230:
22:
149:
schemes. If blacklisted software is found then certain actions are taken by the software on the game or music disc. Examples would be allowing the copying of the game to take place, but crashing the copied game when attempting to start it; allowing copies of games that will malfunction in subtle ways
172:
In order to copy the CD, the user may have to copy the disc on another computer (real or virtual), uninstall the blacklisted software or wait for an update of the blacklisted software, which will have a countermeasure to the game or music disc's own blacklisting countermeasure.
267:
291:
286:
32:
260:
90:
253:
62:
47:
69:
76:
203:
58:
153:
This software blacklisting can be seen as a countermeasure to virtual CD/CD burning software used to bypass
296:
182:
83:
142:
138:
154:
146:
125:
Essentially the software on the disc will audit the user's computer for certain types of
237:
280:
21:
229:
126:
39:
166:
162:
130:
158:
150:
and simply disallowing the game to be run while this software exists.
134:
204:"What is application blacklisting? | Definition from TechTarget"
119:
15:
115:
114:
is a tool used by manufacturers of software and music on
241:
43:
261:
8:
48:introducing citations to additional sources
268:
254:
38:Relevant discussion may be found on the
194:
7:
292:Compact Disc and DVD copy protection
236:This security software article is a
226:
224:
129:and CD authoring software, or for
14:
287:Computer security software stubs
228:
31:relies largely or entirely on a
20:
1:
240:. You can help Knowledge by
313:
223:
183:Blacklist (computing)
112:Software blacklisting
122:to prevent copying.
59:"Software blacklist"
44:improve this article
131:debugging software
249:
248:
202:Sheldon, Robert.
109:
108:
94:
304:
270:
263:
256:
232:
225:
218:
217:
215:
214:
199:
157:schemes such as
104:
101:
95:
93:
52:
24:
16:
312:
311:
307:
306:
305:
303:
302:
301:
277:
276:
275:
274:
222:
221:
212:
210:
201:
200:
196:
191:
179:
155:copy protection
147:copy protection
105:
99:
96:
53:
51:
37:
25:
12:
11:
5:
310:
308:
300:
299:
294:
289:
279:
278:
273:
272:
265:
258:
250:
247:
246:
233:
220:
219:
193:
192:
190:
187:
186:
185:
178:
175:
145:) that bypass
107:
106:
42:. Please help
28:
26:
19:
13:
10:
9:
6:
4:
3:
2:
309:
298:
295:
293:
290:
288:
285:
284:
282:
271:
266:
264:
259:
257:
252:
251:
245:
243:
239:
234:
231:
227:
209:
205:
198:
195:
188:
184:
181:
180:
176:
174:
170:
168:
164:
160:
156:
151:
148:
144:
140:
136:
132:
128:
123:
121:
117:
113:
103:
100:December 2009
92:
89:
85:
82:
78:
75:
71:
68:
64:
61: –
60:
56:
55:Find sources:
49:
45:
41:
35:
34:
33:single source
29:This article
27:
23:
18:
17:
297:Blacklisting
242:expanding it
235:
211:. Retrieved
207:
197:
171:
152:
135:warez groups
124:
111:
110:
97:
87:
80:
73:
66:
54:
30:
281:Categories
213:2024-05-18
189:References
141:(known as
137:to create
127:virtual CD
70:newspapers
167:LaserLock
40:talk page
208:Security
177:See also
163:SafeDisc
133:used by
159:SecuROM
139:patches
84:scholar
143:cracks
86:
79:
72:
65:
57:
91:JSTOR
77:books
238:stub
165:and
118:and
63:news
120:DVD
46:by
283::
206:.
169:.
161:,
116:CD
269:e
262:t
255:v
244:.
216:.
102:)
98:(
88:·
81:·
74:·
67:·
50:.
36:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.