software protection


Also found in: Dictionary.

software protection

[′sȯf‚wer prə‚tek·shən]
(computer science)
The use of various techniques to prevent the unauthorized duplication of software. Also known as copy protection.
McGraw-Hill Dictionary of Scientific & Technical Terms, 6E, Copyright © 2003 by The McGraw-Hill Companies, Inc.
References in periodicals archive ?
What caught my attention recently is a survey released by Norton Symantec, the company specialised in software protection, files and privacy while browsing as well as safeguarding the PCs and software devices from being hacked and penetrated into.
- Provides 24/7 antivirus and antimalware software protection. - Provides 90 days of online credit monitoring to help customers stay on top of possible fraudulent activity if a device is lost or stolen.
WYSE Biometrics Systems will be promoting Cloud based Time Attendance Software, Paperless Leave Management System, Biometric & RFID Solutions, and Software Protection Dongles.
Fraumeni said it's important to keep software protection updated.
(9) The CLRC first recommended the adoption of a deeming provision identical to s 9(3) of the Copyright, Designs and Patents Act 1988 (UK) c 48 in its draft report: CLRC, Parliament of Australia, Draft Report on Computer Software Protection (1993) 244-5 [13.
(Agence de Protection des Programmes - Software Protection Agency).
The text covers seven main areas of practice: the regulatory framework of the electronic communications market; software protection, legal protection of databases or chips, and other intellectual property issues; contracts with regard to software licensing and network services (emphasizing case law); rules of electronic evidence, electronic signatures, electronic banking, and electronic commerce; laws and regulations governing liability of network operators and service providers and related product liability; protection of individuals in the processing of personal data and confidentiality; and application of substantive criminal law in the area of information and communication technology.
This is according to the latest Internet Security Threat Report, compiled by software protection company Symantec, released on Wednesday.
There are many software protection methods, which are divided into software-based and hardware-based.
Since the early 1980's the hologram has grown in popularity as an authenticating device, starting with the images on credit cards, moving rapidly into software protection, document protection, branded goods authentication, fiscal stamps and currency.
At this stage, people start looking at SRM from the perspective of helping manage business in an efficient way rather than just software protection.

Full browser ?