Essays24.com - Term Papers and Free Essays
Search

Copy Protection And The Drm

Essay by   •  November 19, 2010  •  1,002 Words (5 Pages)  •  1,107 Views

Essay Preview: Copy Protection And The Drm

Report this essay
Page 1 of 5

Piracy of digital information today is a huge problem. However, an even bigger problem is the way that the government and private companies react to it. Private companies make the problem even worse by making over-protective software secutiy systems that also limit our freedom. The government even takes these laws so seriously as to arrest innocent people. Piracy itself is a problem, but even worse is the way it is being handled.

Software piracy leads to many companies becoming over-protective about their software and they hire companies like SecuROM, Sony BMG and Starforce. Both companies produce software protection programs and encryptions which sometimes cause problems for the honest user who actually purchased the software. They sometimes go as far as to invade your own privacy by installing surveillance software without you knowing about it. This software is called a rootkit and any common anti-virus program would detect it. It is a program which can prevent you from removing it and can perform various functions, such as preventing you from installing certain software. It is a total invasion of privacy and the companies that have tried this method of copy protection have failed and have been severely legally penalized. Also many clueless teens have gotten in trouble with the law. A 19-year-old girl wanted to videotape a short clip of the movie "Transformers" for her little brother. She pulled out her digital camera and recorded a 20 second clip. She faces up to a year in jail time. This woman was also an immigrant and was completely unaware of such ridiculous laws. It is sickening that our government and private companies like the Motion Picture Association of America are taking extreme levels of "zero tolerance" policies, when the awareness of such laws is not very well known in the first place.

There are many methods of piracy. The most common method of software piracy is Bittorrent. Bittorrent is a peer to peer network consisting of hosts which share data through a medium called a tracker, which other peers can connect to and download from. Bittorrent is initiated through certain clients such as Bitcomet, µTorrent, and Azureus. Gnutella network sharing is another method of piracy where users connect to each other in a mesh network and share data between users, the most common use of this would be to pirate music and sometimes movies or software. Popular Gnutella clients are Limewire, Kazaa, Bearshare , Imesh and DC++. I don't mind it myself when people use these programs to "try out" software and music, but it starts to be a problem when people do it just because they don't want to pay for what they are downloading, that is completely wrong because digital goods are no different than physical goods. When people don't give support to the artists and programmers, they don't have enough funds to make a living or make new products. I recently downloaded Radiohead's new album "In Rainbows", for free off of their website. Their website allows you to choose what price you are willing to pay to download their new album, in a new social-experiment where they allow people to make a decision on what they feel like paying for the album. I listened to it, I liked it and I went back and downloaded it again for $5 because that is what I thought it was worth. That is how I think digital goods should be purchased.

...

...

Download as:   txt (5.6 Kb)   pdf (83.8 Kb)   docx (10.6 Kb)  
Continue for 4 more pages »
Only available on Essays24.com
Citation Generator

(2010, 11). Copy Protection And The Drm. Essays24.com. Retrieved 11, 2010, from https://www.essays24.com/essay/Copy-Protection-And-The-Drm/12666.html

"Copy Protection And The Drm" Essays24.com. 11 2010. 2010. 11 2010 <https://www.essays24.com/essay/Copy-Protection-And-The-Drm/12666.html>.

"Copy Protection And The Drm." Essays24.com. Essays24.com, 11 2010. Web. 11 2010. <https://www.essays24.com/essay/Copy-Protection-And-The-Drm/12666.html>.

"Copy Protection And The Drm." Essays24.com. 11, 2010. Accessed 11, 2010. https://www.essays24.com/essay/Copy-Protection-And-The-Drm/12666.html.