A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.

Saturday, June 28, 2014

Software Piracy

Computer programs are valuable property and thus are the subject of theft from computer systems. However, unauthorized copying of software or software piracy is also a major form of software theft.

Piracy is robbery, an infringement of a copyright. Therefore anything that is copyrighted can be pirated and almost anything worth copywriting is worth pirating.

Small time infringement is so commonplace - taping a television show, photocopying sheet music, or recording music for a friend – that it is hard to imagine that it hurts anyone.

Software piracy takes many forms. Examples of end-user piracy include friends loaning distribution discs to each other and installing software on more computers than the license allows.

Several major cases involving the unauthorized copying of software have been widely reported.

This include lawsuit by software associations against major corporations that allowed unauthorized copying of their programs.

Loss of commercial revenue due to software pricy in 2011, worldwide estimated 58.8 billon US dollars.

This lost revenue deprives software companies of the remuneration to which they are entitled for their efforts in developing and distributing software.


Analysts believe that the internet is a major factor in piracy growth. In fact, access to high speed internet connections makes it much easier to download large software flies quickly.

In the United Sates, commercial software packages are protected by the Computer Software Piracy and Counterfeiting Amendment to the Federal Copyright Act.

In most cases, the purchase of a commercial software package is really a payment to licenses its fair use by an individual end user.
Software Piracy 

The Most Popular Posts

  • Genghis Khan, born Temujin in 1162 on the Mongolian steppes, remains one of history's most transformative figures. As the founder of the Mongol Empire, the...
  • Mangosteen juice, derived from the tropical fruit mangosteen, is renowned for its exceptional antioxidant content. Antioxidants are vital compounds that ne...
  • Secondary metabolites are an extraordinary array of organic compounds synthesized by plants that go beyond basic physiological processes like growth, dev...