IT 231: IT and Application
By the end of this chapter, you will be able to:
Software piracy is the unauthorized copying, distribution, or use of copyrighted software.
It's a form of copyright infringement.
Think of it like photocopying an entire book instead of buying it.
⚡ When you purchase commercial software, you are not buying the software itself. You are buying a license to use it under specific terms and conditions.
Installing a single-user license on multiple computers.
Example: Buying one copy of Microsoft Office and installing it on all the computers in your office.
Illegally duplicating and selling copyrighted software in a form that appears to be legitimate.
Example: Burning copies of Adobe Photoshop onto discs with fake packaging.
Downloading commercial software from unauthorized websites, torrents, or file-sharing services.
Selling standalone software that was originally intended to be bundled with specific hardware.
Software companies use various technologies to protect their intellectual property and ensure users comply with licensing terms.
Let's explore the most common methods.
A unique string of characters (e.g., `A1B2C-3D4E5-F6G7H-8I9J0`) required to activate and use the software.
Pro: Simple for the user.
Con: Keys can be stolen or generated by "keygens".
A physical hardware device (usually USB) that must be plugged into the computer for the software to run.
Pro: Very secure; hard to duplicate.
Con: Can be lost, stolen, or broken; inconvenient.
A broad set of technologies that control access to digital content, often requiring online verification.
Pro: Flexible and powerful control.
Con: Can be restrictive and intrusive for legitimate users.
Many small businesses and educational institutions in Nepal have historically used non-genuine copies of software like Windows OS and Microsoft Office due to high costs and lack of awareness.
A quick summary of what we've learned:
Any questions?
Next Topic: Unit 9.5 - Open Source Software