CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

Overview

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver and weak CD sectors. Information on CD functioning fundamentals and tips related to CD protection in a format free of math and assembling-such as data formats, the ...
See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (14) from $8.45   
  • New (1) from $75.49   
  • Used (13) from $8.45   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$75.49
Seller since 2014

Feedback rating:

(273)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand New Item.

Ships from: Chatham, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver and weak CD sectors. Information on CD functioning fundamentals and tips related to CD protection in a format free of math and assembling-such as data formats, the scrambler, the Reed-Solomon coder/encoder, the CIRC coder/encoder, and a weak-sectors generator-are also provided. The main program interfaces, which provide direct control via peripheral devices on the application level in UNIX, Novell, and Windows 9x/NT/2000/XP, are considered, as is how to read and write RAW sectors.

Author Biography: Kris Kaspersky is an IT consultant working in security and system programming. He specializes in issues such as compiler development, optimization techniques, security mechanism research, real-time OS kernel creation, software protection, and the creation of antivirus programs. He is the author of Hacker Disassembling Uncovered.

Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
Enormous effort has gone into creating technologies that protect CDs against piracy. CD Cracking Uncovered offers a comprehensive roundup describing these technologies, how they’re evaded, and new approaches that may be far harder to defeat. Whether you want to protect your creative content or your “fair use” rights, it’s fascinating reading.

Kris Kaspersky covers approaches based on non-standard disc formats, invalid track numbering, preventing playback on PC CD-ROM drives, deterring file-by-file copying; binding to storage media; and more. Along the way, he offers practical insights into CD file organization; CD-ROM driver interaction with hardware; and the use of Reed-Solomon error correction -- a crucial topic for those building CD anti-piracy systems, and one that’s rarely presented this clearly. Bill Camarda

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2003 and Upgrading & Fixing Networks for Dummies, Second Edition.

Read More Show Less

Product Details

  • ISBN-13: 9781931769334
  • Publisher: A-List, LLC
  • Publication date: 5/28/2004
  • Series: Uncovered series
  • Pages: 300
  • Product dimensions: 7.42 (w) x 9.22 (h) x 0.82 (d)

Table of Contents

Preface 1
Introduction 3
Notation Conventions 4
Historical Aspect 4
Thoughts about Hackers, Protection Mechanisms, and Programming 10
Part I CD Anathomy 13
Chapter 1 CD Organization 15
Pits, Lands, Frames, and Sectors in Brief 16
Subcode Channels 18
Sector Addressing 21
Raw and Cooked Sectors 22
Sync Groups, Merging Bits, and DSV 25
Scrambling 29
F1-, F2-, and F3 Frames and CIRC Encoding 38
Lead-in Area, Data Area, Lead-out Area, and TOC 46
Chapter 2 Power of Reed-Solomon Codes 49
Basics of Error-Correcting Codes and Error-Correcting Encoding 51
Idea of Reed-Solomon Codes 58
General Concept 63
Recommended Reading 63
Polynomial Arithmetic and Galois Fields 64
Polynomial Arithmetic 65
Galois Fields 66
Addition and Subtraction in Galois fields 68
Multiplication in Galois Fields 69
Division in Galois Fields 75
Simplest Practical Implementations 76
Reed-Solomon Codes in Practical Implementations 80
Legend 80
Encoder 81
Decoder 85
Syndrome Decoder 86
Error Locator Polynomial 87
Polynomial Roots 89
Data Recovery 89
Source Code of the Decoder 89
Interface to the ElByECC.DLL Library 89
Linking the ElByECC.DLL Library to Your Programs 90
GenECCAndEDC_Model 91
CheckSector 92
Final 92
Part II Low-level Control Over Hardware 95
Chapter 3 Practical Advice on Urgent System Recovery 97
Applications, Illegal Operations, and Everything Else 97
Doctor Watson 99
Microsoft Visual Studio Debugger 106
Inhabitants of the Shadowy Zone, or From Morgue to Reanimation 108
Forcibly Exiting the Function 108
Unwinding the Stack 111
Passing Control to the Message Handler Function 115
How to Process Memory Dump 122
Recovering the System after Critical Failure 130
Loading the Crash Dump 130
Chapter 4 Interfaces for Interaction with the Hardware 137
Access via the CD-ROM Driver 138
Access in the Cooked Mode (Block Reading Mode) 146
Access via SPTI 149
Access via ASPI 169
Access via the SCSI Port 181
Accessing the Drive via SCSI Miniport 185
Communication via Input/Output Ports 194
Access via the MSCDEX Driver 205
Communicating via the Custom Driver 208
Summary Table of Characteristics of Various Interfaces 209
Chapter 5 Methods of Revealing Protection Mechanisms 211
CD Burning: Pros, Cons, and Something about 213
Locking and Unlocking the EJECT Button 217
Hacking Secrets. Brake Fluid for CDs 219
Investigation of Real Programs 220
Alcohol 120% 220
Easy CD Creator 221
Clone CD 221
Part III Protection Against Unauthorized Copying and Data Recovery 223
Chapter 6 Anti-Copying Mechanisms 225
Built-in CD Protection 230
Protection Mechanisms Based on Non-Standard Disc Formats 230
Incorrect TOC and its Consequences 230
Incorrect Starting Address for the Track 232
Fictitious Track in the Genuine Track 258
Fictitious Track in the Data Area of a Genuine Track 267
Fictitious Track in the Post-Gap of the Genuine Track 273
Fictitious Track in the Pre-Gap of a Genuine Track 273
Fictitious Track in the Lead-Out Area 277
Fictitious Track Coinciding with the Genuine Track 283
Invalidating Track Numbering 285
Incorrect Starting Number for the First Track 287
Two Identical Tracks 290
Incorrect Number for the Last Track 293
Gap in Track Numbering of the First Session 296
Gap in Track Numbering in the Second Session 299
Discs That Start from a Track With a Number Other Than One 303
Disc with Track Number Zero 304
Track with Non-Standard Number 319
Data Track Disguised as Audio 327
Incorrect Run-out as Protection Tool or X-Sector 334
Chapter 7 Protection Mechanisms for Preventing Playback in PC CD-Rom 345
Audio Overlapped by Data 346
Castrated Lead-Out 350
Negative Starting Address of the First Audio Track 350
Chapter 8 Protection Against File-by-file Disc Copying 353
Invalid File Sizes 354
File Encryption 367
Chapter 9 Protection Mechanisms Based on Binding to Storage Media 375
Putting Marks vs. Dynamic Binding 376
Protection Mechanisms Based on Physical Defects 377
Protection Mechanisms Based on the Read Timing Characteristics 381
Measuring Angles between Sectors 385
Protection Mechanisms Based on Weak Sectors 389
Chapter 10 Data Recovery from CDs 393
Restoring Deleted Files from CD-R/CD-RW 394
Getting Access to Deleted Files 395
Recovering Entire Sessions 400
Beginners' Errors, or What You Should Never Do 401
Restoring Cleared CD-RW Discs 401
How to Recover Unreadable CDs? 408
General Recommendations on Recovery 408
The Disc Cannot Be Recognized by the Drive 410
The Disc is Recognized by the Drive, but Not by the Operating System 412
The Computer Freezes When Inserting the Disc into the Drive 413
The Disc Is Read with Errors 414
On the CD 417
Index 419
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)