Facebook social media iconTwitter social media iconYouTube social media iconSubmit to Reddit

Equipping Your Home Recording Studio - A free download from Audio Masterclass

An Introduction to Compression: Basic Compression - A free download from Audio Masterclass

An Introduction to Equalization - A free download from Audio Masterclass

Can you hear the difference between a square wave and a sine wave?

Develop your DAW skills by making a ringtone using edits and crossfades

A brief introduction to acoustic treatment

The professional way to make sure your mics are connected correctly

Should you make decisions as you record, or keep your options open until later?

New vs. old guitar strings: Part 3 - The case for conditioning your guitar strings

Recording acoustic guitar in stereo - should you use spaced or coincident mics?

What is production? Part 5: Mastering

How complicated do your monitors have to be?

What is production? Part 4: Mixing

Copy protection - protecting against legitimate use?

Software developers need to make a profit from their products. But to make sure of this they need to use copy protection. The world still waits for a fully workable copy protection system...


The reason why audio and music software developers use copy protection is because people would simply copy their products and use them without payment.

And if you can say that you've never once used software without paying for it it, then obviously you'll be first in the queue at the pearly gates come judgment day.

But the fact remains that software developers need to make a profit, otherwise they would have to do something else for a living. And many products these days are priced very reasonably so there is no excuse.

Copy protection however has never been easy to implement. Ideally a copy protection system should allow a legitimate user to enjoy their software in whatever way suits them, immediately from purchase for as long as they like, changes of computer included.

However, things don't always go this smoothly. Take for example a recent problem where a college of education (which will remain nameless) needed to install ten copies of a particular software (also nameless, and by no means inexpensive).

The copy protection system of this software works by interrogating the machine that it is installed on and generating a file that identifies that machine. This file is then e-mailed to the developer who sends back a file in response, a day or so later. When this is installed, the software will function. There is a 30-day period during which the software can be used before authorization.

The problem was however that the IT department of the college refused to give each machine its own e-mail address. That meant that files had to be generated for each machine and then e-mailed separately.

The chances of the response files getting mixed up was judged to be pretty much a certainty. So the machines are currently being authorized one at a time.

OK, so the job will get done eventually. But the world still needs a copy protection system that genuinely works and imposes no restriction nor inconvenience on legitimate users. And easily lost or stolen dongles - not in a college environment thanks!

Please click here if there are broken links or missing images in this article

By David Mellor Wednesday March 9, 2005
Online courses from Audio Masterclass