Copy Protection

(kop pr -tek sh&n) (n.) Refers to techniques used to prevent the unauthorized copying of software. The idea of copy-protected software was created by software manufacturers who wanted to prevent software piracyusers copying programs and giving them to friends and colleagues free of charge.

As enticing an idea as it may be, copy protection has not proved to be a viable strategy. For one, it is practically impossible to create software that cannot be copied by a knowledgeable programmer. Second, many consumers shy away from copy-protected software because backup copies are difficult to make. Thus, if their original copy of the software is damaged, the user must contact the manufacturer for a new copy. Finally, some copy-protection techniques can actually damage other software on the system. For these reasons, copy-protected software is becoming less common.

Most software producers now protect their programs by issuing registration numbers with each package. When you install the software, you must enter the registration number. This does not prevent all piracy, but it limits it. In addition, users cannot get updates to a product unless they own the original diskettes and documentation.

An alternative strategy for dealing with the problem of software piracy is shareware, where users are actually encouraged to copy and disseminate programs. Shareware publishers rely on people’s honesty to pay for the products used.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Related Articles

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...

Infographic

An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...

Phishing

What is phishing? Phishing is a type of cybercrime in which victims are contacted by email, telephone, or text message by an attacker posing as...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...