Knowledge

Software blacklist

Source 📝

230: 22: 149:
schemes. If blacklisted software is found then certain actions are taken by the software on the game or music disc. Examples would be allowing the copying of the game to take place, but crashing the copied game when attempting to start it; allowing copies of games that will malfunction in subtle ways
172:
In order to copy the CD, the user may have to copy the disc on another computer (real or virtual), uninstall the blacklisted software or wait for an update of the blacklisted software, which will have a countermeasure to the game or music disc's own blacklisting countermeasure.
267: 291: 286: 32: 260: 90: 253: 62: 47: 69: 76: 203: 58: 153:
This software blacklisting can be seen as a countermeasure to virtual CD/CD burning software used to bypass
296: 182: 83: 142: 138: 154: 146: 125:
Essentially the software on the disc will audit the user's computer for certain types of
237: 280: 21: 229: 126: 39: 166: 162: 130: 158: 150:
and simply disallowing the game to be run while this software exists.
134: 204:"What is application blacklisting? | Definition from TechTarget" 119: 15: 115: 114:
is a tool used by manufacturers of software and music on
241: 43: 261: 8: 48:introducing citations to additional sources 268: 254: 38:Relevant discussion may be found on the 194: 7: 292:Compact Disc and DVD copy protection 236:This security software article is a 226: 224: 129:and CD authoring software, or for 14: 287:Computer security software stubs 228: 31:relies largely or entirely on a 20: 1: 240:. You can help Knowledge by 313: 223: 183:Blacklist (computing) 112:Software blacklisting 122:to prevent copying. 59:"Software blacklist" 44:improve this article 131:debugging software 249: 248: 202:Sheldon, Robert. 109: 108: 94: 304: 270: 263: 256: 232: 225: 218: 217: 215: 214: 199: 157:schemes such as 104: 101: 95: 93: 52: 24: 16: 312: 311: 307: 306: 305: 303: 302: 301: 277: 276: 275: 274: 222: 221: 212: 210: 201: 200: 196: 191: 179: 155:copy protection 147:copy protection 105: 99: 96: 53: 51: 37: 25: 12: 11: 5: 310: 308: 300: 299: 294: 289: 279: 278: 273: 272: 265: 258: 250: 247: 246: 233: 220: 219: 193: 192: 190: 187: 186: 185: 178: 175: 145:) that bypass 107: 106: 42:. Please help 28: 26: 19: 13: 10: 9: 6: 4: 3: 2: 309: 298: 295: 293: 290: 288: 285: 284: 282: 271: 266: 264: 259: 257: 252: 251: 245: 243: 239: 234: 231: 227: 209: 205: 198: 195: 188: 184: 181: 180: 176: 174: 170: 168: 164: 160: 156: 151: 148: 144: 140: 136: 132: 128: 123: 121: 117: 113: 103: 100:December 2009 92: 89: 85: 82: 78: 75: 71: 68: 64: 61: –  60: 56: 55:Find sources: 49: 45: 41: 35: 34: 33:single source 29:This article 27: 23: 18: 17: 297:Blacklisting 242:expanding it 235: 211:. Retrieved 207: 197: 171: 152: 135:warez groups 124: 111: 110: 97: 87: 80: 73: 66: 54: 30: 281:Categories 213:2024-05-18 189:References 141:(known as 137:to create 127:virtual CD 70:newspapers 167:LaserLock 40:talk page 208:Security 177:See also 163:SafeDisc 133:used by 159:SecuROM 139:patches 84:scholar 143:cracks 86:  79:  72:  65:  57:  91:JSTOR 77:books 238:stub 165:and 118:and 63:news 120:DVD 46:by 283:: 206:. 169:. 161:, 116:CD 269:e 262:t 255:v 244:. 216:. 102:) 98:( 88:· 81:· 74:· 67:· 50:. 36:.

Index


single source
talk page
improve this article
introducing citations to additional sources
"Software blacklist"
news
newspapers
books
scholar
JSTOR
CD
DVD
virtual CD
debugging software
warez groups
patches
cracks
copy protection
copy protection
SecuROM
SafeDisc
LaserLock
Blacklist (computing)
"What is application blacklisting? | Definition from TechTarget"
Stub icon
stub
expanding it
v
t

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.