• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Software Piracy.

Extracts from this document...


Software Piracy When you buy software, be it a computer game or the newest Windows operating system that you know will not work when you install it, the assumption is that you now own that copy of the software and can do as you please. Unfortunately, that is not the case. You do not buy that copy of the program but you buy the license to use that program. That license gives you the right to use the program either on one computer that has many users or just to yourself as the user, which could mean that you have many computers on which to install the program. As a licensed user, you can make copies of the software as a backup for yourself, but you would cross the line if someone other than yourself (e.g. a friend) used the software that you own the license to on his computer. That includes copies such as the backup that you might have stored for emergencies. Any breach of the license is piracy and is therefore against the law. "Basically, the 1988 Data Protection and Copyright Act states that it is legal to copy data you own for your own use. ...read more.


The lack of people however did attract tourists to the unlicensed version. Napster is the most famous case of piracy. It used Peer-to-Peer (P2P) file-sharing software to allow users to download music files from other computers that use the program to their own hard drive. The company eventually had to close down the Napster network after the band Metallica brought the case to court. Dr. Dre was also involved with the lawsuits. The main reason for the lawsuits against Napster was the fact that for every copy made that was not bought in the shops, the people involved in the production of that record would not get the money that is owed to them for that particular 'sale'. Games companies were possibly the first to really feel its effects, and with games now being sold on compact discs (CDs) and Digital Versatile Players (DVDs), the opportunities to copy the games onto the blank discs widely available seem endless. Sega of America lost $3.2 billion in 1998, US game publishers lost more than $1.9 billion in 2001 (minus the losses in US, Canada, and Western Europe, the main 3 territories besides Japan), the figure was $3 billion in 2000. ...read more.


New problems arose when Sony brought out its PlayStation. As CD's are the same size all over the world, the only thing that needed to be bypassed was the region restrictions that were written onto the disc. This was easily combated with Mod chips. These can be soldered onto the motherboard to trick the console into believing that every CD put into it is from the correct region. Doing this also eliminated the check for the authenticity of the CD, therefore copied games could be used in the console. Copied games were easy to come by using the CD-writers that were now commercially available. In conclusion, the only ways to really reduce piracy is to either make it financially infeasible or encourage consumers to buy the licensed product. Nintendo used the first route when they brought out their NES and SNES. They turned down Sony's proposal of a CD based add-on to the SNES, and they seemed to have dine the right thing as that add-on became the PlayStation. The cartridge trend continued to their N64, and now they have changed medium again to a mini CD for their GameCube. The mini CD is a new medium that is hard to produce to the right specifics and piracy will be less of an issue for the company. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Hardware section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Hardware essays

  1. Peer reviewed

    Hardware and Software -IT

    5 star(s)

    Microsoft Excel is slightly easier to use than the alternative Lotus 123 and has more features. It is also more widely used so that the council workers may already be familiar with it. The Excel 2010 software will be easier for the staff at JJ Party Planner to use because

  2. Computer Hardware, uses, advantages and disadvantages.

    A way to check this is by after you made this hyper link then always double check the link; also you can install software where it tells you where the link leads to. Validation is not done properly. The effects of this is that when the customer goes on the

  1. Choosing the best harware for my system.

    Paint can be used by anyone even children. Another disadvantage is that people might think that paint is not suitable for them due to its childishness. Paint already comes with the computer. Also It is slow to use and the file document for paint looks too childish and also pictures cannot be uploaded on database.

  2. Free essay

    Unit 3 Course Work

    If a piece of code in the file matches any virus identified in the dictionary, then the antivirus software can take one of the following actions: * Attempt to repair the file by removing the virus itself from the file; quarantine the file (such that the file remains inaccessible to other programs and its virus can no longer spread)

  1. Hardware Choices and Operating System.

    The only difference is the design of it and the capacity in it. More data can be stored on to it. The more amount of memory you want the more expensive the memory card will be. Not a lot of difference will be made.

  2. What is Software Piracy?

    * Anonymity and Personal Privacy: Pirating software can be committed without going out of the house, or even interacting with any person. Thus, it is very tempting to commit this "victimless" crime. A major issue is the anonymity we have when we do not need to subscribe with our real

  1. Hardware & Software - User Requirements of Burgers away.

    A keyboard will be essential for Sarah as it is a key instrument for entering data into the computer, such as sales figures, and I believe that she will only need a standard design. Mouse A mouse is a pointing device that enables the user to control the movement and

  2. Unit 14 Mobile communication technology

    information from the internet changing it to a radio signal and sending it to the computers network adapter. GSM GSM is the most widely used cell phone technology it uses a SIM card which makes it easier to change phones while keeping the same number.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work