摘要 |
<p num="1"><br/><br/>Theft, distribution, and piracy of digital content (software, video, audio, <br/>ebooks, any content of any kind that is <br/>digitally stored and distributed) is generally accomplished by copying it, if <br/>possible, or, if it is protected from being copied in any <br/>fashion, such piracy is based upon a number of reverse engineering techniques. <br/>Aside from the straightforward copying of <br/>unprotected content, all of these other methods require fist an understanding <br/>of the protective mechanism(s) guarding the content, and <br/>finally and unauthorized modification of that protection i order to disable or <br/>subvert it. Methods which prevent a skilled individual <br/>from using reverse engineering tools and techniques to attain that level of <br/>understanding and/or prevent anyone from performing <br/>such modifications can offer significant advantages to content creators who <br/>whish to protect their products.<br/>
|