Software Piracy in the Information Age
                   Software Piracy in the Information Age

Index

1.    Introduction
2.    Software piracy methods
3.    Small scale piracy methods
4.    Large scale piracy methods
4.1.    BBS
4.2.    Internet     
4.3.    IRC
    FTP offers
    Trading
    Offerbots
4.4.    Ftp sites
4.5.    Usenet
4.6.    Email
4.7.    WWW
5.      Commercial piracy
5.1.    CDR
6.    Copyprotection
6.1.    Hardware protection
6.2.    Software protection
        Serials
        CD-keys
        Manual check
        Registration
        Limiting installations
    Certificates
7.    Anti-piracy organizations
7.1.    Legal measures
7.2.    Corporate audits
7.3.    Contacting anti-piracy organizations
7.4.    Education
7.5.    Economics
8.      Conclusion

1.    Introduction

In today’s rapidly changing world of advanced technology, computers and the 
software to run them have become integral parts of our society. The relative 
leap in recent technology has contributed to a boom in the sales and general use 
of computers. This is also due in no small part to the birth and growth of the 
Internet. A virtual world of entertainment and technology is now available at 
the fingertips of the average person. Once the domain of programmers and serious 
users, the Internet has opened the door to anyone with the slightest interest. 
The spread of home computing and the parallel growth in the business world has 
resulted in booming software industry. However, along with the spread of 
software has come a significant proliferation of software piracy. The issue of 
software piracy, the illegal copying or duplication of software, is rapidly 
growing in importance. As the software market continues to grow, so does the 
demand for stolen software. The issue of software piracy can be described on two 
levels, akin to the two stages of software: development and the end product. The 
protection of software at the developmental level can be very complex with many 
individual issues. Many of these issues are as yet unresolved and yet to be 
decided in a court of law. We will concentrate on the latter stage of software 
development, the end product. In order to gain a firm grasp on the subject, we 
will first define piracy, including the legal, monetary and ethical issues. We 
will then move on to the methods of software theft breaking them down into small 
and large-scale components. From there we will examine the protection of 
software through both industrial and legal means. Finally, we will deal with the 
social and ethical implications of software piracy in our society.

Software piracy, precisely defined, is the unauthorized use, duplication or 
theft of software. In the past decade software theft has become a very serious 
problem. With the exponential increase in the consumer market for computers and 
software, the demand for black market, or stolen software has skyrocketed. 
Conservative analysis conducted by the Software Publisher’s Association 
estimated lost revenue due to software piracy in the U.S. alone came to $1.05 

billion in 1994. This was approximately 25% of a $4.2 billion market. These 
figures only account for the business market. The size of the consumer market 
reached 1.3 billion in that same year. While the exact size of consumer piracy 
is unknown, we can safely assume that it constitutes a large portion of the 
losses to the software industry. These domestic problems pale with comparison to 
those present in international markets, where the estimated piracy rate is close 
to 49% or $8 billion. This economic impact threatens to impede the development 
of new software products and the availability of current ones. This problem 
affects everyone, from the software publishers to the legitimate user. The 
continued loss to the software industry could have harmful implications to the 
future of software development. In order to protect the economic viability of 
the software industry, laws have been enacted to protect software companies and 
their products.

The protection of computer software under the law has gone through significant 
changes in recent years. The first attempt to protect software and its 
developers was made in the late 1960’s. Software was officially recognized by 
the United States Copyright Office as a form of literary expression and hence 
protected under copyright laws. The most comprehensive protection legislation in 
this area was made in the Copyright Act of 1976. This act gave a sharper 
definition of software and its development and provided more firm guidelines as 
to its protection. Amendments in 1980 brought this act more in line with 
advances in technology. According to Title 17 of the US code, it is illegal to 
make or distribute copies of copyrighted material without authorization. The 
only exception was made in the user’s right to make a single backup copy for 
archival purposes. In 1990 Congress approved the Software Rental Amendments Act 
which prohibits the commercial rental, leasing, or lending of software without 
the express written permission of the copyright holder. Individuals are allowed 
to possess the original software program and one backup copy for their personal 
use. No other copies are to be made without specific authorization from the 
copyright owner. In late 1992, Congress passed an amendment to Title 18 of US 
code, instituting criminal penalties for copyright infringement of software. The 
penalties include imprisonment of up to five years, fines up to $250,000, or 
both, for unauthorized reproduction or distribution of 10 or more copies of 
software with a total retail value exceeding $2500. As we’ll see below these 
laws these laws, in practice, have relatively little power in the prevention of 
software piracy.

In order to understand the ethical implications of software piracy, it is 
necessary to outline the basic principles of ethics that apply to the 
engineering industry. These principles can be separated into six categories: 1. 
Loyalty, 2. Truth, honesty, and trustworthiness, 3. Respect for human life and 
welfare (including posterity), 4. Fair Play, 5. Openness, and 6. Competence. Any 
participation in the illegal duplication of software is in direct contradiction 
to the principles of truth, honesty and trustworthiness. From there it becomes 
more difficult to derive conflicts with the basic ethical principles. The theft 
of software can be said to conflict with the fourth and fifth basic ethical 
principle, fair play and openness, respectively. In purchasing a piece of 
software, you are entering into a tacit agreement with the producer, that you 
will respect the law and his rights. In duplicating that software, you are 
breaking that contract and the confidence of the supplier. Thus, you are 
violating the right of fair play with that person and in turn your openness to 
comply with the agreement. Finally, a farther analogy can be drawn to the 
engineer’s responsibility to respect the community around him. The act of 
breaking the law is indicative of total disregard for the structure of the 
society and the laws that bind it. This in turn shows little regard for the 
individuals within that society. In summary, software piracy has serious ethical
implications for the engineer that in turn can be extended to the average user.

2.    Software piracy methods

The methods by which software is pirated can be small scale and large scale. The 
small-scale methods include user-to-user sharing and user group sharing. The 
large scale methods include software rental and compact disk manufacturing. 

3.    Small scale piracy

Small-scale piracy can be defined as piracy without financial motives. The 
people and organizations that are involved in small-scale piracy are usually 
trying to get software for personal use, or are looking for fame by distributing 
software faster than others. There are many methods involved in distributing 
software without profit. These include user-to-user copying and user group 
sharing, and each of those can be performed in a variety of ways.

Perhaps the most common way that people copy software is by sharing it with 
those around them. A friend or coworker tells you "Oh, I got such a great 
program yesterday". You’re intrigued, and ask for a copy. He then gives you the 
floppy disks, you install the program and return it the next day. Simple, quick, 
no harm done you don’t see a problem with this. What you don’t realize is that 
what you’ve done was in fact copyright infringement, and the software company 
can now sue you and your friend for damages.

Borrowing diskettes or CD-ROMs is not the only way that people can share 
commercial software. Making copies and mailing it to your friend, posting a copy 
of the disks on your private FTP site, emailing an archived file all are ways 
that you can make that great program reach your friend, relative, coworker, 
boss. Perhaps you are doing this as a personal favor, or perhaps you feel that 
they won’t afford it, or you’re doing this to show off your assets. Either way, 
you’re breaking the law.

User-to-user copying has some other implications, the most important of which is 
economic. Say that you purchase some software and let five of your friends copy 
it. Each of them, in turn, will let five of their friends copy the software as 
well. After only three such cycles, over 125 people have this software. This is 
incredible exponential growth. Consider the impact on the software developers of 
only one such pirated program. In our scenario, the company receives only 
1/125th of their expected profits.

An original software purchaser has to consider many issues. First, although 
there was no intent to defraud the software company, it is an inevitable result. 
Second, the copy that these other people now have on their computers usually has 
the purchaser’s name and/or serial number. Thus, if any of those people are 
caught pirating software, it will be traced back to the original purchaser.

4.    Large scale piracy

A much more serious type of piracy is called User Group Sharing. Here, there 
exists an organized method for distributing commercial software to many people 
at once. Some of these methods include Bulletin Board System Distribution, the 
Internet, Internet Relay Chat, File Transfer Protocol, Newsgroups, electronic 
mail, and the World Wide Web.

4.1.    BBS

A Bulletin Board System (BBS) is a small-scale electronic online service that is 
run from a personal computer. Anyone with a Personal Computer and a modem can 
connect to a BBS and participate in the services that it offers. Even though 
BBSs were much more popular before the acceptance of the Internet as a mass 
communication tool, there are still about 50,000 of them in operation. Most 
software and hardware companies keep their own BBSs to permit people from around 
the world to download software updates of fixes or to get the latest drivers. 
The majority of Bulletin Boards are, however, user-run and located on someone’s 
home personal computers.

The personal BBS are easy to setup and maintain, and are not financially 
unbearable. Most of them require a dedicated computer system running special BBS 
software, several modems, and a few phone lines. The person who operates a 
Bulletin Board is often called the Sysop (short for System Operator). BBSs 
differ in many areas. Some offer membership on a fee-based basis, others are 
free for everyone, still others are by invitation only. The personal BBSs 
usually pick a central theme around which they tailor most of their services. 
Examples include music-oriented systems, systems dedicated to the Creation 
theory of biological development, or systems computer programming. Some Sysops 
decide to allow for, or center their BBSs around piracy.

The pirate BBSs (or "elite" systems, as they are often known as in the pirate 
community) range from those that are casually "elite" to those that specialize 
in pirated software. The casually "elite" systems are those where the Sysop is 
(by negligence or on purpose) indifferent to the contents of files being 
exchanged in the "file transfer" area of the system. These systems usually 
specialize in other subjects, and piracy remains one of their unmentioned 
features. 

The specifically-pirate BBSs usually specialize even further. There are 
general-purpose systems, where users are encouraged to upload any commercial 
software that they might have access to. Other systems are more selective, and 
require that the software has to be new (within three months of its release, 
within a month, a week, two days, or sometimes even before release) or that the 
software has to be of a certain type (games, application software, productivity 
utilities, etc.). These BBSs usually require some sort of referral or 
authentication before they will accept a user. This consists of new user 
passwords (which must be received personally from current members), referrals 
(where when applying for membership, one must tell the Sysop names of some other 
current members who will vouch the new user), and payment of memberships. Most 
of these safeguards are in place to serve two purposes to keep software 
"quality" high, and to prevent detection.

People on these "elite" Bulletin Boards range from people looking for software 
to download, to those who are seeking to promote their piracy group by uploading 
the greatest number of files. Most of the people on these systems know well what 
they’re doing is illegal, and most Sysops take great care to warn all users 
about potential FBI crackdowns. These are always expected, even though they 
happen very rarely. Most claims that "such-and-such BBS got shutdown" often 
heard on elite BBSs are invalid. Over time, Sysops have come up with preventive 
measures designed to clear the Sysop of responsibility in case of a crackdown. 
These usually consist of short warnings stating that copying commercial software 
is illegal, and that the user is breaking the law by downloading a file. Another 
attempt is to masquerade as non-profit libraries and make use of special 
exemptions that are allocated to these libraries. Carefully-worded notices warn 
users that they may "rent" the software from a BBS for a period of 24 hours (or 
some similar period of time), after which they must destroy the copy. This has 
the appearance of a legal operation (to be discussed separately later), however 
BBSs most often do not have a state-recognized non-profit operations license and 
are thus not non-profit libraries. The checkout warnings are nothing but ways to 
make users feel that they are participating in a legitimate activity and protect 
the Sysops.

The law and pirate Bulletin Boards have rarely met. The combination of laws used 
to persecute Sysops allows for loopholes for Sysops who do not charge for access 
to the BBSs. The 1994 case of USA vs. David LaMacchia set a precedent, which has 
not so far been challenged. In the case, an undergraduate student at the 
Massachusetts Institute of Technology (MIT) set up and operated an open 
Internet-based BBS for the period of over a month. The court ruled, however, 
that under current laws, it was impossible to prosecute the defendant. The judge 
stated that the government’s "interpretation of the wire fraud statute would 
serve to criminalize the conduct of not only persons like LaMacchia, but also 
the myriad of home computer users who succumb to the temptation to copy even a 
single software program for private use" 
[http://swissnet.ai.mit.edu/dldf/dismiss-order.html]. As a side note, the judge 
noted that he hoped for stricter laws, which would permit persecution of 
non-profit system operators. The decision for this case was based partially on 
an earlier interstate mail fraud case, which was not connected to software in 
any way.

In March of 1995, the US District Court for Massachusetts sentenced a BBS Sysop 
Richard Kenadek to 24 months probation with 6 months home confinement. Kenadek 
was an operator of the "Davy Jones Locker" bulletin board from his private 
residence. After an FBI raid, he pleaded guilty to criminal copyright 
infringement for using his BBS for the "unauthorized distribution of copyrighted 
software for financial gain." The key in this plea is the phrase "for financial 
gain". As soon as money changes hands, the activity can be considered criminal 
and judged accordingly. This case was the first time that a bulletin board 
operator was charged under the criminal statute of the copyright law, according 
to Sandra A. Sellers, the SPA director of Litigation.

Bulletin Board Systems, though rapidly losing popularity, continue to be 
significant sources of piracy. The relative inexpensiveness of running a BBS 
combined with the ease of electronic software transport quickly breed piracy. 
Anti-piracy efforts are hindered by the system operators’ altruistic way of 
running these bulletin boards. US laws currently only apply to for-profit 
ventures. Still, efforts in curbing BBS piracy are expanding, and as new laws 
are created more lawsuits will begin to appear where system operators become 
responsible for their systems’ contents.

4.2.    Internet

The Internet became a major channel for illegally distributing copyrighted 
software only in the last decade. Five main methods for Internet distribution 
that will be examined are the Internet Relay Chat (IRC), File Transfer Protocol 
(FTP), Internet newsgroups (USENET), Electronic messaging (Email), and the World 
Wide Web (WWW). Each of the four has different characteristics, and involves a 
different method for transmitting the software from the distributor to the user. 

Of all the methods for obtaining large amounts of pirated software, the Internet 
Relay Chat is the most reliable and quickest; although it is harder to use. 
Interestingly, this is one of the least-investigated sides of the Internet, and 
is arguably the hardest medium for enforcing the rules. 

Internet Relay Chat (IRC) is a computer teleconferencing system which has 
recently gained widespread popularity. Designed in 1988 by Jarkko Oikarinen as a 
replacement to the UNIX talk program, it allows for users from all over the 
world to connect to a server that’s part of the IRC network and chat with anyone 
on any other server on that network. On a typical night, there are anywhere from 
5000 to 15000 people chatting with each other. Actual numbers depend on time of 
the day, day of the week, and network stability. 

As a chatting system, IRC has some alternatives. Using IRC, people may engage in 
"private" chats, where they can send messages that only the intended recipient 
can read. People can create and join special discussion channels, where their 
messages will be shown to everybody. They may also use special DCC (Direct 
Client-to-Client) capabilities that allow for chatting and file transfer. By 
design the system is very flexible e.g. as upon not locating a certain 
discussion channel, a user may just create one.

The IRC system also allows for control. The person who creates the channel is 
considered its operator. The operator can invite other users to join this 
channel, allow and disallow a user to join (on a temporary or even a permanent 
basis), punt people from the channel if necessary, and can grant operator 
privileges to others. On certain channels, operators play almost no role and 
utilize their positions to control excessive flooding (which occurs when a user 
sends so much information in a row that it, in the opinion of the operator, 
seriously interferes with the conversation).

IRC uses a very simple system for differentiating between users who are 
currently connected to it. Each user picks a nickname based on his or her own 
preference, and logs into an IRC server. The IRC server either accepts the 
nickname or tells the user that the nickname is already in use and waits for a 
new one. The user can also optionally produce an email address that the server 
keeps in the database of current users. Other IRC users can then look up 
someone’s information based on their nickname. 

The inherent problem is that a user is not bound to reveal his or her identity 
in any way. The nickname can be unrelated, and the email address can be a fake. 
In fact, the only knowledge that someone has about some other IRC user is where 
this user is logging in from. This lack of information about users, coupled with 
the extensible system and a live presence of other humans at the same time as 
you’re there is an opportunity which pirates could not pass by. On the three 
major IRC networks there are currently dozens of round-the-clock channels which 
specialize in ways to illegally obtain software. The technical aspects of IRC 
file exchange are even more inhibiting to investigations.

On one typical evening, there were over 11,000 people connected to EFnet (Eris 
Free network, the largest of the three worldwide IRC networks). These people 
were dispersed over a range of more than 3,000 different channels. Some of the 
channels had up to 100 people while others had just one. (For a channel to 
exist, at least one person must be in it.) 

The piracy channels, most of which start with or contain the word "warez" (which 
is pirate jargon for illegally obtained commercial copyrighted software), number 
over 85. On the sample evening, there were 931 instances of people logged in to 
the "warez" channels (note that a person may be on more than one channel at 
once, but keeping track of more than four at the same time is a rare occurrence 
on IRC). 

4.3.    IRC 

    FTP site offers

Piracy takes different forms on IRC. Some channels offer "FTP sites", others 
advertise other people’s public offers, and yet others are discussion-style 
channels where people request software that they need. The "FTP site" channels 
usually have an automated moderator. Channel users find FTP sites that currently 
carry pirated material and submit the Internet addresses to the automatic 
moderator (also known on IRC as a "bot", from the word robot). The moderators 
will then broadcast the site’s coordinate to others in the same channel. A 
variation is a channel where people post Internet addresses themselves. These 
addresses usually consist of the 4-digit Internet Protocol (IP) number, the 
user-name and password that are needed for logging into the system. Sometimes, 
the posters also mention a "ratio" of, for example, 4-to-1. This means that the 
operators of this FTP site are requesting that users upload at least one fourth 
of the megabytes that they download. This will be discussed a bit later. Below 
are some of the messages that may be posted in FTP site channels:

RaiNMaNP9 Get da warez at 207.33.217.17 use the name warez and the password is 
you email address ! this ftp sucks someone told me lastnight!and he's down by 
the river!

trade_it has a site up at 205.219.156.88. Come get your warez here! 
l/p: warez 1:3

<CryoFlame> Come to my FTP 199.69.76.123 l:warez p:warez 1:5 ratio

<Maximus> Go to 165.91.2.150 \ Login & Pass: warez \ Change port to 
PORT:80 \ Upload:Download rate is 1:4 \ Most of yer warez files yer looking for 
(i.e. MS Office Pro 97 \ Visual Basic 4.0 \ Hellbender \ MS Pub97 \ WinNT 4.0 
and server \ Adobe Photoshop 4.0 Beta list goes on and on!!!

<Wronski> 206.29.242.29 l&p:warez 1:3

Another type of a channel is one where people simply type a message stating what 
they’re looking for (or what software they have for others to pirate). Other IRC 
users then read the messages, and can enter private chat with the person who 
posted the message. These channels are usually the most popular ones, as anyone 
who desires a certain software package can go and see what the other dozens of 
people offer on the channel. Most pirates on these channels deal in trades (as 
in, they only send software if the other user has some other software to send 
back). Below are a few examples of messages from this type of a channel:

    Trading 

[Gordon] will trade for Police Quest 1: vga.. msg me

_triax_ wonders if anyone know if Leisure Suit Larry 7 been released yet....

|StompeR| is looking for a site with the NEWEST Visual Basic /msg me

AoS is looking for Diskeeper, Mathematica, and Microsoft Assembler (MASM). /msg 
me for trade

Blaspheri is looking for need 4 speed.../msg me

boy20co is looking for a aol acct, or generator, will give perm ftp site away.X)

butthead is looking for Speed Haste full, PLEAZ /MSG ME IF U HAVE IT!! PERM 
ACCOUNT ON FTP SITE!!!

cf wonders is anyone knows if leisure suit larry 7 has been released yet...

Chia_Pet is looking for Marathon2...Ne1 have it?

Jeff just wants lemmings paintball

jussa looking for REalms of Arkania disks1,6-9 and Daggerfall disks47-53 pls 
/msg for trade :)

Milo looking for reg number of discplay 3.3

Monte needs a ppp dailer for MSDOS. /msg me if you have one. Thanks.

NailBomb needs sites for: Uninstaller 4.0, and Adobe Type Manager Deluxe..../msg 
me...thanks......

<KriS1> ne1 diablo site /msg 4 trade

<lizards> i need a photoshop site

<lucy4> i know how to crack eudora pro 3.0 upgrade but i didn't finish d/ling 
the intall.exe file from qualcomms site and now they took it off... if anyone 
has the file please let me know

<MaSTaWaR> SprWalker: I have flight sim 97

<Nelson> ne1 has osr3, any Koei games or settlers 2. Plz msg me.

<RaSun> looking for links386 can anyone help

<sector6> looking for death rally (for free) Help a newbie!!!

<Smallnuts> I needz Pixar's Renderman and Mesh Paint 3D, msg me.

<Spawn27> does ne1 know were I can get abuse

<Spawn27> I looking for abuse can ne help????

<SprWalker> anyone have Ms FlightSim 5.1? /msg for trade...

<Sraiser> how many more disk of office 97 to go? i need it all d/l by 9 am in 
the morning

<Sraiser> ncognito your one in a million now is 20 disk all so i can d/l it for 
work tomorrow and also have it on my new pc

<Sraiser> ne1 have wordperfect latest vers

<tanfold> i need crescent internet toolpak msg me 4 trade

<Tembler> Does anyone have MS flightsim 95!??! please msg me for trade!!!

<Tembler> I have some pretty good warez to trade for that game

<Tembler> make it msflightsim95

<True__> looking for Death Rally../msg

    Offerbots

Finally, the third major type of a "warez" channel on IRC is one where users 
compile a special software listing, and send a message to the automatic channel 
moderator notifying it of this software. The "bot" then automatically posts all 
such listings in a similarly formatted way. Here is a short sample of output 
from such a channel:

<EtC-ReLaY> ( EtC Offerer: KfZ-DcC ) _#4_ 39x [2.8M] [ETN]Arena Designer Pro 
v2.5[10-27]

<EtC-ReLaY> ( EtC Offerer: NVC-AADCC ) _#1_ 79x [9.7M] Radin Fighter 2 [10/25]

<EtC-ReLaY> ( EtC Offerer: NvC-AADCC ) _#2_ 21x [6.2M] Hot Dog web editor - da 
best one of am all [10/26]

<EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#1_ 0x [4.8M] [10/24] MS Money 97 Retail 
[RAGE]

<EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#2_ 2x [9.7M] [10/24] Raiden Fighter 2 
[EPI]

<EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#3_ 0x [166k] [10/25] Diablo DEMO Hack 
Pack [NVC]

<EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#4_ 1x [7.4M] [10/25] Fighter Duel: 
SPECIAL EDITION [PSG]

<EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#5_ 1x [7.0M] [10/25] GemStorm c 
Malachite Games [RFX]

<EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#6_ 3x [6.5M] [10/27] Amok c GT 
Interactive [RZR]

<EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#7_ 1x [7.3M] [10/27] Gray Stone Saga 2 
c Hwaei Co Chinese [KYL]

<EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#8_ 1x [5.2M] [10/27] VocalTec4s IPhone 
4.5.0.3 [MNC]

<EtC-ReLaY> ( EtC Offerer: NvC-ZKDCC ) _#9_ 1x [7.0M] [10/27] ULT Soccer Manager 
2 c SIERRA [HYB]

<EtC-ReLaY> ( EtC Offerer: PMODE-DCC ) _#1_ 24x [142k] PMODE/W v1.30 - DOS 
Extender For WATCOM C/C++

<EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#1_ 313x [ 29k] Key Gen. for Quake 
Shareware CD

<EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#2_ 86x [1.0M] WinPGP ver 5.0

<EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#3_ 900x [5.3M] Eudora PRO ver 3.0 Final

<EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#4_ 50x [1.7M] Agent 99F 16 Bit cracked

<EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#5_ 301x [1.5M] Agent 99F 32 Bit cracked

<EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#6_ 279x [7.9M] CleanSweep ver 3 beta3

<EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#7_ 28x [1.1M] NetTerm 3.2.3 32Bit 
*cracked*

<EtC-ReLaY> ( EtC Offerer: Pro-DCC ) _#8_ 15x [1.5M] WARFTPD ver 1.52 Final

<EtC-ReLaY> ( EtC Offerer: RnS|DcC1 ) _#1_ 47x [2.4M] Quake Track 2 by NiN

<EtC-ReLaY> ( EtC Offerer: RnS|DcC1 ) _#2_ 28x [4.4M] Fell on Black Days by 
Soundgarden

<EtC-ReLaY> ( EtC Offerer: RnS|DcC1 ) _#3_ 38x [4.8M] Never Leave Me Alone by 
Nate Dogg

<EtC-ReLaY> ( EtC Offerer: RnS|DcC1 ) _#4_ 24x [5.5M] Days of our livez by Bone

<EtC-ReLaY> ( EtC Offerer: RnS|DcC1 ) _#5_ 49x [2.3M] Mario 64 Main Theme

<EtC-ReLaY> ( EtC Offerer: sam-dcc ) _#1 _ 57x [539k] [SAM] [1021] The collector 
v1.13

<EtC-ReLaY> ( EtC Offerer: sam-dcc ) _#10_ 82x [666k] [SAM] [1026] BookIt! PRO 
Win 95/NT

<EtC-ReLaY> ( EtC Offerer: sam-dcc ) _#11_ 192x [267k] [SAM] [1026] 
DomainSearcher Win 95/NT

During a sample one-hour period, over 289 megabytes of files were offered 
through this "EtC-ReLaY" bot. Since a file may be downloaded by as many as 20 
people at the same time, the total volume of files transferred with the help of 
EtC-ReLaY is amazing. Moreover, EtC-ReLaY is not the only service that offers 
this kind of a feature. On EFnet, one might find well over 10 such free offer 
channels.

The mechanism for physically sending and receiving files through IRC is very 
simple even for beginners to use. If a person wants send a file to another user, 
all that needs to be typed by the sender in is a command, the name of the user, 
and a filename. To receive a file that is listed in a channel by a bot like 
EtC-ReLaY (see above), the target user executes a command, and the offerer’s 
system will automatically initiate the transfer.

4.4.    FTP sites

A fourth form of user group sharing is File Transfer Protocol (FTP) is a method 
to transfer files over the Internet. Created in the early 1970s at MIT, it has 
become a standard feature of many operating systems. FTP is probably the most 
convenient way to send files over the Internet. It is also very easy to detect 
the location of an FTP site, which is a reason why many of these sites are 
active for only a day or two. They are brought down by their operators to escape 
detection.

The basics of FTP are simple. A server computer is chosen, and FTP server 
software is set up on it. At that point, anyone on the Internet who has the 
address of the computer and user information needed to log into the system can 
access files in the server machine’s storage. The addresses and user information 
can be distributed in person, or over the Internet via the World Wide Web, IRC 
or USENET newsgroups. 

Using FTP is very simple. There are many well-written FTP client programs that 
will let a user get and put files using the FTP Internet protocol. Pirates have 
also come up with their own FTP client called "WarezFTP" which has special 
features that certain pirates might want to use. For example, WarezFTP will 
detect and display names of hidden directories which are often created on FTP 
sites. If you are not using a program like WarezFTP, you will not know that a 
directory exists, but a pirate will be able to enter it and trade files.

The motive behind putting up FTP sites (which is a very risky enterprise, since 
Internet Service Providers usually notify the SPA and sometimes even the FBI 
when they suspect illegal activity) is not commercial gain. In fact, most 
pirates lose money by paying excessive Internet connection fees. Sometimes a 
pirate may spend even more money while paying a hacker for a cracking job the 
hacker removes any copyright protection that might be embedded in the software. 
Usually cracking is done for free, but on some occasions where the pirates 
desire speed and accuracy, the cracker is paid large sums. The reasons why 
pirates put up FTP sites are to distribute any software that they have in hopes 
of getting something in return from other pirates, or to spread the popularity 
of a piracy group of which they might be members. 

Monitoring activity on FTP sites is harder than doing that on Bulletin Board 
Systems. Whereas on a BBS one can usually see the list of last few users and one 
usually has a full list of members; it is always easy to get in touch with 
someone who has recently logged on to the system. With FTP sites, there is 
almost no identification anywhere except for the FTP log file, which is usually 
stored on the server computer. The FTP log contains Internet addresses of all 
log-ins.

4.5.    Usenet

Another method of user group sharing is through Newsgroups. Newsgroups on the 
Internet (USENET) are results of an early attempt to create a thread-based 
virtual conversation medium. Not unlike a bulletin board system, users can post 
messages to a specialized "forum". However, unlike a BBS, USENET is a network 
consisting of many servers. A post made to one server is then sent across the 
whole USENET network in hopes that it gets everywhere. There are over 20,000 
different newsgroups, with topics ranging from Fans of Bill Gates to technical 
discussions relating to the operation of a blender. Internet newsgroups are 
distinguished by a specialized naming structure. For example, a newsgroup which 
concerns itself with humorous posts is called rec.humor (rec. stands for 
recreation), newsgroups with pornographic material start with 
alt.binaries.pictures.erotica (alt. is short for alternative) and a computer 
newsgroup announcing new products for Microsoft Windows may be called 
comp.os.ms-windows.announce (comp. is short for computer). Not surprisingly, 
also, the newsgroups that pirates frequent are called alt.binaries.warez and 
alt.warez.ibm-pc.

Piracy on newsgroups is an option that many have considered and tried, but due 
to technical problems that are now noticeable in the structure of USENET, is 
very impractical. What some pirates do is they locate a service which will post 
any message (including data information which could be an illegally obtained 
piece of software) without specifying the poster’s name. The technical problems 
surface when the post first occurs. Due to the nature of USENET, most messages 
have to be encoded in a special way to be compatible with old USENET servers. 
This scheme actually expands the size of the posted file. Also, if the posted 
file is too big and has been split up into several parts (as is often the case), 
not all parts are necessarily replicated to other servers. So for example, 
someone may post a 5-megabyte software package to USENET. Due to encoding and 
part size, it turns into 20 parts. Only 10 or 15 of those make it to most 
servers, and since all parts are needed to re-assemble the program, the posting 
was useless. Due to the relatively low volume of files being transferred over 
USENET, it has not been even a minor focus in the software companies’ recent 
efforts to curtail piracy

4.6.    Email

Email, by far the most popular feature of the Internet, is also the first method 
that was invented for Internet communications. A recent standard for Multimedia 
Internet Mail Extensions (MIME), has indirectly aided the spread of email-based 
piracy by permitting email software to correctly encode files for transmission 
over global networks. Using email, a user may "attach" any file to an email 
message. If the addressee’s email inbox will allow large messages, pirates will 
trade huge files using this relatively private method. Fortunately, most 
people’s inboxes have a set maximum size of 1 to 5 megabytes, which is barely 
enough for even the smallest commercial application program. Thus, email has not 
been a major method for pirate file exchange.

    WWW

The World Wide Web (WWW), an extremely popular Internet communications medium, 
is one of the most recent advances in Internet technologies. Invented in 1991 by 
a few scientists at the CERN physics laboratories in Switzerland, the World Wide 
Web is a one-way TV-like medium where content providers may post any information 
they desire. 

In the beginnings of the World Wide Web, most pirates were very uncomfortable 

with posting their file collections in such a public way. Anyone on the Internet 
may access the publicly posted information, and there is virtually no way to 
restrict investigation by proper authorities. Lately however, as the Web grew in 
size and became less manageable, more and more pirates are putting up their 
information online. They no longer feel threatened. The only way to take this 
information down is to persuade the Internet Service Provider (ISP) to shut off 
the pirate’s service. Since most ISPs realize that by cutting off someone’s 
service they will be viewed as Internet censors which usually leads to loss of 
customers they are reluctant to block anyone’s service.

5.    Commercial piracy

While the methods above involve an active pirating population, the profitable 
distribution of stolen software defines another side of the market on a larger 
scale. This market involves the sale of illegally duplicated software in large 
quantities. These large-scale pirates work only for the profit involved in the 
redistribution of illegal software. The two major components of large scale 
piracy are software rental and compact disk manufacturing. 

While it has always been illegal to rent unauthorized copies of software, until 
1990 it was legal to rent the original versions. Loss of revenues that was 
associated with these rentals prompted the US Congress to pass the Computer 
Software Rental Amendments Act of 1990. This act makes it possible for software 
publishers to explicitly prohibit rental in the license agreement. 
Interestingly, an exception to the law was created specifically for non-profit 
libraries. These could rent original software without express permission from 
the publisher.

5.1.    CDR

The second major component of large scale piracy is the duplication of computer 
compact disks. The advent of software distribution via compact disks offered 
developers a level of protection unavailable with conventional floppy disks. The 
ability to duplicate these disks was limited by the expense of CD-R’s, or 
compact disk writers. However, with advances in technology, the prices of these 
CD copiers have come down considerably. Current CD-R’s can be purchased for 
around $500 dollars. This has lead to a considerable growth in the availability 
of pirated software on CD’s. The large volume of storage available on a CD had 
also previously limited copying by potential pirates. These limitations are no 
longer an issue with the ability to copy directly to another CD. The production 
of counterfeit CD’s has become a considerable part of illegal pirating of 
software.

The distribution of counterfeit CD’s can take two forms. These CD’s can be 
explicitly marked as illegal copies or can be cleverly disguised as the 
original. The former is the most common form of distribution. With explicit 
markings or simply no disguise at all, the purchaser is generally aware of the 
illegal nature of the product. However, with duplicate packaging of the some 
stolen software, the ability of the user to distinguish between the legitimate 
and not becomes very difficult.

The volume of pirated software has also grown with the advent of CD copying. 
With the large available storage on one CD, numerous programs can be copied and 
stored on a single disk. This has significantly eased the difficulties of 
distributing these stolen programs. The growth of CD duplication is evidenced by 
the influx of counterfeit CD software from the foreign market. These copies are 
distributed rapidly and efficiently to a large market. In summary, the 
production of CD software has become a significant component of the pirating 
industry.

6.    Copyprotection

In light of the many effective methods of software piracy, the protection of 
software programs has become increasingly difficult. The battle to protect the 
software industry is a never-ending struggle, as pirates continually find new 
ways to illegally copy and distribute software. (With software piracy so 
prevalent, what can software developers do to protect their intellectual 
property?) The software industry has invested a serious amount of time into the 
development of new forms of protection. Alongside the industry, many Anti-Piracy 
Organizations and campaigns have arisen to combat the flood of illegal software. 
The first and most important component of the software protection is that 
engineered by the industry itself. We will explore what approaches have been 
taken in the past, what approaches are currently being used and other methods 
software developers have used to fight this growing problem. We will look in 
depth at each of these approaches and see their successes and at what cost. 

6.1.    Hardware protection

Let us first start with hardware solutions to the software piracy issue. The 
best known methods are dongles. Dongles are hardware "keys" which allow 
applications to be run on PCs and servers. This hardware "key" must be purchased 
separately from the application. Therefore the software developers configure the 
software to require the dongle. This is an extremely successful approach, 
however, at great cost. It costs approximately $30 per dongle. This means that 
for a $30 application the cost is now double. This fact has made this solution 
very limited. It is used almost only on very high-end applications because of 
its cost. Dongles have been the only real approach employed by software 
developers that uses hardware to help fight piracy. 

6.2.    Software protection

The most common approach for fighting software piracy has been with software. 
Among the approaches used have been serial numbers, CD-keys, encryption, manual 
references, registration requirements, and installation restrictions. We will 
take a look at each of these in depth.

    Serials

The use of serial numbers requires that the user enter a serial number before 
they can install application. Many applications use this method including such 
prominent titles as Fauve Matisse, Janna Contact, Abode Photoshop, etc. When 
installing one of these applications you are required to enter a serial number 
usually found in the software manual before you can successfully complete the 
installation. The idea behind this is that it requires the user not only to have 
the software but also the manual. 

However, this approach has been easily defeated. Many of the very popular 
software titles have their serial numbers available on the World Wide Web. This 
limits the effectiveness of serial numbers! Another problem with serial numbers 
is that there are serial number crackers. These crackers are applications that 
are designed to find the necessary serial number to get past the serial number 
check. 

    CD-keys

Microsoft offers a similar strategy with their software titles. It is called the 
CD-Key. It is a "serial number" located on the back of the CD case. It is a 
ten-digit number and is required to complete the installation of a Microsoft 
software product. 

As with serial numbers there are ways to defeat this check. First all of the 
CD-KEYs uses the same scheme (xxx-xxxxxxx). If a person finds the scheme used to 
create the CD-KEY then they can use all Microsoft products. 

Another technique is a specialized form of a serial number check. It is called 
the Certificate of Authenticity (COA) and is a way for end-users to be assured 
that their OEM (Original Equipment Manufacturer) is authentic. The COA is a 20 
digit alphanumeric number that must be entered before the end-user can use the 
Microsoft operating system that came their OEM computer. With a large range of 
possible combinations, the difficulty is relatively high for cracking these 
serial numbers.

    Manual check

Manual references are another of the approaches that software developers employ 
to fight software piracy. This is used mainly on games. Every time the game is 
launched a code (usually in the form of a unique word) is required before the 
game can be played. A prime example is the games Stunts by Brøderbund. Every 
time you launch the game it specifies a page, paragraph, and word to enter from 
the manual. The idea is that you must have the manual to play the game so that 
you cannot just get a copy of the game and start playing. 

This method has two major drawbacks. The first is that it is a hassle for paying 
customer to go through every time he wants to play the game. The second is that 
there are ways around this manual reference. You could photocopy the manual or 
write down a few of the unique words and then just keep launching the game until 
one of them shows up.

    Registration

A very different approach to software piracy protection has been to force 
registration in various ways. Registration might require payment (most cases) or 
simply just registering your name and address etc. Some software developers use 
the method of encryption to protect their software. They lock the software with 
a "software key" and the software will only work if the user gets the "key" from 
software developer. The software developer can then force the user to register 
before he releases the key. Using this approach, the developer can create a 
unique key for every user. Some developers did not like the idea of forcing 
registration and have instead shipped the software key with the application. 
This second method is not as effective as the first. Both approaches have a 
distinct use for applications that are distributed via electronic and on-line 
distribution.

Other software developers force registration by creating some limit for the use 
of an application prior to registration. For example, limiting the number of 
launches before registration. This approach is used primarily in shareware, 
freeware, and demos. An example of this approach is employed in Quicken SE by 
Intuit.

Another common approach instead of the number of launches is to limit the number 
of days that the application will run before registration is required. This is 
used particularly in shareware, freeware, and demos. An example of this is 
Netscape Navigator beta applications, which limit the use of the application to 
30 days. Once again, when you register the application this limit is removed. 

    Limiting installations

In a radical attempt at a new method Microsoft proposed limiting the number of 
installations of Office 97 to a total of 3. This technique was soon abandoned as 
many people complained to Microsoft. Obviously Public Relations have a priority 
over piracy concerns.

    Certificates

All of the previous approaches are ways to protect the software from being 
pirated after it is purchased. Some manufacturers like Microsoft have gone a 
step further. Microsoft decided to fight software piracy from the retail store. 
To do this they placed a Certificate of Authenticity (COA) on the side of the 
box. This COA contains 3 hidden, and non-reproducible watermarks making it 
nearly impossible for pirates to copy the box . Therefore, when a user sees a 
box without this COA it is safe for him to assume that it is a pirated version 
of the Microsoft software.

7.    Anti-Piracy Organizations

The second component of the protection of software comes from the numerous 
organizations that have been formed to combat software piracy. These 
organizations use advertisements and legal action to fight against the rising 
tide in the illegal duplication of software.

Though there are many organizations which are fighting against software piracy, 
the largest and most active of these are The Software Publishers Association 
(SPA) and The Business Software Alliance (BSA). Both are international 
organizations whose members include software developers, distributors, 
retailers, consultants, and essentially any other groups which are concerned 
with the industry’s growth. Through cooperative work with the government, the 
SPA and BSA enforce anti-piracy laws through active measures such as filing 
lawsuits, conducting raids, and undertaking audit programs.

7.1.    Legal measures

Over a thousand lawsuits, against both large groups and individuals, have been 
filed by the SPA and BSA. The penalty for software piracy is high for the 
violator - up to $100,000 per copyright infringement and a maximum 5-year prison 

term. On March 1, of this year, SPA filed a lawsuit against a junior college 
located in Florida for using illegal copies of software on its computers. The 
settlement reached by the plaintiff and defendant resulted in a fine of $135,000 
along with removal of the illegal copies and repurchase of new ones. On July 4, 
1996, BSA successfully prosecuted two Hong Kong citizens with prison terms under 
the new Copyright (Amendment) Ordinance. Yip Chi Hung, the owner of a software 
shop in Hong Kong was sentenced to 6 months in jail plus a fine of HK$51,000. 
Kwok Po, Yip’s supplier of wholesale pirated CD-ROMs, was sentenced a total of 
16 months in jail and fined HK$308,000. Just recently, this past October 10, SPA 
filed 5 civil lawsuits for software piracy on behalf of the software 
corporations Adobe Systems, Inc., Claris Corp., Corel Corp., Datastorm 
Technologies Inc., and Novel Inc. Three were against Internet service providers 
(ISPs), and two were against individual violators. The three ISPs Community 
ConneXion, Inc., GeoCities, Inc., and Tripod Inc. had pirated software, 
unauthorized serial numbers, links to ftp "warez" sites, and cracker/hacker 
utilities posted on their webpages. With the help of the ISPs, two individuals 
were tracked down as the responsible posters of the copyright infringing 
material. Though it is certain that software copyright laws are being violated 
in this case, there is controversy over whether or not the ISPs, which offer 
free space for individuals to design their own Web pages, should be responsible 
for the material that is posted by their users. Internet analyst Chris Stevens 
voiced his opinion, stating "They need to go after the people who post pirated 
software, not the host. That’s like suing the phone company for receiving 
obscene phone calls." As an illustration showing that nobody is above the laws 
of copyright protection, a hospital in Chicago, Illinois was fined $161,000 for 
using illicit copies of software. In fact, with the increase of computerization 
in hospitals, these institutions should be given increased special scrutiny, 
according to Bob Kruger, Vice President of Enforcement for BSA.

7.2.    Corporate audits

An alternative to litigation, is conducting what are called corporate audits. If 
investigators report a corporation as having violated copyright laws, SPA will 
often ask the corporation to allow an audit of its software in place of taking 
the matter to court. During an audit, the contents of each computer are compared 
with the company’s purchase receipts of software. If any illegal copies are 
found, the company will agree to pay the retail price for each copy, destroy 
these illegal copies, and replace them with legitimate ones. For the most part, 
these audits have been met with cooperation by the company who would much rather 
settle the issue in a confidential, private matter than dragging everything to 
court. If the company does refuse to submit to an audit, SPA will then file a 
lawsuit against them.

7.3.    Contacting anti-piracy organizations 

To help them in their search for copyright criminals, the SPA, BSA and software 
giant Microsoft have established a hot-line (1-800 toll free number) which 
people can call in to report suspicions of software piracy. The numbers are 
1-800-388-7478 for SPA, 1-800-688-BSA1 for BSA and 1-800-RULEGIT for Microsoft. 
Most investigations start off with a tip through this hot-line. Everyday, 30 to 
40 calls are received, mostly from employees and consultants for software firms. 
Together with law enforcement officers from the government, the anti-piracy 
organizations will pursue these leads and often arrest the violator through a 
sting operation. Besides calling in to give tips on copyright violators, the 
public can also call in to receive information about preventing software piracy.

7.4.    Education

In addition to playing cops and robbers with software pirates all over the 
world, the SPA and BSA are also committed to teaching the public the degrading 
effects of software piracy using propagandistic methods, and helping companies 
prevent copyright violations through educational courses and software utilities. 

Noticing the prevalence of software piracy everywhere, the anti-piracy 
organizations are trying to change the cultural view that copying and buying 
illegal versions of software is okay. The SPA, especially, has undergone 
extensive efforts to make the public aware of the illegality of software piracy. 
Free brochures for the general public with titles such as "Software Use and the 
Law" and "Is it Okay to Copy My Colleague’s Software?" contain information about 
copyright laws and demonstrate the legal extent of using software. "It Could 
Have Been So Easy" is a seven minute video intended for companies, showing what 
can happen if one is found guilty of copyright infringement, and also giving 
advice on maintaining an efficient software management program. Another video 
called "Don’t Copy That Floppy" is a rap/hip-hop music video attracting the 
younger generation that educates them in ethical problems with pirating 
software. Both these videos can be purchased for $20 and $15 dollars 
respectively. 

In addition to distributing brochures and videos which educate the public on the 
legal and ethical ramifications of software piracy, the SPA offers a free 
software tool called the Self-Audit Kit that allows companies to maintain an 
inventory of all the software on their systems. This way any accidental use of 
pirated software can be detected and quickly remedied. The software comes in 6 
different languages and is also available for the Macintosh. A more effective 
tool of education is the SPA Certified Software Manager Course (CSM). This 
course gives computer professionals the skills needed to organize a software 
management program for their company. They are also taught the legal aspects of 
software use and how to "optimize the legal use of software." This course is 
currently taught in the USA, England, France, Germany and Singapore and will 
soon extend to China, India and several Latin American countries.

7.5.     Economics

Software piracy is an economic and legal problem that impacts every community. 
Software piracy is something very new to many people. A lot people don’t know 
about it and others don’t think it is illegal when they copy software from the 
floppy disk. "Many people don’t see a harm in it," says Robert Holleyman, 
president of the Business Software Alliance (BSA). "Business owners would never 
think of asking their employees to steal computers, but many of those same 
business people don’t think twice about buying one or two programs and 
duplicating them for all the PCs in their office." Many people convicted of 
copyright violations are simply naive or ignorant of the law. For example, "A 
misguided computer technician had take an application intended for five bean 
counters and install it every where in the operation department." Another 
example is a mother, "Miki Casalino, in whose house Novell found the ‘Planet 
Gallifrey BBS’ which she admitted was run by her son, though she only learned of 
the alleged illegal software after it was too late." The problem is that all of 
them are "innocent" but on the other hand, they are violating the copyright of 
the software. We must concede that copying software, like drinking and driving, 
is something that everybody disapproves of, yet most people do at least one. "Of 
300 PC-using managers questioned earlier this year by MORI, a market-research 
group, 55% admitted to copying software illegally."

A contribution to the seduction of computer users is the fact that using the 
pirated software is as good as using the legal software but the prices are 
better. In addition, it has been said that " From the user’s standpoint there’s 
virtually no risk to using pirated software." And it is not hard to copy 
software. All that is needed is a computer, the empty diskettes, and of course 
the software program you want to have. 

Finally, the fact is that few people are actually prosecuted each year for 
software copyright infringement, and most offenses don’t warrant maximum fines 
or jail time. Human nature being what it is, software piracy persists.

Most people know that copying the software is illegal, but they still do it. The 
reason is very simple. They can make a lot of money from doing it and the 
consequences are nil or avoidable. According to Iritani "It was a check forgery 
case that led deputies to the quiet Rowland Heights cull-de-sac. But they found 
at the home of Ming Chin Jin and his wife, Pifen Lo, was $400,000 worth of 
counterfeit copies of Microsoft’s Encarta’s 95 CD-ROM encyclopedia and 48,000 
fake holograms from China." Indeed, high profits and minimal penalties make this 
form of high-tech crime a criminal’s dream and a police officer’s nightmare. 
Iritani wrote, "most cases are not prosecuted for the lack of evidence or end up 
in civil court, where monetary penalties have proven to be ineffective." The 
making of a counterfeiting lab are very easy to acquire and relative 
inexpensive. According to Iritani, all they need are "a computer, a disk or 
CD-ROM duplication machine, a laser printer, a shrink-wrap machine and someone 
willing to produce the labels and packaging." 

8.    Conclusion

Software piracy exists. We covered the basic definition of software piracy, the 
methods involved, the potential solutions, and the social implications. In 
conclusion, let us address two questions

The first question is "What can you do avoid piracy and pirated software?" Your 
options as a user are to purchase authentic software and to report violations. 
In this way you protect yourself and the software industry from the damages of 
software piracy. As mentioned before there are numerous ways to assure you are 
purchasing authentic software. Be aware of words and warnings, such as "warez" 
that are "red flags" of pirated software. Remember that there are hotlines 
available to report software piracy and report any suspicious sites.

The second question one should address is "Why shouldn’t you pirate?" Reasons 
for not pirating software include the legal consequences as well as ethical and 
moral issues. The legal consequences can include fines or jail time while the 
ethical issues can effect your reputation and standing in the professional and 
personal community. Piracy won’t be eliminated until users determine as a 
community that it is wrong and take a united stand to eliminate it.

   --Original author: Ilya
   --Reformatting, Subtitles, Index: Mr.F

Source

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License