<s>
Copy	B-Application
protection	I-Application
,	O
also	O
known	O
as	O
content	B-Application
protection	I-Application
,	O
copy	B-Application
prevention	I-Application
and	O
copy	B-Application
restriction	I-Application
,	O
describes	O
measures	O
to	O
enforce	O
copyright	O
by	O
preventing	O
the	O
reproduction	O
of	O
software	O
,	O
films	O
,	O
music	O
,	O
and	O
other	O
media	O
.	O
</s>
<s>
Copy	B-Application
protection	I-Application
is	O
most	O
commonly	O
found	O
on	O
videotapes	O
,	O
DVDs	O
,	O
Blu-ray	O
discs	O
,	O
HD-DVDs	B-Operating_System
,	O
computer	O
software	O
discs	O
,	O
video	O
game	O
discs	O
and	O
cartridges	O
,	O
audio	O
CDs	O
and	O
some	O
VCDs	O
.	O
</s>
<s>
Some	O
methods	O
of	O
copy	B-Application
protection	I-Application
have	O
also	O
led	O
to	O
criticism	O
because	O
it	O
caused	O
inconvenience	O
for	O
paying	O
consumers	O
or	O
secretly	O
installed	O
additional	O
or	O
unwanted	O
software	O
to	O
detect	O
copying	O
activities	O
on	O
the	O
consumer	O
's	O
computer	O
.	O
</s>
<s>
Making	O
copy	B-Application
protection	I-Application
effective	O
while	O
protecting	O
consumer	O
rights	O
remains	O
a	O
problem	O
with	O
media	O
publication	O
.	O
</s>
<s>
Media	O
corporations	O
have	O
always	O
used	O
the	O
term	O
copy	B-Application
protection	I-Application
,	O
but	O
critics	O
argue	O
that	O
the	O
term	O
tends	O
to	O
sway	O
the	O
public	O
into	O
identifying	O
with	O
the	O
publishers	O
,	O
who	O
favor	O
restriction	O
technologies	O
,	O
rather	O
than	O
with	O
the	O
users	O
.	O
</s>
<s>
Copy	B-Application
prevention	I-Application
and	O
copy	O
control	O
may	O
be	O
more	O
neutral	O
terms	O
.	O
</s>
<s>
"	O
Copy	B-Application
protection	I-Application
"	O
is	O
a	O
misnomer	O
for	O
some	O
systems	O
,	O
because	O
any	O
number	O
of	O
copies	O
can	O
be	O
made	O
from	O
an	O
original	O
and	O
all	O
of	O
these	O
copies	O
will	O
work	O
,	O
but	O
only	O
in	O
one	O
computer	O
,	O
or	O
only	O
with	O
one	O
dongle	B-Device
,	O
or	O
only	O
with	O
another	O
device	O
that	O
cannot	O
be	O
easily	O
copied	O
.	O
</s>
<s>
Digital	O
restrictions	O
management	O
is	O
a	O
more	O
general	O
term	O
because	O
it	O
includes	O
all	O
sorts	O
of	O
management	O
of	O
works	O
,	O
including	O
copy	B-Application
restrictions	I-Application
.	O
</s>
<s>
Copy	B-Application
restriction	I-Application
may	O
include	O
measures	O
that	O
are	O
not	O
digital	O
.	O
</s>
<s>
Copy	B-Application
protection	I-Application
is	O
most	O
commonly	O
found	O
on	O
videotapes	O
,	O
DVDs	O
,	O
computer	O
software	O
discs	O
,	O
video	O
game	O
discs	O
and	O
cartridges	O
,	O
audio	O
CDs	O
and	O
some	O
VCDs	O
.	O
</s>
<s>
Companies	O
publish	O
works	O
under	O
copyright	O
protection	O
because	O
they	O
believe	O
that	O
the	O
cost	O
of	O
implementing	O
the	O
copy	B-Application
protection	I-Application
will	O
be	O
less	O
than	O
the	O
revenue	O
produced	O
by	O
consumers	O
who	O
buy	O
the	O
product	O
instead	O
of	O
acquiring	O
it	O
through	O
casually	O
copied	O
media	O
.	O
</s>
<s>
Opponents	O
of	O
copy	B-Application
protection	I-Application
argue	O
that	O
people	O
who	O
obtain	O
free	O
copies	O
only	O
use	O
what	O
they	O
can	O
get	O
for	O
free	O
and	O
would	O
not	O
purchase	O
their	O
own	O
copy	O
if	O
they	O
were	O
unable	O
to	O
obtain	O
a	O
free	O
copy	O
.	O
</s>
<s>
From	O
the	O
perspective	O
of	O
the	O
end	O
user	O
,	O
copy	B-Application
protection	I-Application
is	O
always	O
a	O
cost	O
.	O
</s>
<s>
DRM	O
and	O
license	B-Application
managers	I-Application
sometimes	O
fail	O
,	O
are	O
inconvenient	O
to	O
use	O
,	O
and	O
may	O
not	O
afford	O
the	O
user	O
all	O
of	O
the	O
legal	O
use	O
of	O
the	O
product	O
they	O
have	O
purchased	O
.	O
</s>
<s>
The	O
term	O
copy	B-Application
protection	I-Application
refers	O
to	O
the	O
technology	O
used	O
to	O
attempt	O
to	O
frustrate	O
copying	O
,	O
and	O
not	O
to	O
the	O
legal	O
remedies	O
available	O
to	O
publishers	O
or	O
authors	O
whose	O
copyrights	O
are	O
violated	O
.	O
</s>
<s>
Software	O
usage	O
models	O
range	O
from	O
node	O
locking	O
to	O
floating	B-Application
licenses	I-Application
(	O
where	O
a	O
fixed	O
number	O
licenses	O
can	O
be	O
concurrently	O
used	O
across	O
an	O
enterprise	O
)	O
,	O
grid	O
computing	O
(	O
where	O
multiple	O
computers	O
function	O
as	O
one	O
unit	O
and	O
so	O
use	O
a	O
common	O
license	O
)	O
and	O
electronic	O
licensing	O
(	O
where	O
features	O
can	O
be	O
purchased	O
and	O
activated	O
online	O
)	O
.	O
</s>
<s>
The	O
term	O
license	B-Application
management	I-Application
refers	O
to	O
broad	O
platforms	O
which	O
enable	O
the	O
specification	O
,	O
enforcement	O
and	O
tracking	O
of	O
software	B-License
licenses	I-License
.	O
</s>
<s>
To	O
safeguard	O
copy	B-Application
protection	I-Application
and	O
license	B-Application
management	I-Application
technologies	O
themselves	O
against	O
tampering	O
and	O
hacking	O
,	O
software	O
anti-tamper	O
methods	O
are	O
used	O
.	O
</s>
<s>
Floating	B-Application
licenses	I-Application
are	O
also	O
being	O
referred	O
to	O
as	O
Indirect	O
Licenses	O
,	O
and	O
are	O
licenses	O
that	O
at	O
the	O
time	O
they	O
are	O
issued	O
,	O
there	O
is	O
no	O
actual	O
user	O
who	O
will	O
use	O
them	O
.	O
</s>
<s>
As	O
an	O
example	O
,	O
an	O
activated	O
Microsoft	O
product	O
,	O
contains	O
a	O
Direct	O
License	O
which	O
is	O
locked	O
to	O
the	O
PC	B-Device
where	O
the	O
product	O
is	O
installed	O
.	O
</s>
<s>
All	O
types	O
of	O
media	O
require	O
a	O
"	O
player	O
"	O
—	O
a	O
CD	O
player	O
,	O
DVD	O
player	O
,	O
videotape	O
player	O
,	O
computer	O
or	O
video	B-Device
game	I-Device
console	I-Device
—	O
which	O
must	O
be	O
able	O
to	O
read	O
the	O
media	O
in	O
order	O
to	O
display	O
it	O
to	O
a	O
human	O
.	O
</s>
<s>
At	O
a	O
minimum	O
,	O
digital	O
copy	B-Application
protection	I-Application
of	O
non-interactive	O
works	O
is	O
subject	O
to	O
the	O
analog	O
hole	O
:	O
regardless	O
of	O
any	O
digital	O
restrictions	O
,	O
if	O
music	O
can	O
be	O
heard	O
by	O
the	O
human	O
ear	O
,	O
it	O
can	O
also	O
be	O
recorded	O
(	O
at	O
the	O
very	O
least	O
,	O
with	O
a	O
microphone	O
and	O
tape	O
recorder	O
)	O
;	O
if	O
a	O
film	O
can	O
be	O
viewed	O
by	O
the	O
human	O
eye	O
,	O
it	O
can	O
also	O
be	O
recorded	O
(	O
at	O
the	O
very	O
least	O
,	O
with	O
a	O
video	O
camera	O
and	O
recorder	O
)	O
.	O
</s>
<s>
the	O
speaker	O
output	O
or	O
headphone	B-Device
jacks	O
)	O
and	O
,	O
once	O
redigitized	O
into	O
an	O
unprotected	O
form	O
,	O
duplicated	O
indefinitely	O
.	O
</s>
<s>
Copying	O
text-based	B-Application
content	O
in	O
this	O
way	O
is	O
more	O
tedious	O
,	O
but	O
the	O
same	O
principle	O
applies	O
:	O
if	O
it	O
can	O
be	O
printed	O
or	O
displayed	O
,	O
it	O
can	O
also	O
be	O
scanned	O
and	O
OCRed	B-Application
.	O
</s>
<s>
Media	O
publishers	O
understand	O
this	O
;	O
copy	B-Application
protection	I-Application
is	O
not	O
intended	O
to	O
stop	O
professional	O
operations	O
involved	O
in	O
the	O
unauthorized	O
mass	O
duplication	O
of	O
media	O
,	O
but	O
rather	O
to	O
stop	O
"	O
casual	O
copying	O
"	O
.	O
</s>
<s>
For	O
information	O
on	O
individual	O
protection	O
schemes	O
and	O
technologies	O
,	O
see	O
List	O
of	O
copy	B-Application
protection	I-Application
schemes	O
or	O
relevant	O
category	O
page	O
.	O
</s>
<s>
Copy	B-Application
protection	I-Application
for	O
computer	O
software	O
,	O
especially	O
for	O
games	O
,	O
has	O
been	O
a	O
long	O
cat-and-mouse	O
struggle	O
between	O
publishers	O
and	O
crackers	B-Application
.	O
</s>
<s>
These	O
were	O
(	O
and	O
are	O
)	O
programmers	O
who	O
defeated	O
copy	B-Application
protection	I-Application
on	O
software	O
as	O
a	O
hobby	O
,	O
add	O
their	O
alias	O
to	O
the	O
title	O
screen	O
,	O
and	O
then	O
distribute	O
the	O
"	O
cracked	O
"	O
product	O
to	O
the	O
network	O
of	O
warez	B-Application
BBSes	B-Application
or	O
Internet	O
sites	O
that	O
specialized	O
in	O
distributing	O
unauthorized	O
copies	O
of	O
software	O
.	O
</s>
<s>
When	O
computer	O
software	O
was	O
still	O
distributed	O
in	O
audio	B-Device
cassettes	I-Device
,	O
audio	O
copying	O
was	O
unreliable	O
,	O
while	O
digital	O
copying	O
was	O
time	O
consuming	O
.	O
</s>
<s>
Software	O
prices	O
were	O
comparable	O
with	O
audio	B-Device
cassette	I-Device
prices	O
.	O
</s>
<s>
Unauthorized	O
software	O
copying	O
began	O
to	O
be	O
a	O
problem	O
when	O
floppy	B-Device
disks	I-Device
became	O
the	O
common	O
storage	O
media	O
.	O
</s>
<s>
The	O
ease	O
of	O
copying	O
depended	O
on	O
the	O
system	O
;	O
Jerry	O
Pournelle	O
wrote	O
in	O
BYTE	B-Application
in	O
1983	O
that	O
"	O
CP/M	B-Application
does	O
n't	O
lend	O
itself	O
to	O
copy	B-Application
protection	I-Application
"	O
so	O
its	O
users	O
"	O
have	O
n't	O
been	O
too	O
worried	O
"	O
about	O
it	O
,	O
while	O
"	O
Apple	B-Device
users	O
,	O
though	O
,	O
have	O
always	O
had	O
the	O
problem	O
.	O
</s>
<s>
So	O
have	O
those	O
who	O
used	O
TRS-DOS	B-Operating_System
,	O
and	O
I	O
understand	O
that	O
MS-DOS	B-Application
has	O
copy	B-Application
protection	I-Application
features	O
"	O
.	O
</s>
<s>
Pournelle	O
disliked	O
copy	B-Application
protection	I-Application
and	O
,	O
except	O
for	O
games	O
,	O
refused	O
to	O
review	O
software	O
that	O
used	O
it	O
.	O
</s>
<s>
He	O
did	O
not	O
believe	O
that	O
it	O
was	O
useful	O
,	O
writing	O
in	O
1983	O
that	O
"	O
For	O
every	O
copy	B-Application
protection	I-Application
scheme	O
there	O
's	O
a	O
hacker	O
ready	O
to	O
defeat	O
it	O
.	O
</s>
<s>
Copy	B-Application
protection	I-Application
sometimes	O
caused	O
software	O
not	O
to	O
run	O
on	O
clones	B-General_Concept
,	O
such	O
as	O
the	O
Apple	B-Device
II-compatible	O
Laser	B-Device
128	I-Device
,	O
or	O
even	O
the	O
genuine	O
Commodore	O
64	O
with	O
certain	O
peripherals	O
.	O
</s>
<s>
In	O
1989	O
Gilman	O
Louie	O
,	O
head	O
of	O
Spectrum	O
Holobyte	O
,	O
stated	O
that	O
copy	B-Application
protection	I-Application
added	O
about	O
$0.50	O
per	O
copy	O
to	O
the	O
cost	O
of	O
production	O
of	O
a	O
game	O
.	O
</s>
<s>
Other	O
software	O
relied	O
on	O
complexity	O
;	O
Antic	O
in	O
1988	O
observed	O
that	O
WordPerfect	B-Application
for	O
the	O
Atari	B-Device
ST	I-Device
"	O
is	O
almost	O
unusable	O
without	O
its	O
manual	O
of	O
over	O
600	O
pages	O
!	O
"	O
.	O
</s>
<s>
Serial	O
number	O
in	O
ROM	B-Device
could	O
not	O
be	O
used	O
because	O
some	O
machines	O
do	O
not	O
have	O
them	O
.	O
</s>
<s>
Some	O
popular	O
surrogate	O
for	O
a	O
machine	O
serial	O
number	O
were	O
date	O
and	O
time	O
(	O
to	O
the	O
second	O
)	O
of	O
initialization	O
of	O
the	O
hard	B-Device
disk	I-Device
or	O
MAC	O
address	O
of	O
Ethernet	O
cards	O
(	O
although	O
this	O
is	O
programmable	O
on	O
modern	O
cards	O
)	O
.	O
</s>
<s>
With	O
the	O
rise	O
of	O
virtualization	B-General_Concept
,	O
however	O
,	O
the	O
practice	O
of	O
locking	O
has	O
to	O
add	O
to	O
these	O
simple	O
hardware	O
parameters	O
to	O
still	O
prevent	O
copying	O
.	O
</s>
<s>
During	O
the	O
1980s	O
and	O
1990s	O
,	O
video	O
games	O
sold	O
on	O
audio	B-Device
cassette	I-Device
and	O
floppy	B-Device
disks	I-Device
were	O
sometimes	O
protected	O
with	O
an	O
external	O
user-interactive	O
method	O
that	O
demanded	O
the	O
user	O
to	O
have	O
the	O
original	O
package	O
or	O
a	O
part	O
of	O
it	O
,	O
usually	O
the	O
manual	O
.	O
</s>
<s>
Copy	B-Application
protection	I-Application
was	O
activated	O
not	O
only	O
at	O
installation	O
,	O
but	O
every	O
time	O
the	O
game	O
was	O
executed	O
.	O
</s>
<s>
A	O
variant	O
of	O
this	O
technique	O
involved	O
matching	O
a	O
picture	O
provided	O
by	O
the	O
game	O
to	O
one	O
in	O
the	O
manual	O
and	O
providing	O
an	O
answer	O
pertaining	O
to	O
the	O
picture	O
(	O
Ski	B-Application
or	I-Application
Die	I-Application
,	O
4D	B-Application
Boxing	I-Application
and	O
James	B-Application
Bond	I-Application
007	I-Application
;	I-Application
the	I-Application
Stealth	I-Application
Affair	I-Application
used	O
this	O
technique	O
)	O
.	O
</s>
<s>
Buzz	B-Application
Aldrin	I-Application
's	I-Application
Race	I-Application
Into	I-Application
Space	I-Application
(	O
in	O
the	O
floppy	B-Device
version	O
but	O
not	O
the	O
CD	O
version	O
)	O
required	O
the	O
user	O
to	O
input	O
an	O
astronaut	O
's	O
total	O
duration	O
in	O
space	O
(	O
available	O
in	O
the	O
manual	O
)	O
before	O
the	O
launch	O
of	O
certain	O
missions	O
.	O
</s>
<s>
Manuals	O
containing	O
information	O
and	O
hints	O
vital	O
to	O
the	O
completion	O
of	O
the	O
game	O
,	O
like	O
answers	O
to	O
riddles	O
(	O
Conquests	B-Application
of	I-Application
Camelot	I-Application
,	O
King	B-Application
's	I-Application
Quest	I-Application
6	I-Application
)	O
,	O
recipes	O
of	O
spells	O
(	O
King	B-Device
's	I-Device
Quest	I-Device
3	I-Device
)	O
,	O
keys	O
to	O
deciphering	O
non-Latin	O
writing	O
systems	O
(	O
Ultima	O
series	O
,	O
see	O
also	O
Ultima	O
writing	O
systems	O
)	O
,	O
maze	O
guides	O
(	O
Manhunter	B-Application
)	O
,	O
dialogue	O
spoken	O
by	O
other	O
characters	O
in	O
the	O
game	O
(	O
Wasteland	B-Application
,	O
Dragon	B-Device
Wars	I-Device
)	O
,	O
excerpts	O
of	O
the	O
storyline	O
(	O
most	O
Advanced	O
Dungeons	O
and	O
Dragons	O
games	O
and	O
Wing	B-Application
Commander	I-Application
I	I-Application
)	O
,	O
or	O
a	O
radio	O
frequency	O
to	O
use	O
to	O
communicate	O
with	O
a	O
character	O
to	O
further	O
a	O
game	O
(	O
Metal	B-Application
Gear	I-Application
Solid	I-Application
)	O
.	O
</s>
<s>
Some	O
sort	O
of	O
code	O
with	O
symbols	O
,	O
not	O
existing	O
on	O
the	O
keyboard	O
or	O
the	O
ASCII	B-Protocol
code	I-Protocol
.	O
</s>
<s>
This	O
code	O
was	O
arranged	O
in	O
a	O
grid	O
,	O
and	O
had	O
to	O
be	O
entered	O
via	O
a	O
virtual	B-Device
keyboard	I-Device
at	O
the	O
request	O
"	O
What	O
is	O
the	O
code	O
at	O
line	O
3	O
row	O
2	O
?	O
"	O
.	O
</s>
<s>
These	O
tables	O
were	O
printed	O
on	O
dark	O
paper	O
(	O
Maniac	B-Application
Mansion	I-Application
,	O
Uplink	B-Application
)	O
,	O
or	O
were	O
visible	O
only	O
through	O
a	O
red	O
transparent	O
layer	O
(	O
Indiana	B-Application
Jones	I-Application
and	I-Application
the	I-Application
Last	I-Application
Crusade	I-Application
)	O
,	O
making	O
the	O
paper	O
very	O
difficult	O
to	O
photocopy	O
.	O
</s>
<s>
Another	O
variant	O
of	O
this	O
method	O
—	O
most	O
famously	O
used	O
on	O
the	O
ZX	B-Operating_System
Spectrum	I-Operating_System
version	O
of	O
Jet	B-Application
Set	I-Application
Willy	I-Application
—	O
was	O
a	O
card	O
with	O
color	O
sequences	O
at	O
each	O
grid	O
reference	O
that	O
had	O
to	O
be	O
entered	O
before	O
starting	O
the	O
game	O
.	O
</s>
<s>
The	B-Application
Secret	I-Application
of	I-Application
Monkey	I-Application
Island	I-Application
offered	O
a	O
rotating	O
wheel	O
with	O
halves	O
of	O
pirate	O
's	O
faces	O
.	O
</s>
<s>
Its	O
sequel	B-Application
had	O
the	O
same	O
concept	O
,	O
but	O
with	O
magic	O
potion	O
ingredients	O
.	O
</s>
<s>
Other	O
games	O
that	O
employed	O
the	O
code	O
wheel	O
system	O
include	O
Star	B-Application
Control	I-Application
.	O
</s>
<s>
Zork	B-Application
games	O
such	O
as	O
Beyond	B-Device
Zork	I-Device
and	O
Zork	B-Application
Zero	I-Application
came	O
with	O
"	O
feelies	O
"	O
which	O
contained	O
information	O
vital	O
to	O
the	O
completion	O
of	O
the	O
game	O
.	O
</s>
<s>
For	O
example	O
,	O
the	O
parchment	O
found	O
from	O
Zork	B-Application
Zero	I-Application
contained	O
clues	O
vital	O
to	O
solving	O
the	O
final	O
puzzle	O
.	O
</s>
<s>
The	O
Lenslok	B-Device
system	O
used	O
a	O
plastic	O
prismatic	O
device	O
,	O
shipped	O
with	O
the	O
game	O
,	O
which	O
was	O
used	O
to	O
descramble	O
a	O
code	O
displayed	O
on	O
screen	O
.	O
</s>
<s>
Early	O
copies	O
of	O
The	B-Application
Playroom	I-Application
from	O
Broderbund	O
Software	O
included	O
a	O
game	O
called	O
"	O
What	O
is	O
Missing	O
?	O
"	O
</s>
<s>
All	O
of	O
these	O
methods	O
proved	O
to	O
be	O
troublesome	O
and	O
tiring	O
for	O
the	O
players	O
,	O
and	O
as	O
such	O
greatly	O
declined	O
in	O
usage	O
by	O
the	O
mid-1990s	O
,	O
at	O
which	O
point	O
the	O
emergence	O
of	O
CDs	O
as	O
the	O
primary	O
video	O
game	O
medium	O
made	O
copy	B-Application
protection	I-Application
largely	O
redundant	O
,	O
since	O
CD	O
copying	O
technology	O
was	O
not	O
widely	O
available	O
at	O
the	O
time	O
.	O
</s>
<s>
Macrovision	O
had	O
patented	O
methods	O
of	O
defeating	O
copy	B-Application
prevention	I-Application
,	O
giving	O
it	O
a	O
more	O
straightforward	O
basis	O
to	O
shut	O
down	O
manufacture	O
of	O
any	O
device	O
that	O
descrambles	O
it	O
than	O
often	O
exists	O
in	O
the	O
DRM	O
world	O
.	O
</s>
<s>
Many	O
games	O
use	O
the	O
"	O
code	O
checksumming	O
"	O
technique	O
to	O
prevent	O
alteration	O
of	O
code	O
to	O
bypass	O
other	O
copy	B-Application
protection	I-Application
.	O
</s>
<s>
-	O
are	O
not	O
included	O
in	O
the	O
game	O
but	O
calculated	O
from	O
the	O
numbers	O
making	O
up	O
the	O
machine	B-Language
code	I-Language
of	O
other	O
parts	O
of	O
the	O
game	O
.	O
</s>
<s>
Superior	O
Soccer	O
had	O
no	O
outward	O
signs	O
of	O
copy	B-Application
protection	I-Application
,	O
but	O
if	O
it	O
decided	O
it	O
was	O
not	O
a	O
legitimate	O
copy	O
,	O
it	O
made	O
the	O
soccer	O
ball	O
in	O
the	O
game	O
invisible	O
,	O
making	O
it	O
impossible	O
to	O
play	O
the	O
game	O
.	O
</s>
<s>
In	O
Sid	B-Application
Meier	I-Application
's	I-Application
Pirates	I-Application
,	O
if	O
the	O
player	O
entered	O
in	O
the	O
wrong	O
information	O
,	O
they	O
could	O
still	O
play	O
the	O
game	O
,	O
but	O
with	O
substantially	O
increased	O
difficulty	O
.	O
</s>
<s>
As	O
a	O
more	O
satirical	O
nod	O
to	O
the	O
issue	O
,	O
if	O
the	O
thriller-action	O
game	O
Alan	B-Application
Wake	I-Application
detects	O
that	O
the	O
game	O
is	O
cracked	O
or	O
a	O
pirated	O
copy	O
,	O
it	O
will	O
replace	O
tips	O
in	O
loading	O
screens	O
with	O
messages	O
telling	O
the	O
player	O
to	O
buy	O
the	O
game	O
.	O
</s>
<s>
As	O
a	O
more	O
humorous	O
nod	O
to	O
"	O
piracy	O
"	O
,	O
Alan	B-Application
Wake	I-Application
will	O
gain	O
a	O
black	O
Eyepatch	O
over	O
his	O
right	O
eye	O
,	O
complete	O
with	O
a	O
miniature	O
Jolly	B-Application
Roger	I-Application
.	O
</s>
<s>
While	O
the	O
copy	B-Application
protection	I-Application
in	O
Zak	B-Application
McKracken	I-Application
and	I-Application
the	I-Application
Alien	I-Application
Mindbenders	I-Application
was	O
not	O
hidden	O
as	O
such	O
,	O
the	O
repercussions	O
of	O
missing	O
the	O
codes	O
was	O
unusual	O
:	O
the	O
player	O
ended	O
up	O
in	O
jail	O
(	O
permanently	O
)	O
,	O
and	O
the	O
police	O
officer	O
gave	O
a	O
lengthy	O
and	O
condescending	O
speech	O
about	O
software	O
copying	O
.	O
</s>
<s>
In	O
case	O
of	O
copied	O
versions	O
of	O
The	B-Application
Settlers	I-Application
III	I-Application
,	O
the	O
iron	O
smelters	O
only	O
produced	O
pigs	O
(	O
a	O
play	O
on	O
pig	O
iron	O
)	O
;	O
weaponsmiths	O
require	O
iron	O
to	O
produce	O
weapons	O
,	O
so	O
players	O
could	O
n't	O
amass	O
arms	O
.	O
</s>
<s>
Bohemia	O
Interactive	O
Studio	O
developed	O
a	O
unique	O
and	O
very	O
subtle	O
protection	O
system	O
for	O
its	O
game	O
Operation	B-Application
Flashpoint	I-Application
:	I-Application
Cold	I-Application
War	I-Application
Crisis	I-Application
.	O
</s>
<s>
Dubbed	O
FADE	B-Application
,	O
if	O
it	O
detects	O
an	O
unauthorized	O
copy	O
,	O
it	O
does	O
not	O
inform	O
the	O
player	O
immediately	O
but	O
instead	O
progressively	O
corrupts	O
aspects	O
of	O
the	O
game	O
(	O
such	O
as	O
reducing	O
the	O
weapon	O
accuracy	O
to	O
zero	O
)	O
to	O
the	O
point	O
that	O
it	O
eventually	O
becomes	O
unplayable	O
.	O
</s>
<s>
The	O
message	O
"	O
Original	O
discs	O
do	O
n't	O
FADE	B-Application
"	O
will	O
eventually	O
appear	O
if	O
the	O
game	O
is	O
detected	O
as	O
being	O
an	O
unauthorized	O
copy	O
.	O
</s>
<s>
FADE	B-Application
is	O
also	O
used	O
in	O
ArmA	O
II	O
,	O
and	O
will	O
similarly	O
diminish	O
the	O
accuracy	O
of	O
the	O
player	O
’s	O
weapons	O
,	O
as	O
well	O
as	O
induce	O
a	O
"	O
drunken	O
vision	O
"	O
effect	O
,	O
where	O
the	O
screen	O
becomes	O
wavy	O
,	O
should	O
the	O
player	O
be	O
playing	O
on	O
an	O
unauthorized	O
copy	O
.	O
</s>
<s>
This	O
system	O
was	O
also	O
used	O
in	O
Take	B-Application
On	I-Application
Helicopters	I-Application
,	O
where	O
the	O
screen	O
blurred	O
and	O
distorted	O
when	O
playing	O
a	O
counterfeit	O
copy	O
,	O
making	O
it	O
hard	O
to	O
safely	O
pilot	O
a	O
helicopter	O
.	O
</s>
<s>
The	O
IndyCar	B-Application
Series	I-Application
(	O
2003	O
video	O
game	O
)	O
also	O
utilizes	O
FADE	B-Application
technology	O
to	O
safeguard	O
against	O
piracy	O
by	O
making	O
races	O
very	O
difficult	O
to	O
win	O
on	O
a	O
pirated	O
version	O
.	O
</s>
<s>
This	O
game	O
is	O
protected	O
by	O
the	O
FADE	B-Application
system	O
.	O
</s>
<s>
Batman	B-Application
:	I-Application
Arkham	I-Application
Asylum	I-Application
contained	O
code	O
that	O
disabled	O
Batman	O
's	O
glider	O
cape	O
,	O
making	O
some	O
areas	O
of	O
the	O
game	O
very	O
difficult	O
to	O
complete	O
and	O
a	O
certain	O
achievement/trophy	O
impossible	O
to	O
unlock	O
(	O
gliding	O
continuously	O
for	O
over	O
100m	O
)	O
.	O
</s>
<s>
The	O
PC	B-Device
version	O
of	O
Grand	B-Application
Theft	I-Application
Auto	I-Application
IV	I-Application
has	O
a	O
copy	B-Application
protection	I-Application
that	O
swings	O
the	O
camera	O
as	O
though	O
the	O
player	O
was	O
drunk	O
.	O
</s>
<s>
An	O
update	O
to	O
the	O
game	O
prevented	O
unauthorised	O
copies	O
from	O
accessing	O
the	O
in-game	O
web	B-Application
browser	I-Application
,	O
making	O
it	O
impossible	O
to	O
finish	O
the	O
game	O
as	O
some	O
missions	O
involve	O
browsing	O
the	O
web	O
for	O
objectives	O
.	O
</s>
<s>
EarthBound	B-Application
is	O
well-documented	O
for	O
its	O
extensive	O
use	O
of	O
checksums	B-Algorithm
to	O
ensure	O
that	O
the	O
game	O
is	O
being	O
played	O
on	O
legitimate	O
hardware	O
.	O
</s>
<s>
If	O
the	O
game	O
detects	O
that	O
it	O
is	O
being	O
played	O
on	O
a	O
European	O
SNES	B-Application
,	O
it	O
refuses	O
to	O
boot	O
,	O
as	O
the	O
first	O
of	O
several	O
checksums	B-Algorithm
has	O
failed	O
.	O
</s>
<s>
A	O
second	O
checksum	B-Algorithm
will	O
weed	O
out	O
most	O
unauthorized	O
copies	O
of	O
the	O
game	O
,	O
but	O
hacking	O
the	O
data	O
to	O
get	O
past	O
this	O
checksum	B-Algorithm
will	O
trigger	O
a	O
third	O
checksum	B-Algorithm
that	O
makes	O
enemy	O
encounters	O
appear	O
much	O
more	O
often	O
than	O
in	O
an	O
authorized	O
copy	O
,	O
and	O
if	O
the	O
player	O
progresses	O
through	O
the	O
game	O
without	O
giving	O
up	O
(	O
or	O
cracks	O
this	O
protection	O
)	O
,	O
a	O
final	O
checksum	B-Algorithm
code	O
will	O
activate	O
before	O
the	O
final	O
boss	O
battle	O
,	O
freezing	O
the	O
game	O
and	O
deleting	O
all	O
the	O
save	O
files	O
.	O
</s>
<s>
A	O
similar	O
copy	B-Application
protection	I-Application
system	O
was	O
used	O
in	O
Spyro	B-Application
:	I-Application
Year	I-Application
of	I-Application
the	I-Application
Dragon	I-Application
,	O
although	O
it	O
only	O
uses	O
one	O
copy	B-Application
protection	I-Application
check	O
at	O
the	O
beginning	O
of	O
the	O
game	O
(	O
see	O
below	O
)	O
.	O
</s>
<s>
In	O
an	O
unauthorized	O
version	O
of	O
the	O
PC	B-Device
edition	O
of	O
Mass	B-Application
Effect	I-Application
,	O
the	O
game	O
save	O
mechanism	O
did	O
not	O
work	O
and	O
the	O
in-game	O
galactic	O
map	O
caused	O
the	O
game	O
to	O
crash	O
.	O
</s>
<s>
A	O
March	O
2009	O
update	O
to	O
the	O
BeeJive	O
IM	O
iPhone	O
app	O
included	O
special	O
functionality	O
for	O
users	O
of	O
the	O
unauthorized	O
version	O
:	O
the	O
screen	O
would	O
read	O
"	O
PC	B-Device
LOAD	I-Device
LETTER	I-Device
"	O
whenever	O
the	O
user	O
tried	O
to	O
establish	O
a	O
connection	O
to	O
any	O
IM	O
service	O
,	O
then	O
quickly	O
switch	O
to	O
a	O
YouTube	O
clip	O
from	O
the	O
movie	O
Office	O
Space	O
.	O
</s>
<s>
Red	B-Application
Alert	I-Application
2	I-Application
and	O
The	B-Application
Lord	I-Application
of	I-Application
the	I-Application
Rings	I-Application
:	I-Application
The	I-Application
Battle	I-Application
for	I-Application
Middle-Earth	I-Application
have	O
a	O
copy	B-Application
protection	I-Application
system	O
that	O
completely	O
wipes	O
out	O
the	O
player	O
's	O
forces	O
briefly	O
after	O
a	O
battle	O
begins	O
on	O
an	O
unlicensed	O
copy	O
.	O
</s>
<s>
However	O
,	O
some	O
who	O
purchased	O
the	O
latter	O
have	O
encountered	O
a	O
bug	B-Error_Name
that	O
caused	O
this	O
copy	B-Application
protection	I-Application
scheme	O
to	O
trigger	B-Error_Name
when	I-Error_Name
it	I-Error_Name
was	I-Error_Name
not	I-Error_Name
supposed	I-Error_Name
to	I-Error_Name
.	O
</s>
<s>
If	O
a	O
player	O
pirated	O
the	O
Nintendo	B-Device
DS	I-Device
version	O
of	O
Michael	B-Application
Jackson	I-Application
:	I-Application
The	I-Application
Experience	I-Application
,	O
vuvuzela	O
noises	O
will	O
play	O
over	O
the	O
notes	O
during	O
a	O
song	O
,	O
which	O
then	O
become	O
invisible	O
.	O
</s>
<s>
Older	O
versions	O
of	O
Autodesk	B-Language
3ds	I-Language
Max	I-Language
use	O
a	O
dongle	B-Device
for	O
copy	B-Application
protection	I-Application
;	O
if	O
it	O
is	O
missing	O
,	O
the	O
program	O
will	O
randomly	O
corrupt	O
the	O
points	O
of	O
the	O
user	O
's	O
model	O
during	O
usage	O
,	O
destroying	O
their	O
work	O
.	O
</s>
<s>
Older	O
versions	O
of	O
CDRWIN	B-Application
used	O
a	O
serial	O
number	O
for	O
initial	O
copy	B-Application
protection	I-Application
.	O
</s>
<s>
Terminate	B-Protocol
,	O
a	O
BBS	O
terminal	O
package	O
,	O
would	O
appear	O
to	O
operate	O
normally	O
if	O
cracked	O
but	O
would	O
insert	O
a	O
warning	O
that	O
a	O
pirated	O
copy	O
was	O
in	O
use	O
into	O
the	O
IEMSI	O
login	O
packet	O
it	O
transmitted	O
,	O
where	O
the	O
sysop	O
of	O
any	O
BBS	O
the	O
user	O
called	O
could	O
clearly	O
read	O
it	O
.	O
</s>
<s>
Ubik	O
's	O
Musik	O
,	O
a	O
music	O
creation	O
tool	O
for	O
the	O
Commodore	O
64	O
,	O
would	O
transform	O
into	O
a	O
Space	B-Application
Invaders	I-Application
game	O
if	O
it	O
detected	O
that	O
a	O
cartridge-based	O
copying	O
device	O
had	O
attempted	O
to	O
interrupt	O
it	O
.	O
</s>
<s>
This	O
copy	B-Application
protection	I-Application
system	O
also	O
doubles	O
as	O
an	O
easter	O
egg	O
,	O
as	O
the	O
message	O
that	O
appears	O
when	O
it	O
occurs	O
is	O
not	O
hostile	O
(	O
"	O
Plug	O
joystick	O
in	O
port1	O
,	O
press	O
fire	O
,	O
and	O
no	O
more	O
resetting/experting	O
!	O
</s>
<s>
The	O
Amiga	O
version	O
of	O
Bomberman	B-Application
featured	O
a	O
multitap	B-Device
peripheral	O
that	O
also	O
acted	O
as	O
a	O
dongle	B-Device
.	O
</s>
<s>
Data	O
from	O
the	O
multitap	B-Device
was	O
used	O
to	O
calculate	O
the	O
time	O
limit	O
of	O
each	O
level	O
.	O
</s>
<s>
If	O
the	O
multitap	B-Device
was	O
missing	O
,	O
the	O
time	O
limit	O
would	O
be	O
calculated	O
as	O
0	O
,	O
causing	O
the	O
level	O
to	O
end	O
immediately	O
.	O
</s>
<s>
Nevermind	B-Application
,	O
a	O
puzzle	O
game	O
for	O
the	O
Amiga	O
,	O
contained	O
code	O
that	O
caused	O
an	O
unlicensed	O
version	O
of	O
the	O
game	O
to	O
behave	O
as	O
a	O
demo	O
.	O
</s>
<s>
In	O
Spyro	B-Application
:	I-Application
Year	I-Application
of	I-Application
the	I-Application
Dragon	I-Application
a	O
character	O
named	O
Zoe	O
will	O
tell	O
the	O
player	O
outside	O
the	O
room	O
containing	O
the	O
balloon	O
to	O
Midday	O
Garden	O
Home	O
and	O
several	O
other	O
areas	O
that	O
the	O
player	O
is	O
using	O
an	O
unlicensed	O
copy	O
.	O
</s>
<s>
The	O
Atari	B-Device
Jaguar	I-Device
console	O
would	O
freeze	O
at	O
startup	O
and	O
play	O
the	O
sound	O
of	O
an	O
enraged	O
jaguar	B-Device
snarling	O
if	O
the	O
inserted	O
cartridge	O
failed	O
the	O
initial	O
security	O
check	O
.	O
</s>
<s>
The	O
Lenslok	B-Device
copy	B-Application
protection	I-Application
system	O
gave	O
an	O
obvious	O
message	O
if	O
the	O
lens-coded	O
letters	O
were	O
entered	O
incorrectly	O
,	O
but	O
if	O
the	O
user	O
soft-reset	O
the	O
machine	O
,	O
the	O
areas	O
of	O
memory	O
occupied	O
by	O
the	O
game	O
would	O
be	O
flooded	O
with	O
the	O
message	O
"	O
THANK	O
YOU	O
FOR	O
YOUR	O
INTEREST	O
IN	O
OUR	O
PRODUCT	O
.	O
</s>
<s>
An	O
update	O
to	O
the	O
sandbox	O
game	O
Garry	B-Language
's	I-Language
Mod	I-Language
enabled	O
a	O
copy	B-Application
protection	I-Application
mechanism	O
that	O
outputs	O
the	O
error	O
"	O
Unable	O
to	O
shade	O
polygon	O
normals	O
"	O
if	O
the	O
game	O
detects	O
that	O
it	O
has	O
been	O
copied	O
.	O
</s>
<s>
The	O
error	O
also	O
includes	O
the	O
user	O
's	O
Steam	B-Application
ID	O
as	O
an	O
error	O
ID	O
,	O
meaning	O
that	O
users	O
can	O
be	O
identified	O
by	O
their	O
Steam	B-Application
account	O
when	O
asking	O
for	O
help	O
about	O
the	O
error	O
over	O
the	O
Internet	O
.	O
</s>
<s>
The	O
Atari	O
version	O
of	O
Alternate	B-Application
Reality	I-Application
:	I-Application
The	I-Application
Dungeon	I-Application
would	O
have	O
the	O
player	O
's	O
character	O
attacked	O
by	O
two	O
unbeatable	O
"	O
FBI	O
Agents	O
"	O
if	O
it	O
detected	O
a	O
cracked	O
version	O
.	O
</s>
<s>
VGA	B-Application
Planets	I-Application
,	O
a	O
play-by-BBS	O
strategy	O
game	O
,	O
contained	O
code	O
in	O
its	O
server	O
which	O
would	O
check	O
all	O
clients	O
 '	O
submitted	O
turns	O
for	O
suspect	O
registration	O
codes	O
.	O
</s>
<s>
On	O
a	O
copied	O
version	O
of	O
the	O
original	O
PC	B-Device
version	O
of	O
Postal	O
,	O
as	O
soon	O
as	O
the	O
game	O
was	O
started	O
,	O
the	O
player	O
character	O
would	O
immediately	O
shoot	O
himself	O
in	O
the	O
head	O
.	O
</s>
<s>
In	O
Serious	B-Application
Sam	I-Application
3	I-Application
:	I-Application
BFE	I-Application
,	O
if	O
the	O
game	O
code	O
detects	O
what	O
it	O
believes	O
to	O
be	O
an	O
unauthorized	O
copy	O
,	O
an	O
invincible	O
scorpion-like	O
monster	O
is	O
spawned	O
in	O
the	O
beginning	O
of	O
the	O
game	O
with	O
high	O
speeds	O
,	O
melee	B-Application
attacks	O
,	O
and	O
attacks	O
from	O
a	O
range	O
with	O
twin	O
chainguns	O
making	O
the	O
game	O
extremely	O
difficult	O
and	O
preventing	O
the	O
player	O
from	O
progressing	O
further	O
.	O
</s>
<s>
An	O
unauthorized	O
copy	O
of	O
Pokémon	B-Application
Black	I-Application
and	I-Application
White	I-Application
and	O
their	O
sequels	O
will	O
run	O
as	O
if	O
it	O
were	O
normal	O
,	O
but	O
the	O
Pokémon	O
will	O
not	O
gain	O
any	O
experience	O
points	O
after	O
a	O
battle	O
.	O
</s>
<s>
If	O
Ace	B-Application
Attorney	I-Application
Investigations	I-Application
2	I-Application
detects	O
an	O
illegitimate	O
or	O
downloaded	O
copy	O
of	O
the	O
game	O
,	O
it	O
will	O
convert	O
the	O
entire	O
game	O
's	O
text	O
into	O
the	O
game	O
's	O
symbol	O
based	O
foreign	O
language	O
,	O
Borginian	O
,	O
which	O
cannot	O
be	O
translated	O
in	O
any	O
way	O
.	O
</s>
<s>
In	O
the	O
stand-alone	O
expansion	O
to	O
Crytek	O
's	O
Crysis	B-Application
,	O
Crysis	B-Application
Warhead	I-Application
,	O
players	O
who	O
pirated	O
the	O
game	O
will	O
have	O
their	O
ammunition	O
replaced	O
with	O
chickens	O
that	O
inflict	O
no	O
damage	O
and	O
have	O
very	O
little	O
knockback	O
,	O
rendering	O
ranged	O
combat	O
impossible	O
.	O
</s>
<s>
In	O
Crytek	O
's	O
Crysis	B-Application
3	I-Application
,	O
if	O
a	O
player	O
used	O
an	O
unlicensed	O
copy	O
of	O
the	O
game	O
,	O
he	O
is	O
not	O
able	O
to	O
defeat	O
the	O
last	O
boss	O
(	O
The	O
Alpha	O
Ceph	O
)	O
,	O
thus	O
making	O
it	O
impossible	O
to	O
beat	O
the	O
game	O
.	O
</s>
<s>
In	O
Mirror	B-Application
's	I-Application
Edge	I-Application
,	O
copy	B-Application
protection	I-Application
will	O
prevent	O
its	O
player	O
character	O
,	O
Faith	O
,	O
from	O
sprinting	O
,	O
making	O
it	O
impossible	O
for	O
players	O
to	O
jump	O
over	O
long	O
gaps	O
and	O
progress	O
further	O
on	O
a	O
pirated	O
copy	O
.	O
</s>
<s>
In	O
The	B-Application
Legend	I-Application
of	I-Application
Zelda	I-Application
:	I-Application
Spirit	I-Application
Tracks	I-Application
if	O
the	O
player	O
is	O
playing	O
a	O
pirated	O
copy	O
of	O
the	O
game	O
it	O
will	O
remove	O
the	O
train	O
control	O
UI	O
if	O
it	O
detects	O
that	O
it	O
's	O
been	O
pirated	O
,	O
which	O
effectively	O
stonewalls	O
the	O
player	O
at	O
the	O
train	O
's	O
tutorial	O
section	O
very	O
early	O
on	O
and	O
thus	O
making	O
the	O
game	O
unbeatable	O
.	O
</s>
<s>
The	O
usage	O
of	O
copy	B-Application
protection	I-Application
payloads	O
which	O
lower	O
playability	O
of	O
a	O
game	O
without	O
making	O
it	O
clear	O
that	O
this	O
is	O
a	O
result	O
of	O
copy	B-Application
protection	I-Application
is	O
now	O
generally	O
considered	O
unwise	O
,	O
due	O
to	O
the	O
potential	O
for	O
it	O
to	O
result	O
in	O
unaware	O
players	O
with	O
unlicensed	O
copies	O
spreading	O
word-of-mouth	O
that	O
a	O
game	O
is	O
of	O
low	O
quality	O
.	O
</s>
<s>
The	O
authors	O
of	O
FADE	B-Application
explicitly	O
acknowledged	O
this	O
as	O
a	O
reason	O
for	O
including	O
the	O
explicit	O
warning	O
message	O
.	O
</s>
<s>
Anti-piracy	B-Application
measures	O
are	O
efforts	O
to	O
fight	O
against	O
copyright	O
infringement	O
,	O
counterfeiting	O
,	O
and	O
other	O
violations	O
of	O
intellectual	O
property	O
laws	O
.	O
</s>
<s>
It	O
includes	O
,	O
but	O
is	O
by	O
no	O
means	O
limited	O
to	O
,	O
the	O
combined	O
efforts	O
of	O
corporate	O
associations	O
(	O
such	O
as	O
the	O
RIAA	O
and	O
MPAA	O
)	O
,	O
law	O
enforcement	O
agencies	O
(	O
such	O
as	O
the	O
FBI	O
and	O
Interpol	B-Device
)	O
,	O
and	O
various	O
international	O
governments	O
to	O
combat	O
copyright	O
infringement	O
relating	O
to	O
various	O
types	O
of	O
creative	O
works	O
,	O
such	O
as	O
software	O
,	O
music	O
and	O
films	O
.	O
</s>
<s>
These	O
measures	O
often	O
come	O
in	O
the	O
form	O
of	O
copy	B-Application
protection	I-Application
measures	O
such	O
as	O
DRM	O
,	O
or	O
measures	O
implemented	O
through	O
a	O
content	B-Application
protection	I-Application
network	O
,	O
such	O
as	O
Distil	O
Networks	O
or	O
Incapsula	O
.	O
</s>
<s>
Richard	O
Stallman	O
and	O
the	B-Application
GNU	I-Application
Project	I-Application
have	O
criticized	O
the	O
use	O
of	O
the	O
word	O
"	O
piracy	O
"	O
in	O
these	O
situations	O
,	O
saying	O
that	O
publishers	O
use	O
the	O
word	O
to	O
refer	O
to	O
"	O
copying	O
they	O
do	O
n't	O
approve	O
of	O
"	O
and	O
that	O
"	O
they	O
 [ publishers ] 	O
imply	O
that	O
it	O
is	O
ethically	O
equivalent	O
to	O
attacking	O
ships	O
on	O
the	O
high	O
seas	O
,	O
kidnapping	O
and	O
murdering	O
the	O
people	O
on	O
them	O
"	O
.	O
</s>
<s>
Certain	O
forms	O
of	O
Anti-Piracy	B-Application
(	O
such	O
as	O
DRM	O
)	O
,	O
are	O
considered	O
by	O
consumers	O
to	O
control	O
the	O
use	O
of	O
the	O
products	O
content	O
after	O
sale	O
.	O
</s>
