Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Software Piracy and Warez Module L Page | 3652 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Version 6 Module L Software Piracy and Warez Ethical Hacking and Countermeasures v6 Module L: Software Piracy and Warez Exam 312-50 Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Software Piracy and Warez Module L Page | 3653 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News Source: http://www.moneyweb.co.za/ News According to a study published by BSA (Business Security Alliance), South Africa can build a strong local IT sector, produce high paying jobs, and contribute to the country’s economy by reducing software piracy. The study conducted by BSA and International Data Corporation (IDC) states that IT industries are a major source for job, tax revenues, and gross domestic products of South Africa. The South African IT industry is expected to offer 99,000 jobs, R84 billion in economic growth, and over R30 billion in tax revenues by the year 2011. In South Africa, reducing the current software piracy rate of 35% to 10% can have the effect on increasing economic benefits, producing 1200 additional jobs, R480 million in tax revenues, and R6 billion expenditure in the local IT sector in the next four years. Alastair de Wet, chairperson of the BSA in South Africa, said when countries perform necessary action against software piracy, everyone benefits Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Software Piracy and Warez Module L Page | 3654 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News Source: http://ap.google.com/article/ News Microsoft said that it started the investigation of software piracy in 22 countries, hoping that the pirates cannot move forward if they know how far software companies will go to protect their computer code, worth billions in profits every quarter. Microsoft discovered that more than a dozen countries are using illegal copies of Windows and Office. Microsoft said that using illegal copies can turn innocent consumers into criminals and they also can increase the risk of viruses and spyware. The case against software piracy started in 2001. A U.S custom officer seized a shipping container of $100 million worth of fake software and 31,000 copies of Windows operating system. After this incident, Microsoft started its investigation on software piracy in 22 countries. Microsoft has estimated the retail value of pirated software at $900 million, accounting for 90% of illegal software found between 1999 to 2004; approximately 470,000 disks. Some companies are interested in providing serious resources to protect against software piracy, because it very difficult to get the profit. Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Software Piracy and Warez Module L Page | 3655 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Objective • Software Activation • Process of Software Activation • Piracy • Impacts of piracy • Dongles • Software Piracy Protection Strategies • Warez • Warez Distribution Methods • Tools This module will familiarize you with: Module Objective This module will familiarize you with: Software Activation Process of Software Activation Piracy Impacts of Piracy Dongles Software Piracy Protection Strategies Warez Warez Distribution Methods Tools Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Software Piracy and Warez Module L Page | 3656 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow Software Activation Process of Software Activation Impacts of piracy Warez Dongles Software Piracy Protection Strategies Tools Warez Distribution Methods Piracy Module Flow Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Software Piracy and Warez Module L Page | 3657 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Software Activation Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Software Piracy and Warez Module L Page | 3658 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Software Activation: Introduction Software activation is the process of obtaining a license for software so that it becomes active and ready to be used on the computer This can be done automatically over the Internet or manually by phone, fax, or email Only that software can be activated for which the license has already been purchased Software Activation: Introduction Software activation is a process of acquiring a license for software so that it becomes active and can be used on the computer. Software activation can be done over the Internet, via phone, and through email. It is a process by which a license file is copied onto the computer, which can be detected by the software when it starts up, and changes the software from evaluation mode to a fully licensed program that allows you to save, print, and use without restrictions. While activating software, you can assign each license to a particular computer (desktop license) or if it is a Local Area Network, then you can allow the license to flow between connected computers. Desktop license is the easiest method but it is a complex method for large firms and universities. Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Software Piracy and Warez Module L Page | 3659 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Process of Software Activation 1 • the software vendors register with the Software Activation Service (SAS) 2 • After activation of the account of the software, the vendor can operate the account and generate Product Keys for their products using the SAS website 3 • These Product Keys are then integrated with the vendor’s software 4 • Each copy of the software is labeled with the Product Key and sold to the end-users EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Process of Software Activation (cont’d) 5 • The end-user buys or downloads the product from the vendor and installs it on a computer 6 • During installation, an Authentication Number consisting of the unique Computer ID and time stamp is sent from the end-user’s computer along with the Product Key to the Software Activation Service 7 • Product Key and Authentication Number are validated and a License Key is sent to the end-user’s computer 8 • Now the end-user can start using the software Process of Software Activation The process of activating software is as follows: First, software vendor should complete their registration process with the Software Activation Service (SAS) After activation of account, software vendor can generate product key for their product These product keys are then integrated with the vendor’s software Every software is provided with the product key and sold to the end-user Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Software Piracy and Warez Module L Page | 3660 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. The end-user may purchase or download the product from the vendor and install it on a computer At the time of installing software, user sends product key, computer ID, and time stamp to Software Activation Service The software vendor validates the product key and authentication number and sends a license key to the end-user’s computer Now, the end-user can start using the software Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Software Piracy and Warez Module L Page | 3661 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Piracy