To serve up, and protect

Frankel, Daniel
October 2003
Daily Variety;10/29/2003, Vol. 281 Issue 18, Award Season Launch. pA8
Trade Publication
Focuses on the problem of the film industry with piracy in the U.S. Proliferation of digital video disc burners; Availability of software that allows users to quickly strip away encryption; Technologies under development to protect movies being illegally copied.


Related Articles

  • Watermarking, Tamper-Proofing, and Obfuscation -- Tools for Software Protection. Collberg, Christian S.; Thomborson, Clark // IEEE Transactions on Software Engineering;Aug2002, Vol. 28 Issue 8, p735 

    We identify three types of attack on the intellectual property contained in software and three corresponding technical defenses. A defense against reverse engineering is obfuscation, a process that renders software unintelligible but still functional. A defense against software piracy is...

  • Replacement attacks: automatically evading behavior-based software birthmark. Xin, Zhi; Chen, Huiyu; Wang, Xinche; Liu, Peng; Zhu, Sencun; Mao, Bing; Xie, Li // International Journal of Information Security;Oct2012, Vol. 11 Issue 5, p293 

    Software birthmarks utilize certain specific program characteristics to validate the origin of software, so it can be applied to detect software piracy. One state-of-the-art technology on software birthmark adopts dynamic system call dependence graphs as the unique signature of a program, which...

  • Loss leaders.  // Sight & Sound;Nov2003, Vol. 13 Issue 11, p3 

    Editorial. Comments on the film industry in the United States. Paranoia about film piracy; Growth in DVD sales; Uncertainty about film quality.

  • International deployment of digital cinema. Power, Jason // Cinema Technology;Sep2006 Supplement, Vol. 19, p21 

    The article deals with solutions that need to be implemented upon the worldwide deployment of digital cinema. The importance of digital cinema system standardization to the success of deployment is discussed. Security issues of digital content including piracy, encryption and the Digital Cinema...

  • Protecting MP3s. Blau, John // Macworld;May2006, Vol. 23 Issue 5, p23 

    The article presents information on the software system developed by the German research group Fraunhofer Institute to battle online music piracy. Songs purchased from the iTunes Music Store come in a protected format that restricts what purchasers can do with them. MP3 files, on the other hand,...

  • How to beat piracy. Rees, Glenn // Australian PC User;May2007, Vol. 19 Issue 5, p8 

    The author addresses the issue of piracy. He believes that film studios, computer software companies and other copyright owners should accept the fact that they will never beat piracy. He relates the piracy problems of Sony and Microsoft. He emphasizes the need to give consumers an easy and...

  • CRYPTO HEADACHE. Rodger, Will // Interactive Week;2/12/2001, Vol. 8 Issue 6, p17 

    Focuses on the challenges faced by computer software companies in exporting encryption products. Information on the export rules for encryption software; How developers can gain approval in exporting encryption software.

  • Eze Castle Consulting unveils real-time chat software. Dabaie, Michael; Stirland, Sarah; Forman, Michael; Burger, Andrew // Securities Industry News;07/12/99, Vol. 11 Issue 27, p11 

    Features Eze Castle Consulting's Ez-Exchange encrypted chat software.

  • First cross-certification package on tap.  // PC Week;03/24/97, Vol. 14 Issue 12, p3 

    Informs that Xcert Software plans to create the first cross-authentication between different certificate authorities. The use of Lightweight Directory Access Protocol (LDAP); The need for Xcert's Sentry CA to be installed at both sites.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics