Professional Documents
Culture Documents
SOFTWARE PIRACY
The biggest legal problem affecting the computer industry is software piracy.
Which is the illegal copying or use of programs. Piracy is a huge problem
because it is so easy to do. In most cases, it is no more difficult to steal a program
than it is to tape a music CD that you have borrowed from a friend. Software
pirates give up the right to receive upgrades and technical support, but they gain
the use of the program without paying for it. Many commercial software
programs-software you must purchase before using-cost as little as $20 to $ 50,
but most applications cost between $100 and $500. Highly specialized or complex
applications can cost several thousand dollars.
Even shareware-software you can use for free on a trial basis and then register
and pay for if you decide to use it-suffers from a high piracy rate. Each year,
thousands of computer users install shareware programs and use them with no
intention of registering or paying for them.
Piracy is not a significant problem for publishers of freeware. Freeware is
software that is available free of charge and that can be copied and distributed by
anyone. Freeware publishers also restrict other persons from charging a fee for
distribution a freeware program, or including the program in a package being
sold commercially for profit. Many useful freeware programs are available, and
many can be downloaded from special Internet sites, which serve as
clearinghouses for shareware and freeware products.
1
INTRODUCTION TO COMPUTER LECTURE 18
Some software publishers allow the purchaser to install the program without a
password but require the purchaser to contact the publisher and obtain a
password within a given time period. For example, some programs can be
installed without a password but can be used only a limited number of times
before they become inoperable and must be reinstalled. To avoid this, the user
must contact the publisher, demonstrate proof of purchase, and obtain a
password for the software.
COMPUTER VIRUSES
A virus, as you may recall, is a parasitic program buried within another
legitimate program or stored in a special area of a disk called the boot sector.
Executing the legitimate program or accessing the disk activates the virus
without the user’s knowledge.
Viruses can be programmed to carry out the following tasks, as well as many
others:
Copy themselves to other programs
Display information on the screen
Destroy data files
Erase an entire hard disk
Lie dormant for a specified time or until a given condition is met and then
become active
2
INTRODUCTION TO COMPUTER LECTURE 18
Data Theft
In businesses and government, the theft of data can be far more serious than the
theft of hardware, which can be replaced fairly easily. Data theft can occur in
four ways:
1. A person with access to the computer where the data is stored can copy the
data to a diskette or to some other storage device.
2. Someone can steal the storage device or media on which the data is stored
3. Someone can steal the whole system the computer and its built in hard disk.
4. Someone can use a modem to enter an organization’s computer system, gain
access to sensitive files, and download them
3
INTRODUCTION TO COMPUTER LECTURE 18
Hackers
Hackers are experts in computer technology who take great pleasure in solving
software problems, frequently by circumventing the established rules. Often,
these experts are tempted by the power of their skills and become criminals.
They can steal money or crash computer systems intentionally.
There is no easy solution to the problem posed by computer crime. Data security
is becoming more and more sophisticated, but so are criminals. To illustrate that
point to the experts, a Dutch engineer first explained that computers emit TV-like
signals that can be reconstructed with standard equipment and displayed. Then,
to demonstrate his point, he set up his equipment in a basement and read the
data from a PC located on the eighth floor of a neighboring office building.
Protecting Networks
Most companies and government agencies use security measures to limit access
to their computer system. One common method is to provide user identification
codes and passwords to authorized employees. Before an employee can log on,
or access a computer’s files, the employee must enter a user identification code
that identifies that person to the system. Usually, employees also need to enter a
password, a word or symbol, usually chosen by the user, which verifies the
user’s identity. If a user’s identification code or password does not match the
records in the computer’s security software, the user is locked out of the system.
Passwords and user ID codes often are used to establish access privileges for
employees. These can vary be employee. For example, a network manager could
set up access so that top-level employees have access to all directories on the
network while other employees have access only to certain data.