Flylib.com
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying (Uncovered series)
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying (Uncovered series)
ISBN: 1931769338
EAN: 2147483647
Year: 2003
Pages: 60
Authors:
Kris Kaspersky
BUY ON AMAZON
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
Back Cover
Back Cover
About
Preface
Introduction
Historical Aspect
Thoughts about Hackers, Protection Mechanisms, and Programming
On the CD
Part I: CD Anathomy
Chapter 1: CD Organization
Lead-in Area, Data Area, Lead-out Area, and TOC
Chapter 2: Power of Reed-Solomon Codes
Basics of Error-Correcting Codes and Error-Correcting Encoding
Idea of Reed-Solomon Codes
General Concept
Recommended Reading
Polynomial Arithmetic and Galois Fields
Reed-Solomon Codes in Practical Implementations
Part II: Low-Level Control over Hardware
Chapter 3: Practical Advice on Urgent System Recovery
Chapter 4: Interfaces for Interaction with the Hardware
Access via the CD-ROM Driver
Access in the Cooked Mode (Block Reading Mode
Access via SPTI
Access via ASPI
Access via the SCSI Port
Accessing the Drive via SCSI Miniport
Communication via InputOutput Ports
Access via the MSCDEX Driver
Communicating via the Custom Driver
Summary Table of Characteristics of Various Interfaces
Chapter 5: Methods of Revealing Protection Mechanisms
CD Burning: Pros, Cons, and Something about
Locking and Unlocking the EJECT Button
Hacking Secrets. Brake Fluid for CDs
Investigation of Real Programs
Part III: Protection against Unauthorized Copying and Data Recovery
Chapter 6: Anti-Copying Mechanisms
Built-in CD Protection
Protection Mechanisms Based on Non-Standard Disc Formats
Chapter 7: Protection Mechanisms for Preventing Playback in PC CD-ROM
Audio Overlapped by Data
Castrated Lead-Out
Negative Starting Address of the First Audio Track
Chapter 8: Protection against File-by-File Disc Copying
Invalid File Sizes
File Encryption
Chapter 9: Protection Mechanisms Based on Binding to Storage Media
Putting Marks vs. Dynamic Binding
Protection Mechanisms Based on Physical Defects
Protection Mechanisms Based on the Read Timing Characteristics
Protection Mechanisms Based on Weak Sectors
Chapter 10: Data Recovery from CDs
Restoring Cleared CD-RW Discs
How to Recover Unreadable CDs?
List of Figures
List of Tables
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying (Uncovered series)
ISBN: 1931769338
EAN: 2147483647
Year: 2003
Pages: 60
Authors:
Kris Kaspersky
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Connecting to an Access Databasefrom ASP.NET
Counting Records in a DataReader
Nesting Manual Transactions with the SQL Server .NET Data Provider
Retrieving Constraints from a SQL Server Database
Synchronizing a DataSet with an XML Document
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
Integration Strategies and Tactics for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Governing Information Technology Through COBIT
The Evolution of IT Governance at NB Power
Cisco IOS Cookbook (Cookbooks (OReilly))
Defining Per Port Privileges
Disabling EIGRP on an Interface
Using BSTUN
Tunneling IPv6 Through an Existing IPv4 Network
PE-CE Communication via BGP
Sap Bw: a Step By Step Guide for Bw 2.0
Creating an InfoSource for Characteristic Data
Summary
Data Maintenance
Maintaining Characteristic Data
Section B.3. Memory Management
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
The OSI Reference Model and the TCP/IP Reference Model
Next-Generation Networks and Convergence
End-to-End Optical Networking
Beyond 3G
Glossary
VBScript in a Nutshell, 2nd Edition
What VBScript Is Used For: Gluing Together Objects
Common Problem Areas and How to Avoid Them
Accessing Other Object Models
Section C.5. Operator Precedence
Appendix D. Locale IDs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies