Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

Buy

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver and weak CD sectors. Information on CD functioning fundamentals and tips related to CD protection in a format free of math and assembling-such as data formats, the scrambler, the Reed-Solomon coder/encoder, the CIRC coder/encoder, and a weak-sectors generator-are also provided. The main program interfaces, which provide direct control via peripheral devices on the application level in UNIX, Novell, and Windows 9x/NT/2000/XP, are considered, as is how to read and write RAW sectors.

After reading this book, readers will know how to change the format of a CD to make it accessible for reading and/or writing on most CD drives, but not accessible for copying.

Aimed at shareware and commercial software programmers, as well as users interested in CD protection, this book will help readers defeat hackers and crackers who try to copy CDs without authorization. It is targeted at advanced users as well as application system programmers.

About the Author

Kris Kaspersky is an IT consultant working in security and system programming. He specializes in issues such as compiler development, optimization techniques, security mechanism research, real-time OS kernel creation, software protection, and the creation of antivirus programs. He is the author of Hacker Disassembling Uncovered and Code Optimization: Effective Memory Usage.

(HTML tags aren't allowed.)

The Seven Secrets of How to Think Like a Rocket Scientist
The Seven Secrets of How to Think Like a Rocket Scientist

This book translates "thinking like a rocket scientist" into every day thinking so it can be used by anyone. It’s short and snappy and written by a rocket scientist. The book illustrates the methods (the 7 secrets) with anecdotes, quotations and biographical sketches of famous scientists, personal stories and insights, and...

Algorithms -- ESA 2012: 20th Annual European Symposium, Ljubljana, Slovenia, September 10-12, 2012. Proceedings
Algorithms -- ESA 2012: 20th Annual European Symposium, Ljubljana, Slovenia, September 10-12, 2012. Proceedings

This book constitutes the refereed proceedings of the 20th Annual European Symposium on Algorithms, ESA 2012, held in Ljubljana, Slovenia, in September 2012 in the context of the combined conference ALGO 2012. The 69 revised full papers presented were carefully reviewed and selected from 285 initial submissions: 56 out of 231 in track design...

Professional SQL Server Analysis Services 2005 with MDX (Programmer to Programmer)
Professional SQL Server Analysis Services 2005 with MDX (Programmer to Programmer)
SQL Server Analysis Services 2005 provides you with the business intelligence platform needed to build full-scale, multidimensional databases. MDX is the query language used to extract information from those multidimensional databases. Analysis Services 2005 supports core business functions such as market analysis, budgeting and...

Learn Swift on the Mac: For OS X and iOS
Learn Swift on the Mac: For OS X and iOS

There's a new language in town. Swift is Apple's new, native, fast, and easy to learn programming language for iOS and OS X app development. It's their "Objective-C without the C". If you are an iOS developer or planning to become one, learning Swift is your #1 priority, and Learn Swift on the Mac tells you...

Google Hacking for Penetration Testers, Volume 2
Google Hacking for Penetration Testers, Volume 2
A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen it with my own eyes. As the founder of the Google...
Optimizing and Troubleshooting Hyper-V Networking
Optimizing and Troubleshooting Hyper-V Networking

This scenario-focused title provides concise technical guidance and insights for troubleshooting and optimizing networking with Hyper-V. Written by experienced virtualization professionals, this little book packs a lot of value into a few pages, offering a lean read with lots of real-world insights and best practices for Hyper-V...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy