Code Confidential: The V.i. Labs Blog

Microsoft Toolkit In This Week’s Top Torrents
July 23, 2014

Welcome back to the latest Top 10 Most Pirated Applications. Another week, another dive into the depths of the world of desktop software torrents. This week we’re faced with a new type of release to discuss in the form of a “Microsoft Toolkit.” In the past we’ve discussed pirate releases of Microsoft products and how prevalent they [...]

Read the Full Post

The New Way Piracy Pays: Pay Per Downloads (PPD) Services
July 21, 2014

Over the last two years we seen some clever schemes to convert piracy activity into dollars. As we have mentioned many times, the piracy groups and crackers themselves are rarely out to make money. They enjoy being part of the scene and receiving attribution for cracking the latest release of Vendor XYZ’s product. It’s actually [...]

Read the Full Post

CentOS Showing Up Multiple Times In This Week’s Top Torrents
July 16, 2014

Welcome back to the latest Top 10 Most Pirated Applications. Another week, another dive into the depths of the torrent underworld! This week we have a mixed bag of prior trends, with a few newcomers thrown in: This week in the Top 10 we see a new theme, very different from what we have seen in [...]

Read the Full Post

Cracking the Crackers?
July 10, 2014

We know that  the piracy enablers are at the top of the software piracy distribution process. The “crackers” are individuals and groups who love to crack DRM and software licensing schemes. While many crackers are well-hidden, some are surprisingly visible on the Web and have established their own blogs to announce their crack releases. The crack [...]

Read the Full Post

The Accidental Software Pirate
July 8, 2014

How Well-Intentioned Users Can Become Victims of Piracy Not all software misuse is malicious. Often times end-users may not even be aware that the software they are using is unlicensed. These accidental software pirates want to be in compliance and often believe they have a genuine copy of the software and are using it properly. [...]

Read the Full Post

View Older