Warez
Warez are copyrighted works distributed without fees or royalties, and may be traded, in general violation of copyright law. Warez are generally unauthorized releases by organized groups, as opposed t...
Warez - Wikipedia
Warez scene
The Warez scene, often referred to as The Scene, is an underground community of people that specialize in the distribution of copyrighted material, including television shows and series, movies, music...
Pirated movie release types
With regard to warez groups or organized piracy groups, a movie is usually released in several formats and different versions because the primary sources used by a group for a particular movie may var...
Standard (warez)
Standards in the warez scene are defined by groups of people who have been involved in its activities for several years and have established connections to large groups. These people form a committee,...
Copyright infringement
Copyright infringement is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribut...
Copyright infringement - Wikipedia
Copyright enforcement
Copyright is a legal right created by the law of a country that grants the creator of an original work exclusive rights to its use and distribution, usually for a limited time, with the intention of e...
Warez group
A warez group is a more or less tightly organised group of people involved in creating and/or distributing warez such as movies, music or software ("warez") in The Scene. There are different types of ...
Warez group - Wikipedia
Rob Northen copylock
Rob Northen Copylock is a copy-protection system to prevent disk duplication with standard floppy disk drives on the Amiga, Atari ST and PC DOS platforms. It was used mainly to copy-protect games from...
VirtualDrive Pro
VirtualDrive Pro is a disk emulator and optical disc authoring software product developed by FarStone Technology. This program runs on Microsoft Windows and creates up to 23 virtual drives on the user...
BBS: The Documentary
BBS: The Documentary (commonly referred to as BBS Documentary) is a 3-disc, 8-episode documentary about the subculture born from the creation of the bulletin board system (BBS) filmed by computer his...
BBS: The Documentary - Wikipedia
International Network of Crackers
International Network of Crackers (INC) was one of the premier cracking/releasing warez groups for the IBM PC during the late 1980s and early 1990s.The formation of INC was the result of the merger of...
Myth (warez)
Myth was a warez group, focused on cracking and ripping PC games. Besides ripped games, the group also released trainers and cracked updates for games.
Myth was formed in February 2000, in a merge...
Myth (warez) - Wikipedia
List of movies and television shows released on UMD
This is a non-complete list of films and television shows released on Universal Media Disc (UMD) format for the PlayStation Portable (PSP).
List of movies and television shows released on UMD - Wikipedia
Broadcast encryption
Broadcast encryption is the cryptographic problem of delivering encrypted content (e.g. TV programs or data on DVDs) over a broadcast channel in such a way that only qualified users (e.g. subscribers ...
FILE ID.DIZ
FILE_ID.DIZ is a plain text file containing a brief contentdescription of the archive in which it is included.It was originally used in archives distributed through bulletin board systems (BBS).Bullet...
FILE ID.DIZ - Wikipedia
Software protection dongle
A software protection dongle (commonly known as a dongle or key) is an electronic copy protection and content protection device which, when attached to a computer or other electronic appliance, unlock...
Software protection dongle - Wikipedia
Crack intro
A crack intro, also known as a cracktro, loader, or just intro, is a small introduction sequence added to cracked software, designed to inform the user of which "cracking crew" or individual cracker w...
Crack intro - Wikipedia
List of US Congresspersons who support or oppose SOPA/PIPA
The Stop Online Piracy Act (SOPA) and the PROTECT IP Act (PIPA) are two proposed draft laws that are being considered by the United States Congress. Their stated goals are to increase the ability of U...
List of US Congresspersons who support or oppose SOPA/PIPA - Wikipedia
Rabid Neurosis
Rabid Neurosis (RNS) was an MP3 warez release organization which was founded on June 6, 1996. In 1999, the group claimed to have released over 6,000 titles a year. RNS occasionally used the tagline "R...
Rabid Neurosis - Wikipedia
DCS Copy Protection
DCS Copy Protection Ltd is a UK company that licenses proprietary content protection technology. It is a direct competitor to Rovi (formerly Macrovision) in the field of analogue copy protection.DCS C...
Partition-Saving
Partition-Saving is a disk cloning utility for Linux, Windows and DOS environments. Partition-Saving can save partitions in many formats to a disk image.It is also often referenced as Savepart (its or...
Partition-Saving - Wikipedia
Pirates With Attitudes
Pirates With Attitudes (PWA) was a major international warez release group between 1992 and 2000. The group was established by two former International Network of Crackers members known by the pseudon...
Pirates With Attitudes - Wikipedia
Cyber Intelligence Sharing and Protection Act
The Cyber Intelligence Sharing and Protection Act (CISPA H.R. 3523 (112th Congress), H.R. 624 (113th Congress), H.R. 234 (114th Congress)) is a proposed law in the United States which would allow for ...
Virtual CD-ROM Control Panel
Virtual CD-ROM Control Panel also called (Microsoft Virtual CD-ROM Control Panel for Windows XP and Microsoft Virtual CD Control Tool) is a virtual drive for Microsoft Windows that allows an ISO image...
Cheating in video games
Cheating in video games involves a video game player using non-standard methods for creating an advantage beyond normal gameplay, usually to make the game easier. Cheats may be activated from within t...
Code morphing
Code morphing is one of the approaches to protect software applications from reverse engineering, analysis, modifications, and cracking used in obfuscating software. This technology protects intermedi...