CINXE.COM

"Copy protection" -wikipedia - Google Search

<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.0//EN" "http://www.wapforum.org/DTD/xhtml-mobile10.dtd"><html xmlns="http://www.w3.org/1999/xhtml" lang="en-SG"><head><meta content="application/xhtml+xml; charset=UTF-8" http-equiv="Content-Type"/><meta content="no-cache" name="Cache-Control"/><title>"Copy protection" -wikipedia - Google Search</title><style>a{text-decoration:none;color:inherit}a:hover{text-decoration:underline}a img{border:0}body{font-family:arial,sans-serif;padding:8px;margin:0 auto;max-width:700px;min-width:240px;}.FbhRzb{border-left:thin solid #dadce0;border-right:thin solid #dadce0;border-top:thin solid #dadce0;height:40px;overflow:hidden}.n692Zd{margin-bottom:10px}.cvifge{height:40px;border-spacing:0}.QvGUP{height:40px;padding:0 8px 0 8px;vertical-align:top}.O4cRJf{height:40px;width:100%;padding:0;padding-right:16px}.O1ePr{height:40px;padding:0;vertical-align:top}.kgJEQe{height:36px;width:98px;vertical-align:top;margin-top:4px}.lXLRf{vertical-align:top}.MhzMZd{border:0;vertical-align:middle;font-size:14px;height:40px;padding:0;width:100%;padding-left:16px}.xB0fq{height:40px;border:none;font-size:14px;background-color:#1a73e8;color:#fff;padding:0 16px;margin:0;vertical-align:top;cursor:pointer}.xB0fq:focus{border:1px solid #1a73e8}.M7pB2{border:thin solid #dadce0;margin:0 0 3px 0;font-size:13px;font-weight:500;height:40px}.euZec{width:100%;height:40px;text-align:center;border-spacing:0}table.euZec td{padding:0;width:25%}.QIqI7{display:inline-block;padding-top:4px;font-weight:bold;color:#4285f4}.EY24We{border-bottom:2px solid #4285f4}.CsQyDc{display:inline-block;color:#70757a}.TuS8Ad{font-size:14px}.HddGcc{padding:8px;color:#70757a}.dzp8ae{font-weight:bold;color:#3c4043}.rEM8G{color:#70757a}.bookcf{table-layout:fixed;width:100%;border-spacing:0}.InWNIe{text-align:center}.uZgmoc{border:thin solid #dadce0;color:#70757a;font-size:14px;text-align:center;table-layout:fixed;width:100%}.frGj1b{display:block;padding:12px 0 12px 0;width:100%}.BnJWBc{text-align:center;padding:6px 0 13px 0;height:35px}</style></head><body><style>.ezO2md{border:thin solid #dadce0;padding:12px 16px 12px 16px;margin-bottom:10px;font-family:arial,sans-serif}.lIMUZd{font-family:arial,sans-serif}.Dks9wf{width:100%}.KZhhub{border-spacing:0;width:100%}.udTCfd{vertical-align:top;width:100%}.fYyStc{word-break:break-word}.ynsChf{display:block;white-space:nowrap;overflow:hidden;text-overflow:ellipsis}.Fj3V3b{color:#1967d2;font-size:14px;line-height:20px}.FrIlee{color:#202124;font-size:13px;line-height:20px}.F9iS2e{color:#70757a;font-size:13px;line-height:20px}.WMQ2Le{color:#70757a;font-size:12px;line-height:16px}.x3G5ab{color:#202124;font-size:18px;line-height:24px}.fuLhoc{color:#1967d2;font-size:18px;line-height:24px}.epoveb{font-size:32px;line-height:40px;font-weight:400;color:#202124}.dXDvrc{color:#0d652d;font-size:14px;line-height:20px;word-wrap:break-word}.dloBPe{font-weight:bold}.YVIcad{color:#70757a}.JkVVdd{color:#ea4335}.oXZRFd{color:#ea4335}.MQHtg{color:#fbbc04}.pyMRrb{color:#1e8e3e}.EtTZid{color:#1e8e3e}.M3vVJe{color:#1967d2}.qXLe6d{display:block}.NHQNef{font-style:italic}.Cb8Z7c{white-space:pre}a.ZWRArf{text-decoration:none}a .CVA68e:hover{text-decoration:underline}.gNEi4d{table-layout:fixed}.Y0aAmf{text-align:center}.iUhyd{vertical-align:bottom}.CO79Sb{position:relative}.WQbFld{bottom:0;left:0;margin:auto;position:absolute;right:0;top:0;background-image:url(https://www.gstatic.com/search_trustx/visibility_off_icon_p0-7d897bf44bafe5436baa9009e8716337.png);background-repeat:no-repeat;background-position:center;background-size:20px}.CSfvHb{padding-bottom:8px}.GN4D8d{margin:0}</style><div class="n692Zd"><div class="BnJWBc"><a class="lXLRf" href="/?sca_esv=8bf3b2b6b384b381&amp;output=search&amp;tbm=bks&amp;sa=X&amp;ved=0ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQPAgC"><img class="kgJEQe" src="/images/branding/searchlogo/1x/googlelogo_desk_heirloom_color_150x55dp.gif" alt="Google"/></a></div><div class="FbhRzb"><form action="/search"><input name="sca_esv" value="8bf3b2b6b384b381" type="hidden"/><input name="tbm" value="bks" type="hidden"/><input name="oq" type="hidden"/><input name="aqs" type="hidden"/><table class="cvifge"><tr><td class="O4cRJf"><input class="MhzMZd" value='"Copy protection" -wikipedia' name="q" type="text"/></td><td class="O1ePr"><input class="xB0fq" value="Search" type="submit"/></td></tr></table></form></div><div class="M7pB2"><table class="euZec"><tbody><tr><td><a class="CsQyDc" href="/search?q=%22Copy+protection%22+-wikipedia&amp;sca_esv=8bf3b2b6b384b381&amp;source=lnms&amp;sa=X&amp;ved=0ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ_AUIBCgA">ALL</a></td><td><a class="CsQyDc" href="/search?q=%22Copy+protection%22+-wikipedia&amp;sca_esv=8bf3b2b6b384b381&amp;tbm=nws&amp;source=lnms&amp;sa=X&amp;ved=0ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ_AUIBSgB">NEWS</a></td><td><a class="CsQyDc" href="/search?q=%22Copy+protection%22+-wikipedia&amp;sca_esv=8bf3b2b6b384b381&amp;tbm=isch&amp;source=lnms&amp;sa=X&amp;ved=0ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ_AUIBigC">IMAGES</a></td><td class="EY24We"><span class="QIqI7">BOOKS</span></td></tr></tbody></table></div></div><div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=KU7dCBpP7fsC&amp;pg=PA202&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6AF6BAgJEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">PC Mag</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=KU7dCBpP7fsC&amp;pg=PA202&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6wF6BAgJEAI"><table class="gNEi4d"><tbody><tr><td style="width:57px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Copy protection" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=KU7dCBpP7fsC&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=57" style="width:57px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">... copy protection from its products. Lotus dropped copy protection from Symphony in Release 2.0, which came to the market in September. Industry sources predict that Release 3.0 of I-2-3, due out in 1988, will not be copy protected. Lotus ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=GNYH0lLwKgAC&amp;pg=PT84&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6AF6BAgNEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">PC Mag</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=GNYH0lLwKgAC&amp;pg=PT84&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6wF6BAgNEAI"><table class="gNEi4d"><tbody><tr><td style="width:56px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Copy protection" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=GNYH0lLwKgAC&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=56" style="width:56px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">... copy-protection bypass! Obviously, the copy-protection fiends want to get international laws passed so that these laws can be cited as precedents and deviously incorporated into U.S. law. Ironically, publishers will be hurt most—users ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=X6sC2eji84gC&amp;pg=PA5&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6AF6BAgMEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">PC Mag</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=X6sC2eji84gC&amp;pg=PA5&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6wF6BAgMEAI"><table class="gNEi4d"><tbody><tr><td style="width:56px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Copy protection" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=X6sC2eji84gC&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=56" style="width:56px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">jorwardljnjnking THE WRONG APPROACH TO COPY PROTECTION ILLUSTRATION BY LISA Copy protection schemes certainly inconvenience upstanding users, but they don't stop the real crooks: commercial pirates. Forward Thinking MICHAEL J. MILLER ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=i-EhaK9f-PYC&amp;pg=PA28&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6AF6BAgHEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">DVD Authoring and Production: An Authoritative Guide to ...</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=i-EhaK9f-PYC&amp;pg=PA28&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6wF6BAgHEAI"><table class="gNEi4d"><tbody><tr><td style="width:53px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Copy protection" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=i-EhaK9f-PYC&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=53" style="width:53px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">... copy protection methods. There are currently three forms of copy protection used by the DVD-Video format, Analog Copy Protection (ACP), Copy Guard Management System (CGMS), and Content Scrambling System (CSS). Analog Copy Protection The ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=_bHlEAAAQBAJ&amp;pg=PA169&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6AF6BAgIEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Theory of Cryptography: 21st International Conference, TCC ...</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=_bHlEAAAQBAJ&amp;pg=PA169&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6wF6BAgIEAI"><table class="gNEi4d"><tbody><tr><td style="width:52px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Copy protection" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=_bHlEAAAQBAJ&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=52" style="width:52px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">... Copy - Protection of Point Functions Next , we give some intuition and obstacles behind our construction of copy- protection of point functions in this section . Informally , a copy - protection scheme of point functions is composed of ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=qISjEAAAQBAJ&amp;pg=PA295&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6AF6BAgGEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Theory of Cryptography: 20th International Conference, TCC ...</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=qISjEAAAQBAJ&amp;pg=PA295&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6wF6BAgGEAI"><table class="gNEi4d"><tbody><tr><td style="width:52px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Copy protection" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=qISjEAAAQBAJ&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=52" style="width:52px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">... copy- protection. The idea of copy-protection is the following. A software vendor wants to sell a piece of software, abstracted as a classical function f. It prepares a quantum state ρf so that anyone with a copy of ρf can evaluate f on ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=KU7dCBpP7fsC&amp;pg=PA196&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6AF6BAgEEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">PC Mag</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=KU7dCBpP7fsC&amp;pg=PA196&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6wF6BAgEEAI"><table class="gNEi4d"><tbody><tr><td style="width:57px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Copy protection" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=KU7dCBpP7fsC&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=57" style="width:57px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">... copy protection was dropped from the business packages. Although copy protection was not invented with the IBM Personal Computer, its story really begins when the machine was widely embraced for business use. As soon as the PC started ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=H-1AqdOdnxcC&amp;pg=PA42&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6AF6BAgLEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">PC Mag</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=H-1AqdOdnxcC&amp;pg=PA42&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6wF6BAgLEAI"><table class="gNEi4d"><tbody><tr><td style="width:55px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Copy protection" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=H-1AqdOdnxcC&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=55" style="width:55px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">~ copy Protection: How It Works Copy-protection schemes are designed to make duplication of program disks difficult or to make copies unusable. In one scheme, errors are purposely written on disks that the DOS utilities COPY and ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=f7dMEAAAQBAJ&amp;pg=PA302&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6AF6BAgFEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">Theory of Cryptography: 19th International Conference, TCC ...</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=f7dMEAAAQBAJ&amp;pg=PA302&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6wF6BAgFEAI"><table class="gNEi4d"><tbody><tr><td style="width:52px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Copy protection" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=f7dMEAAAQBAJ&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=52" style="width:52px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">... copy-protection [2]. Roughly speaking, using a quantum copy- protection scheme, we can copy-protect our programs in such a way that an adversarial entity cannot create multiple versions of this copy-protected program. Recently, this ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div><div> <div> <div class="ezO2md"><div><div><a class="fuLhoc ZWRArf" href="https://books.google.com.sg/books?id=iS8EAAAAMBAJ&amp;pg=PA15&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6AF6BAgKEAE"><span class="CVA68e qXLe6d fuLhoc ZWRArf">InfoWorld</span> <span class="qXLe6d dXDvrc"> <span class="fYyStc">books.google.com.sg › books</span> </span> </a></div><div class="Dks9wf"><table class="KZhhub"><tr><td><div><a href="https://books.google.com.sg/books?id=iS8EAAAAMBAJ&amp;pg=PA15&amp;dq=%22Copy+protection%22+-wikipedia&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQ6wF6BAgKEAI"><table class="gNEi4d"><tbody><tr><td style="width:55px"> <div class="CO79Sb"> <img class="iUhyd" alt='"Copy protection" -wikipedia from books.google.com.sg' src="https://encrypted.google.com/books?id=iS8EAAAAMBAJ&amp;printsec=frontcover&amp;img=1&amp;zoom=5&amp;edge=curl&amp;h=80&amp;w=55" style="width:55px;height:80px"/> </div> </td></tr></tbody></table></a></div></td><td class="udTCfd"><div> <div> <span class="qXLe6d FrIlee"> <span class="fYyStc">... Copy protection as a standard feature of programs is on its way out, according to some leading members of a software trade organization. At a gathering of the Software Publishing Association (SPA) held September 13- 15 in Alexandria ...</span> </span> </div> </div></td></tr></table></div></div></div> </div> </div></div><table class="uZgmoc"><tbody><td><a class="frGj1b" href="/search?q=%22Copy+protection%22+-wikipedia&amp;sca_esv=8bf3b2b6b384b381&amp;tbm=bks&amp;ei=V9JIZ7SHDcyYjuMPoZeRiAk&amp;start=10&amp;sa=N">Next&nbsp;&gt;</a></td></tbody></table><br/><div class="TuS8Ad" data-ved="0ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQpyoIMQ"><style>.VYM29{font-weight:bold}</style><div class="HddGcc" align="center"><span class="VYM29">Singapore</span><span>&nbsp;-&nbsp;</span><span>From your IP address</span><span>&nbsp;-&nbsp;</span><a href="/url?q=https://support.google.com/websearch%3Fp%3Dws_settings_location%26hl%3Den-SG&amp;opi=89978449&amp;sa=U&amp;ved=0ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQty4IMg&amp;usg=AOvVaw0Uz0DlZ-dHAcBS-2aXiuTS">Learn more</a></div><div align="center"><a class="rEM8G" href="/url?q=https://accounts.google.com/ServiceLogin%3Fcontinue%3Dhttps://www.google.com/search%253Ftbs%253Dbks:1%2526q%253D%252522Copy%252Bprotection%252522%252B-wikipedia%26hl%3Den&amp;opi=89978449&amp;sa=U&amp;ved=0ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQxs8CCDM&amp;usg=AOvVaw2sEFuZQgwDWXBglQLo2kbr">Sign in</a></div><div><table class="bookcf"><tbody class="InWNIe"><tr><td><a class="rEM8G" href="https://www.google.com/preferences?hl=en&amp;sa=X&amp;ved=0ahUKEwj0jq3c7v-JAxVMjGMGHaFLBJEQv5YECDQ">Settings</a></td><td><a class="rEM8G" href="https://www.google.com/intl/en_sg/policies/privacy/">Privacy</a></td><td><a class="rEM8G" href="https://www.google.com/intl/en_sg/policies/terms/">Terms</a></td></tr></tbody></table></div></div><div> </div></body></html>

Pages: 1 2 3 4 5 6 7 8 9 10