You are on page 1of 11

Chapter I

The Problem and Its scope

1.1 Introduction

In our present day, technology made a rampant significance from doing things easily.
Through the help of technologies, society can easily perform well on their works. On the other
hand, computer literate individuals are also increasing, from professionals to beginner and made
benchmark on making their own systems and programs. That is why some computer literate
individuals can easily get what they want, like for some users that prefer to download crack
software instead of original copies because they can easily achieve certain software from
different websites on the internet that provide crack software without paying. While on the
original copy you have to spend more money to get the certain software or program.

Software cracking are known for the computer literate individuals, it’s a way of copying
the use of commercial software It can be downloaded by everyone who commonly uses
computer in a torrent sites that provides crack software that was cracked by professional
programmer who cracked the commercial software.

Downloading crack software may have a risk, viruses and computer malware are the
common example. It may bring error or malware to your phone and computer and may
possibility destroyed your computer.

Another approach that may bring by downloading crack software is copyright


infringement that if you steal something without paying, you are allegedly considering a theft.
Piracy is illegal and that is why many users secretly download the certain program that they
want.

The scope of this study may take place in Iligan Medical Center College Basic Education
Department and with the respondents of Grade 11 and Grade 12. To know how safe or dangerous
the crack software and how sure they are when they downloaded crack software.
1.2 Statement of the Problem

This study aims to delineate the credibility of crack softawre to grade 12 stuents of Iligan
Medical Center College Basic Education Department (IMCC-BED) and in percentage
considering that it is now rampant nowadays to download crack software or software, compared
to the commercial copy.

This study, also seeks to answer the following question:

1. How many students prefer to download crack software rather than getting its original
copy?

2. In what percent do the crack software bring malware error or virus to your phone or
computer?

3. How many students know crack software is illegal?

1.3 Significance of the Study

Downloading the original copy is sometimes expensive for students to buy, and we want
to fully understand how the crack software credible to the respondents who download crack
software.

This study will help explicate how the crack software have credible approach to the one
who download even though it’s illegal and also to know in what percent does the cracks software
may possibility bring, such as viruses and malware error.

1.4 Scope and Delimition

This study focuses on the credibility of the crack software among the grade 12 students
and the percentage, from each strand within Iligan Medical Center College Basic Education
Department (IMCC-BED) by using stratified method to determine the number of students to be
included in the data (through surveys) , in total of 30 respondents. The researchers want to know
the credibiity of crack software to the grade 12 students and measured through percentage.

1.5 Hypothesis

H1 The presence of crack software have a significant effect to the students of grade 12 in
Iligan Medical Center College Basic Education Department.

1.6 Conceptual Framework

Credibility of Downloading Crack Software

Independent Dependent
Variable Variable

Credibility Trusted
Not trusted
Positve
Negative

1.7 Theoretical Framework


According to the theory of (Liu, 2012) from the book Software Engineering and
Knowledge Engineering: Theory and Practice, the software cracking is the key technology for
the business software. Many shareware is cracked form developing normally. This paper
introduces some software protection methods about some aspects such as dongle, license key,
license file, network verification. And some protection technology is analyzed and it includes
anti-debugging, anti-memory dumping, software packers, junk code, virtual machine, and
software watermark. The encryption method and verification method used in the software
protection are introduced. The encryption often used in the software protection includes
RSA,DES,AES,RC,Blowfish. The verification method used in software protection is the MD5
and SHA.Finally, some architectures of protection are provided and they can increase the
difficulty of crack. The license key is the basic module of shareware and it often be studied by
the cracker firstly. The key data in the software can be encrypted by RSA and DES with the key
which is the result of MD5 of EXE file of DLL file. So the cracker can`t modify the EXE file or
DLL file and it will lead the application can`t produce correct result.

1.8 Definition of Terms

Computer Literate- having sufficient knowledge and skill to be able to use computers; familiar
with the operation of computers.

Crack Software- Software cracking is the modification of software to remove or disable features
which are considered undesirable by the person cracking the software, especially copy protection
features or software annoyances like nag screens and adware.

Credibility- the quality of being trusted and believed in.

Computer Program- is a collection of instructions that performs a specific task when executed
by a computer.

Computer System consists of hardware components that have been carefully chosen so that they
work well together and software components or programs that run in the computer.

Donwload- an act or process of downloading data.

Malware- malicious software, is a blanket term for any kind of computer software with
malicious intent. Most online threats are some form of malware.

Software- the programs and other operating information used by a computer.

Virus- a piece of code which is capable of copying itself and typically has a detrimental effect,
such as corrupting the system or destroying data.
Chapter II

Review of Related Literature

2.1 Foreign Literature

According to (Evans, 2019), that from year to year, the evolution of technology is one of
staggering promise and opportunity – as well as uncertainty. The future may be unknown, but
digital advancement continues to reshape our world in ways that encourage people to form new
habits, find new ways to work together, and become better human beings. And, in most cases,
these changes translate into a range of opportunities and disruptions across every industry.

The latest study by( Miniwatts Marketing Group, 2019) reveals that the Internet is
defined as the worldwide interconnection of individual networks operated by government,
industry, academia, and private parties. Originally the Internet served to interconnect laboratories
engaged in government research, and since 1994 it has been expanded to serve millions of users
and a multitude of purposes in all parts of the world.

In a matter of very few years, the Internet consolidated itself as a very powerful platform
that has changed forever the way we do business, and the way we communicate. The Internet, as
no other communication medium, has given an International or, if you prefer, a "Globalized"
dimension to the world. Internet has become the Universal source of information for millions of
people, at home, at school, and at work.

Internet is changing all the time. Two things, in our opinion, have marked it's evolution
recently: the social web and mobile technology. These two innovations have changed the way
people use the Internet. In the social web people have found a new way to communicate. Since
its creation in year 2004, Facebook has grown into a worldwide network of over 2,230 million
active users. Mobile technology, on the other hand, has made possible a much greater reach of
the Internet, increasing the number of Internet users everywhere.

The Internet continues to be the most democratic of all the mass media. With a very low
investment, anyone can have a web page in Internet. This way, almost any business can reach a
very large market, directly, fast and economically, no matter the size or location of the business.
With a very low investment, almost anybody that can read and write can have access and a
presence in the World Wide Web. Blogging has consolidated the social media and the people
everywhere are expressing and publishing their ideas and opinions like never before.

According to (Avast, 2016). while hacking is the process of bypassing computer


safeguards in order to gain access to them – which can either be good or bad – cracking
specifically refers to the same practice, but with criminal intent. The general opinion is that
hackers build, while crackers break. In particular, crackers engage in such unruly practices as
stealing credit card numbers, deploying viruses, destroying files or collecting personal data to
then sell.

Recognizing the crack files, whether or not it's possible to recognize cracking depends on
what’s being cracked. For example, software companies likely won’t know if someone has
cracked their software. Likewise, students using the public Wi-Fi at the corner café won’t know
if someone has cracked the Wi-Fi network and is capturing their vulnerable data, such as banking
info or passwords. That said, it might be obvious that your computer has been cracked if your
friends and colleagues start getting phishing emails from your email address.

As stated by (Modern Trends, 2018) Cracked software’s are free and easy to download
from the web with so many crackers seriously sitting for a long time in front of a computer just
in order to crack a protected software. With so many students using laptops and computers, it is
rather difficult for them to buy softwares that are costlier than their budget. There are a lot of
freewares out there, but most of them are designed for Linux and the rest of them have limited
functionality. When we literally want a software very badly we need to buy it and I have a very
strong reason for supporting this claim.

If you are a businessman you can never afford to download a cracked software. Cracked
softwares are softwares obtained by reversing the one written by the original developer. There
are many things which run behind the scene when you are installing a cracked software. If you
have downloaded your software from a torrent site, be sure that your computer is under the risk
of being attacked by a malicious program.

2.2 Local Study

A research study by (Ventayen & Ventayen, 2018)from Pangasinan Universtiy that based
on the result of the survey, 80% of the respondents practice piracy because they can't afford the
content. Followed by 48.3% with the reason that the respondents don’t like to pay for it. 35% of
the respondents find it hard to purchase, and 21.7% says that “others are doing it too.” It shows
that the main reason for piracy is the respondents cannot afford original content and doesn’t want
to invest money in the content. The result of the study implies that the estimated losses for the
software industry are approaching more than $60 billion , thus the main reason why software
industry failed to earn money is because the users doesn’t want to spend for the content, in this
regard, the only way to avoid losses is to fight piracy.

Chapter 3

Methodology

In this chapter it presents the methods that the study used. It also describes the subjects
of the study, the instruments to be used, the procedure that the researcher used in data
gathering. This was conducted in order to know the credibility of a crack software among
grade 12 students in Iligan Medical Center College Basic Education Department.
3.1 Research Design

The methodology gives directly the research question which is to gather information and
to identify those individuals who downloaded crack software on the internet.

The researchers used Quantitative analysis. Quantitative analysis was used in order to
validate the gathered information through survey as a reference in gaining accurate information,
a series of steps, according to a pre-specified plan of action.

3.2 Research Instrument


To answer the research questions of this study, the researchers used the quantitative
analysis in analyzing the data. During the whole duration of the data gathering and analysis, the
researchers:

1. Identify respondent’s strand.

2. Present the factors of the credibility in downloading crack software.

3. Conduct a survey to selected individual.

4. Identify some alternative ways to prevent the possible approach of crack software to the
students.

3.3 Respondents of the study

There are 40 respondents of the study. The respondents of this study were identified as
enrolled grade 12 senior high school students at Iligan Medical Center College Basic Education
Department who are a computer literate individual.
3.4 Gathering of Data

The researchers used stratified sampling in categorizing the grade 12 respondents in


Iligan Medical Center College Basic Education Department considering their credibility of
downloading software.

3.5 Data Analysis Procedure

In analyzing the data gathered, the researcher will:


First, the researcher will gathered all the information through illustrations showing all the
response of the respondents.
Second, the researcher will analyze and measure respondents response to the questions
given by the researcher through survey.
Lastly, the researcher will use this to answer the problem in the research.

You might also like