<--- Back to Details
First PageDocument Content
Malware / Digital rights management / Rootkits / Sony / 105th United States Congress / Sony BMG copy protection rootkit scandal / Digital Millennium Copyright Act / SecuROM / SafeDisc / Computer security / Cyberwarfare / Software
Date: 2008-12-05 13:27:36
Malware
Digital rights management
Rootkits
Sony
105th United States Congress
Sony BMG copy protection rootkit scandal
Digital Millennium Copyright Act
SecuROM
SafeDisc
Computer security
Cyberwarfare
Software

BEFORE THE COPYRIGHT OFFICE OF THE LIBRARY OF CONGRESS    IN THE MATTER OF   EXEMPTION TO PROHIBITION ON CIRCUMVENTION OF COPYRIGHT PROTECTION  SYSTEMS FOR ACCESS CONTROL TECHNOLOGIES   

Add to Reading List

Source URL: www.copyright.gov

Download Document from Source Website

File Size: 375,38 KB

Share Document on Facebook

Similar Documents

Computing / Computer architecture / Android / System software / Online marketplaces / Google Play / Intent

Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset Amiangshu Bosu Fang Liu, Danfeng (Daphne) Yao, Gang Wang Department of Computer Science

DocID: 1xW0O - View Document

Computing / Denial-of-service attacks / Cyberwarfare / Cybercrime / Botnets / Computer network security / Denial-of-service attack / Mirai / Internet of things / Low Orbit Ion Cannon / Universal Plug and Play / Computer security

EECS 388 Intro to Computer Security October 21, 2016 Homework 4: Denial of Service

DocID: 1xVVc - View Document

Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p

DocID: 1xVSf - View Document

Cryptography / Computer security / Cryptographic hash functions / Password / Rainbow table / SHA-2 / Password strength / Salt

EECS 388 Intro to Computer Security October 7, 2016 Homework 3: Authentication and Passwords

DocID: 1xVMf - View Document

Computing / Free software / Dark web / Internet / Cryptographic protocols / Internet Standards / Computer network security / Tor / .onion / Botnet / Internet privacy / Bipartite graph

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

DocID: 1xVHD - View Document