Loading

Various Methodologies Available to Secure the Software Piracy and Discussion on a New Technique to Protect the Software
Makam Radhakrishna Nandasai Kumar1, V Parthipan2

1Makam Radhakrishna Nandasai Kumar, UG .Final Year Student, Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, (Tamil Nadu), India.
2V Parthipan, Assistant Professor, Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, (Tamil Nadu), India.
Manuscript received on February 02, 2020. | Revised Manuscript received on February 10, 2020. | Manuscript published on March 30, 2020. | PP: 616-619 | Volume-8 Issue-6, March 2020. | Retrieval Number: F6995038620/2020©BEIESP | DOI: 10.35940/ijrte.F6995.038620

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Software piracy evaluated as a major problem faced from the IT industries. They need to protect their products ensuring that the user getting the trust on the Software and the working of it. Several researches are been going on until now to protect the software and reach that to the user effectively and work in their systems efficiently. In this paper, will help the IT industries to take over the problems faced by them regarding the software piracy and provide various studies on the piracy. Various techniques are used to protect the software, In this will provide the techniques which are present and been using now.
Keywords: Piracy, Software Protection, IT Industries, Technique.
Scope of the Article: Software and system security and privacy.