Author Information
Zenolite has 3 Published Articles

Canada,
MA,
Middleton,
Gogreencompare.com Ltd,
Ground Floor, Hampton House, Oldham Road,



The Software You Developed Was Pirated, How And What To Do Next

Posted On : Oct-04-2010 | seen (290) times | Article Word Count : 456 |

The Reprise License Manager (RLM) drives revenue for Independent Software Vendors (ISVs) by protecting rights to software. RLM is a flexible and simple license manager with the power to serve enterprise users, and it comes to you from the creators of FLEXlm
Software piracy just doesn't come in one form anymore. It comes in many different ways. Unbeknownst to most software developers, piracy hurts you in more ways than just revenue. It can also tarnish your brand. There are some unsuspecting victims who may not know they're using software without the proper license. Therefore, they may believe that the bugs or limitations are due to your software's inefficiency than due to some invisible hacker that at some point sold or downloaded an old or modified version of your darlingproduct. Before we can even begin talk about some ways of preventing your software license from being exploited illegally, we should talk about the types of ways in which your software can be used.

END USER PIRACY

End users tend to use what is normally called a "cracked" version of software. Typically, when badly licensed management software gives a trial version, hackers can disable the key codes to unlock it creating a lesser version of the real version. This also happens when someone purchases software and then distributes the software to others or other computer systems that they own. This seems harmless; however if the software package doesn't allow for that, then this can lead to lost revenues as well as inefficiencies of service and quality.

RESELLER COUNTERFEITING

This is the most egregious version of software piracy, because the hackers or counterfeiters knowingly and willingly duplicate illicit versions for personal or monetary gain. Reseller piracy indicators tend to show multiple users with identical serial numbers, no legitimate documentations, etc.

INTERNET PIRACY

One of the most common forms of piracy around stems from Internet usage. The Internet is rife with people utilizing torrents or file sharing methods to obtain pirated copies of software. Torrents (file sharing) accounts to anywhere from 27-55% of all Internet traffic. There are many legal ways to use torrents, however it becomes a problem for you when people use torrents for illegal means.

PREVENTION AND REPORTING

To ensure the best possible protection from software hackers and pirates capitalizing on your software and ideas is to make sure that you have a proper license management company in place. This company should have a great track history of protecting licenses and revenues for its clients.

Since software counterfeiting is such a serious crime, there are ways in which you can report perpetrators confidentially. Through a well-respected watchdog organization such as the Business Software Alliance (BSA), you also may be eligible for a monetary award up to 1 million dollars.

For more information on software protection, visit reprisesoftware.com

Article Source : http://www.articleseen.com/Article_The Software You Developed Was Pirated, How And What To Do Next_35989.aspx

Author Resource :
I am Guru. As a freelancer I am writing articles for various clients around the world. For more information on software protection, visit www.reprisesoftware.com

Keywords : reprise software, reprise, reprise license manager, linux license manager, network license manager, replacement license manag,

Category : Computers : Software

Bookmark and Share Print this Article Send to Friend