However, in order to do this a direct access to hardware was required, so driver had to bypass all protection levels of the OS, which meant that if there's something wrong with driver it will crash the system, which, can be fatal, since the driver loads at startup and if it broke down it will prevent the system from loading. This was effective because the physical locations of bits of data won't exactly match if you copy the disc. The bits of encrypted data were located at specific physical locations of the disc, and this data was a digital key for the software which had an embedded key, so it worked kinda like digital signature, if the check is passed - the program is allowed to run. It installed special driver for you CD-ROM drive to count rings of the data on the disc.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |