MODERN METHODS OF HACKING AND PROTECTION SOFTWARE
DOI:
https://doi.org/10.54309/IJICT.2021.06.2.004Keywords:
hacking, cyber protection, license, software development, data protection methods, software market analysisAbstract
The article delineates the main differences between a licensed product and a counterfeit copy, also analyzes the ways and methods of protecting the product. Additionally, it presents a list of tools with brief descriptions used by crackers (hackers) to crack programs and some of the basic methods of hacking a product. The research hinges on the statistics on the use of pirated products among the CIS countries provided by BSA (Business Software Alliance), set up in 1988, which represents the interests of the world's largest software developers and fights against copyright infringement on the software created by its members. As a result, the study presents some comments on the nature of the analyzed software protection products and suggests recommendations on their use.
Downloads
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 International Journal of Information and Communication Technologies
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
https://creativecommons.org/licenses/by-nc-nd/3.0/deed.en