in the United Kingdom on 23 April 1982, and became Britain's best-selling microcomputer. Referred to during development as t ...
, the
Amiga Amiga is a family of personal computers introduced by Commodore in 1985. The original model is one of a number of mid-1980s computers with 16- or 32-bit processors, 256 KB or more of RAM, mouse-based GUIs, and significantly improved graphi ...
, and the
Atari ST The Atari ST is a line of personal computers from Atari Corporation and the successor to the Atari 8-bit family. The initial model, the Atari 520ST, had limited release in April–June 1985 and was widely available in July. It was the first pers ...
, among other personal computers. Entire networks of
BBS BBS may refer to: Ammunition * BBs, BB gun metal bullets * BBs, airsoft gun plastic pellets Computing and gaming * Bulletin board system, a computer server users dial into via dial-up or telnet; precursor to the Internet * BIOS Boot Specificat ...
es sprang up to traffic illegal software from one user to the next. Machines like the
Amiga Amiga is a family of personal computers introduced by Commodore in 1985. The original model is one of a number of mid-1980s computers with 16- or 32-bit processors, 256 KB or more of RAM, mouse-based GUIs, and significantly improved graphi ...
and the
Commodore 64 The Commodore 64, also known as the C64, is an 8-bit home computer introduced in January 1982 by Commodore International (first shown at the Consumer Electronics Show, January 7–10, 1982, in Las Vegas). It has been listed in the Guinness ...
had an international network, through which software not available on one continent would eventually make its way to every region via
bulletin board system A bulletin board system (BBS), also called computer bulletin board service (CBBS), is a computer server running software that allows users to connect to the system using a terminal program. Once logged in, the user can perform functions such as ...
s. It was also quite common in the 1980s to use physical floppy disks and the
postal service The mail or post is a system for physically transporting postcards, letters, and parcels. A postal service can be private or public, though many governments place restrictions on private systems. Since the mid-19th century, national postal syst ...
for spreading software, in an activity known as ''mail trading''. Prior to the sale of software that came on CD-ROM discs and after hard drives had become available, the software did not require the floppy disc to be in the drive when starting and using the program. So, a user could install it onto his/her computer and mail the disk to the next person, who could do the same. Particularly widespread in continental Europe, mail trading was even used by many of the leading cracker groups as their primary channel of interaction. Software copyright violation via mail trading was also the most common means for many computer hobbyists in the
Eastern bloc The Eastern Bloc, also known as the Communist Bloc and the Soviet Bloc, was the group of socialist states of Central and Eastern Europe, East Asia, Southeast Asia, Africa, and Latin America under the influence of the Soviet Union that existed du ...
countries to receive new Western software for their computers. Copy-protection schemes for the early systems were designed to defeat casual duplication attempts, as "crackers" would typically release a copied game to the "pirate" community the day they were earmarked for market. A famous event in the history of software copyright policy was an
open letter An open letter is a Letter (message), letter that is intended to be read by a wide audience, or a letter intended for an individual, but that is nonetheless widely distributed intentionally. Open letters usually take the form of a letter (mess ...
written by
Bill Gates William Henry Gates III (born October 28, 1955) is an American business magnate and philanthropist. He is a co-founder of Microsoft, along with his late childhood friend Paul Allen. During his career at Microsoft, Gates held the positions ...
of
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washing ...
, dated February 3, 1976, in which he argued that the quality of available software would increase if "software piracy" were less prevalent. However, until the early 1990s, software copyright infringement was not yet considered a serious problem by most people. In 1992, the
Software Publishers Association The Software and Information Industry Association (SIIA) is a trade association dedicated to the entertainment, consumer and business software industries. Established in 1984 as the Software Publishers Association (SPA), the SIIA took its new na ...
began to battle against this phenomenon, with its promotional video "
Don't Copy That Floppy ''Don't Copy That Floppy'' was an anti-copyright infringement campaign run by the Software Publishers Association (SPA) beginning in 1992. The video for the campaign, starring M. E. Hart as "MC Double Def DP", was filmed at Cardozo High Sch ...
". It and the
Business Software Alliance The Software Alliance, also known as BSA, is a trade group established by Microsoft in 1988 to represent commercial software makers. It is a member of the International Intellectual Property Alliance. Its principal activity is trying to stop cop ...
have remained the most active anti-infringement organizations worldwide, although to compensate for extensive growth in recent years, they have gained the assistance of the
Recording Industry Association of America The Recording Industry Association of America (RIAA) is a trade organization that represents the music recording industry in the United States. Its members consist of record labels and distributors that the RIAA says "create, manufacture, and/o ...
(RIAA), the
Motion Picture Association of America The Motion Picture Association (MPA) is an American trade association representing the five major film studios of the United States, as well as the video streaming service Netflix. Founded in 1922 as the Motion Picture Producers and Distribu ...
(MPAA), as well as
American Society of Composers, Authors, and Publishers The American Society of Composers, Authors, and Publishers (ASCAP) () is an American not-for-profit performance-rights organization (PRO) that collectively licenses the public performance rights of its members' musical works to venues, broadca ...
(ASCAP) and
Broadcast Music Incorporated Broadcast Music, Inc. (BMI) is a performance rights organization in the United States. It collects blanket license fees from businesses that use music, entitling those businesses to play or sync any songs from BMI's repertoire of over 20.6 milli ...
(BMI). Today most warez files are distributed to the public via bittorrent and One-click hosting sites. Some of the most popular software companies that are being targeted are Adobe, Microsoft, Nero, Apple, DreamWorks, and Autodesk, to name a few. To reduce the spread of illegal copying, some companies have hired people to release "fake" torrents (known as Torrent poisoning), which look real and are meant to be downloaded, but while downloading the individual does not realize that the company that owns the software has received his/her
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
. They will then contact his/her
ISP An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise private ...
, and further legal action may be taken by the company/ISP.


Causes that have accelerated its growth

Similar to
televisions Television, sometimes shortened to TV, is a telecommunication medium for transmitting moving images and sound. The term can refer to a television set, or the medium of television transmission. Television is a mass medium for advertising, ...
and
telephones A telephone is a telecommunications device that permits two or more users to conduct a conversation when they are too far apart to be easily heard directly. A telephone converts sound, typically and most efficiently the human voice, into el ...
, computers have become a necessity to every person in the
information age The Information Age (also known as the Computer Age, Digital Age, Silicon Age, or New Media Age) is a historical period that began in the mid-20th century. It is characterized by a rapid shift from traditional industries, as established during ...
. As the use of computers increased, so had software and cyber crimes. In the mid-1990s, the average
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
user was still on
dial-up Dial-up Internet access is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a connection to an Internet service provider (ISP) by dialing a telephone number on a conventional telepho ...
, with average speed ranging between 28.8 and 33.6
kbit/s In telecommunications, data-transfer rate is the average number of bits (bitrate), characters or symbols (baudrate), or data blocks per unit time passing through a communication link in a data-transmission system. Common data rate units are multi ...
. If one wished to download a piece of software, which could run about 200 MB, the download time could be longer than one day, depending on network traffic, the
Internet Service Provider An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise private ...
, and the server. Around 1997,
broadband In telecommunications, broadband is wide bandwidth data transmission which transports multiple signals at a wide range of frequencies and Internet traffic types, that enables messages to be sent simultaneously, used in fast internet connections. ...
began to gain popularity due to its greatly increased network speeds. As "large-sized file transfer" problems became less severe, warez became more widespread and began to affect large
software Software is a set of computer programs and associated documentation and data. This is in contrast to hardware, from which the system is built and which actually performs the work. At the lowest programming level, executable code consists ...
files like
animations Animation is a method by which still figures are manipulated to appear as moving images. In traditional animation, images are drawn or painted by hand on transparent celluloid sheets to be photographed and exhibited on film. Today, most anima ...
and
movies A film also called a movie, motion picture, moving picture, picture, photoplay or (slang) flick is a work of visual art that simulates experiences and otherwise communicates ideas, stories, perceptions, feelings, beauty, or atmosphere ...
. In the past, files were distributed by point-to-point technology: with a central uploader distributing files to downloaders. With these systems, a large number of downloaders for a popular file uses an increasingly larger amount of
bandwidth Bandwidth commonly refers to: * Bandwidth (signal processing) or ''analog bandwidth'', ''frequency bandwidth'', or ''radio bandwidth'', a measure of the width of a frequency range * Bandwidth (computing), the rate of data transfer, bit rate or thr ...
. If there are too many downloads, the server can become unavailable. The opposite is true for
peer-to-peer Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer n ...
networking; the ''more'' downloaders the ''faster'' the file distribution is. With swarming technology as implemented in
file sharing File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include r ...
systems like
eDonkey2000 eDonkey2000 (nicknamed "ed2k") was a peer-to-peer file sharing application developed by US company MetaMachine (Jed McCaleb and Sam Yagan), using the Multisource File Transfer Protocol. This client supports both the eDonkey2000 network and the ...
or BitTorrent, downloaders help the uploader by picking up some of its uploading responsibilities. There are many sites with links to One-click hosting websites and other sites where one can upload files that contribute to the growing amount of warez.


Distribution via compromised FTP servers

Prior to the development of modern peer-to-peer sharing systems and home broadband service, sharing warez sometimes involved warez groups scanning the Internet for weakly secured computer systems with high-speed connections. These weakly secured systems would be compromised by exploiting the poor FTP security, creating a special directory on the server with an unassuming name to contain the illegal content.
View cited page
using
Google Books Google Books (previously known as Google Book Search, Google Print, and by its code-name Project Ocean) is a service from Google Inc. that searches the full text of books and magazines that Google has scanned, converted to text using optical c ...
)
A common mistake of early FTP administrators was to permit a directory named /incoming that allows full read and write access by external users, but the files themselves in /incoming were hidden; by creating a directory inside /incoming, this hidden directory would then allow normal file viewing. Users of the compromised site would be directed to log in and go to a location such as /incoming/data/warez to find the warez content. Messages could be left for other warez users by uploading a plain text file with the message inside. Hackers would also use known software bugs to illicitly gain full administrative remote control over a computer, and install a hidden FTP service to host their wares. This FTP service was usually running on an unusual port number, or with a non-anonymous login name like "login: warez / Password: warez" to help prevent discovery by legitimate users; information about this compromised system would then be distributed to a select group of people who were part of the warez scene. It was important for warez group members to regulate who had access to these compromised FTP servers, to keep the network bandwidth usage low. A site that suddenly became very popular would be noticed by the real owners of the equipment, as their business systems became slow or low on disk space; investigation of system usage would then inevitably result in discovery and removal of the warez, and tightening of the site security.


Automated warez distribution via IRC bots

As the ability to compromise and attain full remote control of business servers became more developed, the warez groups would hack a server and install an
IRC Internet Relay Chat (IRC) is a text-based chat system for instant messaging. IRC is designed for group communication in discussion forums, called '' channels'', but also allows one-on-one communication via private messages as well as chat an ...
bot on the compromised systems alongside the
FTP The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data ...
service, or the IRC bot would provide file sharing directly by itself. This software would intelligently regulate access to the illicit data by using file queues to limit bandwidth usage, or by only running during off-hours overnight when the business owning the compromised hardware was closed for the day. In order to advertise the existence of the compromised site, the IRC software would join public IRC ''warez'' channels as a ''bot'' and post into the channel with occasional status messages every few minutes, providing information about how many people are logged into the warez host, how many files are currently being downloaded, what the upload/download ratio is (to force users into contributing data of their own before they can download), which warez distributor is running the bot, and other status information. This functionality still exists and can still be found on IRC ''warez'' channels, as an alternative to the modern and streamlined
P2P P2P may refer to: * Pay to play, where money is exchanged for services * Peer-to-peer, a distributed application architecture in computing or networking ** List of P2P protocols * Phenylacetone, an organic compound commonly known as P2P * Poin ...
distribution systems. The opportunity to find and compromise poorly secured systems on which to create an illicit warez distribution site has only increased with the popular use of broadband service by home users who may not fully understand the security implications of having their home computer always turned on and connected to the Internet


Types

There is generally a distinction made between different sub-types of warez. The unusual spellings shown here were commonly used as directory names within a compromised server, to organize the files rather than having them all thrown together in a single random collection. * Apps –
Applications Application may refer to: Mathematics and computing * Application software, computer software designed to help the user to perform specific tasks ** Application layer, an abstraction layer that specifies protocols and interface methods used in a c ...
: Generally a retail version of a software package. * Cracks – Cracked applications: A modified executable or more (usually one) and/or a library (usually one) or more and/or a patch designed to turn a trial version of a software package into the full version and/or bypass copy protections. * Dox –
Video game Video games, also known as computer games, are electronic games that involves interaction with a user interface or input device such as a joystick, controller, keyboard, or motion sensing device to generate visual feedback. This fee ...
add-ons: These include nocds, cracks, trainers, cheat codes etc. * EBook –
E-books An ebook (short for electronic book), also known as an e-book or eBook, is a book publication made available in digital form, consisting of text, images, or both, readable on the flat-panel display of computers or other electronic devices. Alt ...
: These include unlicensed copies of e-books, scanned books, scanned comics, etc. * Games – Video games: This scene concentrates on both computer based games, and video game consoles, often released as
ISO ISO is the most common abbreviation for the International Organization for Standardization. ISO or Iso may also refer to: Business and finance * Iso (supermarket), a chain of Danish supermarkets incorporated into the SuperBest chain in 2007 * Iso ...
or other format disk image. * Hacks – Simplified/Specific Hacking Tools: Programs designed to perform specific hacks at the click of a button, typically with a limited scope, such as
AOHell AOHell was a Windows application that was used to simplify ' cracking' (computer hacking) using AOL. The program contained a very early use of the term phishing. It was created by a teenager under the pseudonym Da Chronic, whose expressed motivat ...
and AOL4Free. * Keygens –
Keygen A key generator (key-gen) is a computer program that generates a product licensing key, such as a serial number, necessary to activate for use of a software application. Keygens may be legitimately distributed by software manufacturers for lice ...
software are tools that replicate the registration/activation process of a genuine software product and generate the necessary keys to activate the software. * Movies –
Movies A film also called a movie, motion picture, moving picture, picture, photoplay or (slang) flick is a work of visual art that simulates experiences and otherwise communicates ideas, stories, perceptions, feelings, beauty, or atmosphere ...
: Unauthorized copies of movies, can be released while still in theaters or from CDs/DVDs/Blu-ray prior to the actual retail date. * MP3s –
MP3 MP3 (formally MPEG-1 Audio Layer III or MPEG-2 Audio Layer III) is a coding format for digital audio developed largely by the Fraunhofer Society in Germany, with support from other digital scientists in the United States and elsewhere. Origin ...
audio: Audio from albums, singles, or other sources usually obtained by ripping a CD or a
radio broadcast Radio broadcasting is transmission of audio (sound), sometimes with related metadata, by radio waves to radio receivers belonging to a public audience. In terrestrial radio broadcasting the radio waves are broadcast by a land-based radio sta ...
and released in the compressed audio format MP3. * MVids –
Music videos A music video is a video of variable duration, that integrates a music song or a music album with imagery that is produced for promotional or musical artistic purposes. Modern music videos are primarily made and used as a music marketing device ...
– Can be ripped from TV, HDTV, DVDs or VCDs. * NoCD, NoDVD, FixedExe – A file modification that allows an installed program to be run without inserting the CD or DVD into the drive. * RIP – A game that doesn't have to be installed; any required registry entry can be included as a .reg file. RIP games can be ripped of music and/or video files, or, for video games, ROMs, thus decreasing the size of the download. RIPs with nothing ripped out sometimes are referred to as DP (direct play). * Portables –
Portable applications A portable application (portable app), sometimes also called standalone, is a program designed to read and write its configuration settings into an accessible folder in the computer, usually in the folder where the portable application can be f ...
: Similar to RIPs, but in this case they're software applications instead of video games. The point of portable software is the fact that it can be placed on removable media (or any place on the local hard drive) and doesn't need installing; usually it is compressed into one executable file, by using software like
VMware ThinApp VMware ThinApp (formerly ''Thinstall'') is an application virtualization and portable application creator suite by VMware that can package conventional Windows applications so that they become portable applications by running on another operat ...
or
MoleBox Portable application creators allow the creation of portable applications (also called portable apps). They usually use application virtualization. Creators of independent portable No software agent, agent or client (computing), client is required ...
. * Scripts –
Scripts Script may refer to: Writing systems * Script, a distinctive writing system, based on a repertoire of specific elements or symbols, or that repertoire * Script (styles of handwriting) ** Script typeface, a typeface with characteristics of handw ...
: These include unlicensed copies of commercial scripts (such as vBulletin, Invision Power Board, etc.) coded by companies in
PHP PHP is a general-purpose scripting language geared toward web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995. The PHP reference implementation is now produced by The PHP Group. ...
, ASP, and other languages. * Subs –
Subtitles Subtitles and captions are lines of dialogue or other text displayed at the bottom of the screen in films, television programs, video games or other visual media. They can be transcriptions of the screenplay, translations of it, or informati ...
: can be integrated in a TV-Rip or Movie. * Serials – Refers to a collection of
product key A product key, also known as a software key, serial key or activation key, is a specific software-based key for a computer program. It certifies that the copy of the program is original. Product keys consist of a series of numbers and/or letters ...
s such as
serial numbers A serial number is a unique identifier assigned incrementally or sequentially to an item, to ''uniquely'' identify it. Serial numbers need not be strictly numerical. They may contain letters and other typographical symbols, or may consist enti ...
made available for the purpose of activating trial software, without payment. * Templates –
Web template A web template system in web publishing lets web designers and developers work with ''web templates'' to automatically generate custom web pages, such as the results from a search. This reuses static web page elements while defining dynamic el ...
s: These include leaked commercial website templates coded by companies. * TV-Rips –
Television programs A television show – or simply TV show – is any content produced for viewing on a television set which can be broadcast via over-the-air, satellite, or cable, excluding breaking news, advertisements, or trailers that are typically placed betw ...
: Television shows or movies, usually with commercials edited out. Commonly released within a few hours after airing. DVD Rips of television series fall under this sub-type. * XXX –
Pornography Pornography (often shortened to porn or porno) is the portrayal of sexual subject matter for the exclusive purpose of sexual arousal. Primarily intended for adults,
: These can be imagesets,
paysite A paysite or pay site, in the adult entertainment industry, is a website that charges money to become a member and view its content, and often produces original adult content. They can be contrasted with "free-sites", which do not charge a members ...
videos or retail movies. * Zero-day or 0-day – Any copyrighted work that has been released the same day as the original product, or sometimes even before. It is considered a mark of skill among warez distribution groups to crack and distribute a program on the same day as its commercial release.


Movie infringement

Movie A film also called a movie, motion picture, moving picture, picture, photoplay or (slang) flick is a work of visual art that simulates experiences and otherwise communicates ideas, stories, perceptions, feelings, beauty, or atmosphere ...
copyright infringement Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, s ...
was looked upon as impossible by the major studios. When
dial-up Dial-up Internet access is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a connection to an Internet service provider (ISP) by dialing a telephone number on a conventional telepho ...
was common in early and mid-1990s, movies distributed on the Internet tended to be small. The technique that was usually used to make them small was to use
compression Compression may refer to: Physical science *Compression (physics), size reduction due to forces *Compression member, a structural element such as a column *Compressibility, susceptibility to compression * Gas compression *Compression ratio, of a ...
software, thus lowering the video quality significantly. At that time, the largest copyright violation threat was software. However, along with the rise in
broadband In telecommunications, broadband is wide bandwidth data transmission which transports multiple signals at a wide range of frequencies and Internet traffic types, that enables messages to be sent simultaneously, used in fast internet connections. ...
internet connections beginning around 1998, higher quality movies began to see widespread distribution – with the release of
DeCSS DeCSS is one of the first free computer programs capable of decrypting content on a commercially produced DVD video disc. Before the release of DeCSS, open source operating systems (such as Berkeley Software Distribution, BSD and Linux) could n ...
,
ISO ISO is the most common abbreviation for the International Organization for Standardization. ISO or Iso may also refer to: Business and finance * Iso (supermarket), a chain of Danish supermarkets incorporated into the SuperBest chain in 2007 * Iso ...
images copied directly from the original DVDs were slowly becoming a feasible distribution method. Today, movie sharing has become so common that it has caused major concern amongst movie studios and their representative organizations. Because of this the
MPAA The Motion Picture Association (MPA) is an American trade association representing the five major film studios of the United States, as well as the video streaming service Netflix. Founded in 1922 as the Motion Picture Producers and Distribu ...
is often running campaigns during movie trailers where it tries to discourage people from copying material without permission. Unlike the music industry, which has had online music stores available for several years, the movie industry moved to online distribution only in 2006, after the launch of Amazon Unbox. Because of this, cameras are sometimes forbidden in movie theaters.


File formats

A CD software release can contain up to 700 
megabytes The megabyte is a multiple of the unit byte for digital information. Its recommended unit symbol is MB. The unit prefix ''mega'' is a multiplier of (106) in the International System of Units (SI). Therefore, one megabyte is one million bytes o ...
of data, which presented challenges when sending over the Internet, particularly in the late 1990s when broadband was unavailable to most home consumers. These challenges apply to an even greater extent for a single-layer
DVD The DVD (common abbreviation for Digital Video Disc or Digital Versatile Disc) is a digital optical disc data storage format. It was invented and developed in 1995 and first released on November 1, 1996, in Japan. The medium can store any kind ...
release, which can contain up to 4.7  GB of data. The warez scene made it standard practice to split releases up into many separate pieces, called disks, using several file compression formats: (historical
TAR Tar is a dark brown or black viscous liquid of hydrocarbons and free carbon, obtained from a wide variety of organic materials through destructive distillation. Tar can be produced from coal, wood, petroleum, or peat. "a dark brown or black bit ...
, LZH,
ACE An ace is a playing card, die or domino with a single pip. In the standard French deck, an ace has a single suit symbol (a heart, diamond, spade, or club) located in the middle of the card, sometimes large and decorated, especially in the c ...
, UHA,
ARJ ARJ (Archived by Robert Jung) is a software tool designed by Robert K. Jung for creating high-efficiency data compression, compressed file archives. ARJ is currently on version 2.86 for MS-DOS and 3.20 for Microsoft Windows and supports 16-bit, 3 ...
), ZIP, and most commonly RAR. The original purpose of these "disks" was so that each .rar file could fit on a single 1.44 MB 3½ inch
floppy disk A floppy disk or floppy diskette (casually referred to as a floppy, or a diskette) is an obsolescent type of disk storage composed of a thin and flexible disk of a magnetic storage medium in a square or nearly square plastic enclosure lined w ...
. With the growing size of games, this is no longer feasible, as hundreds of disks would need to be used. The average size of disks released by groups today are 50 
megabytes The megabyte is a multiple of the unit byte for digital information. Its recommended unit symbol is MB. The unit prefix ''mega'' is a multiplier of (106) in the International System of Units (SI). Therefore, one megabyte is one million bytes o ...
or 100 megabytes, however it is common to find disks up to 200 megabytes. This method has many advantages over sending a single large file: *The two-layer compression could sometimes achieve almost a tenfold improvement over the original DVD/CD image. The overall file size is cut down and lessens the transfer time and bandwidth required. *If there is a problem during the file transfer and data was corrupted, it is only necessary to resend the few corrupted RAR files instead of resending the entire large file. *This method also allows the possibility of downloading separate ‘disks’ from different sources, as an early attempt at modern segmented downloading. **In the case of One-click hosting websites, downloading multiple files from one or several sources can significantly increase download speeds. This is because even if the source(s) provides slow download speeds on individual disks, downloading several disks simultaneously will allow the user to achieve much greater download rates. Despite the fact that many modern ftp programs support segmented downloading, the compression via RAR, ZIP, and breaking up of files has not changed. Releases of software titles often come in two forms. The full form is a full version of a game or application, generally released as CD or DVD-writable
disk images A disk image, in computing, is a computer file containing the contents and structure of a disk volume or of an entire data storage device, such as a hard disk drive, tape drive, floppy disk, optical disc, or USB flash drive. A disk image is us ...
( BIN or
ISO ISO is the most common abbreviation for the International Organization for Standardization. ISO or Iso may also refer to: Business and finance * Iso (supermarket), a chain of Danish supermarkets incorporated into the SuperBest chain in 2007 * Iso ...
files). A rip is a cut-down version of the title in which additions included on the legitimate DVD/CD (generally
PDF Portable Document Format (PDF), standardized as ISO 32000, is a file format developed by Adobe in 1992 to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems. ...
manuals, help files, tutorials, and audio/video media) are omitted. In a game rip, generally all game video is removed, and the audio is compressed to MP3 or
Vorbis Vorbis is a free and open-source software project headed by the Xiph.Org Foundation. The project produces an audio coding format and software reference encoder/decoder (codec) for lossy audio compression. Vorbis is most commonly used in conjun ...
, which must then be decoded to its original form before playing. These rips are very rare today, as most modern
broadband In telecommunications, broadband is wide bandwidth data transmission which transports multiple signals at a wide range of frequencies and Internet traffic types, that enables messages to be sent simultaneously, used in fast internet connections. ...
connections can easily handle the full files, and the audio is usually already compressed by the original producer in some fashion.


Warez and malware

There is a common perception that warez sites represent high risk in terms of
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depri ...
. In addition, there are several papers showing there is indeed correlation between warez/file sharing sites and
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depri ...
. In particular, one study shows that out of all domains the study classified as ''pirate'', 7.1% are infected (while out of ''random'' domains only 0.4% were infected); another study maintains that '"maliciousness" of the content for sites they classified as ''pirate'' (which specifically included ''warez'' sites) is the highest among all the researched site categories. Domains related to anti-copy protection tools are among the most malicious sites. Another study specifically targeted anti-copy protection tools such as cracks and key generators. They conclude that the majority of these programs aim to infect the user's computer with one or more types of malware. The chance of the end-user being exposed to malicious code when dealing with cracked applications or games is more than 50%. These statistical data can be questionable though, because most prominent Antivirus software programs tend to classify KeyGens as viruses ''a priori'', although most keygens do not infect the users' computers in any way. Infected warez directly from the
warez scene The Warez scene, often referred to as The Scene, is a worldwide, underground, organized network of pirate groups specializing in obtaining and illegally releasing digital media for free before their official sale date. The Scene distributes all fo ...
on the other hand, is a very unusual occurrence. The malicious content is usually added at a later stage by third parties.


Demographics

Warez traders share many similarities to both hackers and crackers. Primary warez distribution groups include a single cracker that renders all copy protected technologies in a warez inoperable. Unlike the typical age of a hacker and cracker, the general age and demographics of a warez trader are older and married IT professionals. The need for attention is another similarity between the groups as well as the belief that digital property should be free.


See also

* .nfo *
Crack intro __NOTOC__ A crack intro, also known as a cracktro, loader, or just intro, is a small introduction sequence added to cracked software. It aims to inform the user which "cracking crew" or individual cracker removed the software's copy protection and ...
duction *
List of warez groups Warez groups are teams of individuals who have participated in the organized unauthorized publication of films, music, or other media, as well as those who can reverse engineer and crack the digital rights management ( DRM) measures applied to ...
* Open Music Model *
Software copyright Software copyright is the application of copyright in law to machine-readable software. While many of the legal principles and policy debates concerning software copyright have close parallels in other domains of copyright law, there are a number o ...


References


Further reading

* * * See also, Goldman, Eric (2004-01-07), "Warez Trading and Criminal Copyright Infringement," Working Paper, a

o

* Goldman, Eric (2005), "The Challenges of Regulating Warez Trading," ''Social Science Computer Review,'' Vol. 23, No. 24, se

* * * The earlier edition is , with same publisher and access date. *


External links


2600 A Guide to Piracy
– An article on the warez scene (ASCII plaintext and image scans from '' 2600: The Hacker Quarterly'')
"The Shadow Internet"
– An article about modern day warez "top sites" at
Wired News ''Wired'' (stylized as ''WIRED'') is a monthly American magazine, published in print and online editions, that focuses on how emerging technologies affect culture, the economy, and politics. Owned by Condé Nast, it is headquartered in San Fran ...
.
The Darknet and the Future of Content DistributionBSA – Global Piracy Study – 2005
(
PDF Portable Document Format (PDF), standardized as ISO 32000, is a file format developed by Adobe in 1992 to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems. ...
)
BSA – Global Piracy Study – 2004
(PDF)
Ordered Misbehavior – The Structuring of an Illegal Endeavor
by Alf Rehn. A study of the illegal subculture known as the "warez scene". (PDF)
Piracy Textfiles
– A historical collection of documents released by warez-related individuals.
Warez Trading and Criminal Copyright Infringement
– An article on warez trading and the law, including a recap of US prosecutions under the No Electronic Theft Act. {{Forms of pirated film releases Software cracking Internet slang 1990s neologisms Copyright infringement of software File sharing