How can a PC or game console tell that a disc is a copy?

tswayne

When someone tries to use a copied disc, how can a PC or game console tell that it is a copy instead of an original (legitimate) disc?

Topic: Security
Answer this Question

Answers

1 total
jimlynch
Vote Up (11)

This article might be of interest to you.

http://en.wikipedia.org/wiki/Copy_protection

"Copy protection, also known as content protection, copy obstruction, copy prevention and copy restriction, is any effort designed to prevent the reproduction of software, films, music, and other media, usually for copyright reasons.[1] Various methods have been devised to prevent reproduction so that companies will gain benefit from each users who obtain a copy of their product. Unauthorized copying and distribution accounted for $2.4 billion in United States in 1990s,[2] and is assumed to be causing impact on revenues in music or game industry, leading to proposal of anti-piracy laws such as PIPA. Some methods of copy protection have also led to criticisms because it caused inconvenience for honest users or secretly installed additional software to watch activity on user's computer to detect copying. Effective copy protection as well as protecting user rights is still an ongoing problem with media publication."

Ask a question

Join Now or Sign In to ask a question.
IBM has added to its security software portfolio with the purchase of Italian access control and identity management firm CrossIdeas for an undisclosed sum, the companies said Thursday.
A group of attackers with links to the Chinese hacking underground has been targeting companies from the entertainment and video game industries for years with the goal of stealing source code.
After years of cajoling their users into sharing every thought, emotion and selfie, online firms are seeing that providing more private online spaces might also be profitable.
Linux’s creator goes on another epic rant
A zero-day flaw in a software driver in Symantec's widely used Endpoint Protection product may be tricky to fix.
A security audit of 10 popular Internet-connected devices -- components of the so-called "Internet of things" -- identified an alarmingly high number of vulnerabilities.
It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.
The secure mobile vendor wants to be more secure.BlackBerry plans to buy a German vendor specializing in voice encryption.
The EU court ruling that gives people the "right to be forgotten" by search engines is misguided in principle and unworkable in practice, said a U.K. House of Lords subcommittee Wednesday.
An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.