[go: nahoru, domu]

Software cracking: Difference between revisions

Content deleted Content added
No edit summary
Tag: Reverted
m It is necessary defination of Software Cracking.
Tags: Reverted Visual edit
Line 1:
{{Short description|Modification of software, often to use it for free}}
[[Software Cracking view data]]{{Use American English|date = February 2019}}
{{Use mdy dates|date = February 2019}}
{{multiple issues|
Line 7:
}}
 
'''Software cracking''' (known as "breaking" mostly in the 1980s<ref name="kevelson198510">{{cite news | url=https://archive.org/stream/Ahoy_Issue_22_1985-10_Ion_International_US#page/n71/mode/2up |title=Isepic |work=Ahoy! |date=October 1985 |access-date=27 June 2014 |first=Morton |last=Kevelson |pages=71–73 |quote=The origin of the term probably lies in the activity burglars in the still of the night.}}</ref>) is an act of removing [[copy protection]] from a software.<ref name="Goode 2006"/> Copy protection can be removed by applying a specific ''crack''. A ''crack'' can mean any tool that enables breaking software protection, a stolen product key, or guessed password. Cracking software generally involves circumventing licensing and usage restrictions on commercial software by illegal methods. These methods can include modifying code directly through disassembling and bit editing, sharing stolen product keys, or developing software to generate activation keys. The term “cracking” means trying to get into computer systems in order to steal, corrupt, or illegitimately [[Software Cracking View data.|view data.]] <ref>{{cite book|last1=Tulloch|first1=Mitch|title=Microsoft Encyclopedia of Security|date=2003|publisher=Microsoft Press|location=Redmond, Washington|isbn=0735618771|page=68|url=http://examples.oreilly.de/english_examples/9780735622180/cd_contents/Encyclopedia/EncySecur.pdf|access-date=July 20, 2014|archive-date=August 10, 2014|archive-url=https://web.archive.org/web/20140810105820/http://examples.oreilly.de/english_examples/9780735622180/cd_contents/Encyclopedia/EncySecur.pdf|url-status=dead}}</ref> Examples of ''crack''s are: applying a ''[[patch (computing)|patch]]'' or by creating reverse-engineered serial number generators known as ''[[keygen]]s'', thus bypassing software registration and payments or converting a trial/demo version of the software into fully-functioning software without paying for it.<ref name="Kammerstetter 2012">{{Cite book |last1=Kammerstetter |first1=Markus |last2=Platzer |first2=Christian |last3=Wondracek |first3=Gilbert |title=Proceedings of the 2012 ACM conference on Computer and communications security |chapter=Vanity, cracks and malware |date=2012-10-16 |chapter-url=https://dl.acm.org/doi/10.1145/2382196.2382282 |language=en |location=Raleigh North Carolina USA |publisher=ACM |pages=809–820 |doi=10.1145/2382196.2382282 |isbn=978-1-4503-1651-4|s2cid=3423843 }}</ref> Software cracking contributes to the rise of [[online piracy]] where pirated software is distributed to end-users<ref name="Goode 2006"/> through filesharing sites like [[BitTorrent]], [[File hosting service#One-click hosting|One click hosting]] (OCH), or via [[Usenet]] downloads, or by downloading bundles of the original software with cracks or keygens.<ref name="Kammerstetter 2012"/>
 
Some of these tools are called [[keygen]], [[Patch (computing)|patch]], [[Loader (computing)|loader]], or [[no-disc crack]]. A keygen is a handmade product serial number generator that often offers the ability to generate working serial numbers in your own name. A patch is a small computer program that modifies the machine code of another program. This has the advantage for a cracker to not include a large executable in a release when only a few bytes are changed.<ref name=Craig2005>{{cite book |last1=Craig |first1=Paul |last2=Ron |first2=Mark |editor1-first=Mark |editor1-last=Burnett |others=Publisher: Andrew Williams, Page Layout and Art: Patricia Lupien, Acquisitions Editor: Jaime Quigley, Copy Editor: Judy Eby, Technical Editor: Mark Burnett, Indexer: Nara Wood, Cover Designer: Michael Kavish |title=Software Piracy Exposed - Secrets from the Dark Side Revealed |date=April 2005 |publisher=Syngress Publishing |location=United States of America |isbn=1-932266-98-4 |doi=10.1016/B978-193226698-6/50029-5 |pages=[https://archive.org/details/softwarepiracyex0000crai/page/75 75–76] |chapter=Chapter 4: Crackers |chapter-url=https://archive.org/details/softwarepiracyex0000crai/page/75 }}</ref> A loader modifies the startup flow of a program and does not remove the protection but circumvents it.<ref name="flt-flow" /><ref name="cbm-loaders">{{cite journal|author1=Shub-Nigurrath [ARTeam]|author2=ThunderPwr [ARTeam]|date=January 2006|title=Cracking with Loaders: Theory, General Approach, and a Framework|journal=CodeBreakers Magazine|publisher=Universitas-Virtualis Research Project|volume=1|issue=1|quote=A loader is a program able to load in memory and running another program.}}<!-- http://www.codebreakers-journal.com -->