No-CD crack
Encyclopedia
A No-CD crack or No-DVD crack is a modified executable
Executable
In computing, an executable file causes a computer "to perform indicated tasks according to encoded instructions," as opposed to a data file that must be parsed by a program to be meaningful. These instructions are traditionally machine code instructions for a physical CPU...

 file or a special "byte patcher" program that removes built-in CD check mechanisms allowing the user to run computer software
Computer software
Computer software, or just software, is a collection of computer programs and related data that provide the instructions for telling a computer what to do and how to do it....

 without having to insert their required CD-ROM
CD-ROM
A CD-ROM is a pre-pressed compact disc that contains data accessible to, but not writable by, a computer for data storage and music playback. The 1985 “Yellow Book” standard developed by Sony and Philips adapted the format to hold any form of binary data....

 or DVD-ROM.

This act is a form of software cracking
Software cracking
Software cracking is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods: copy protection, trial/demo version, serial number, hardware key, date checks, CD check or software annoyances...

. No-CD cracks can be found on the Internet from various reverse engineering
Reverse engineering
Reverse engineering is the process of discovering the technological principles of a device, object, or system through analysis of its structure, function, and operation...

 websites or file sharing
File sharing
File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multimedia , documents, or electronic books. It may be implemented through a variety of ways...

 networks. No-CD cracks have legal uses, such as creating backups of legally owned software (a user right by law in many countries) or avoiding the inconvenience of placing a CD or DVD-ROM in the drive every time the software is being used, although this can be used likewise to circumvent software laws by allowing the execution of full versions of non-legally owned applications or time-limited trials of the applications without the original disc.

In addition to cracked executable
Executable
In computing, an executable file causes a computer "to perform indicated tasks according to encoded instructions," as opposed to a data file that must be parsed by a program to be meaningful. These instructions are traditionally machine code instructions for a physical CPU...

 files or byte patchers, CD protection can sometimes be thwarted by producing a mini image containing only enough of the software's CD-ROM contents needed to bypass protection. This image can then be mounted with a disk image emulator such as Daemon Tools
Daemon Tools
Daemon Tools is a disk image emulator and optical disc authoring program for Microsoft Windows. Daemon Tools was originally a furtherance in the development of another program, Generic SafeDisc emulator, and incorporated all of its features. The program claims to be able to defeat most copy...

to trick the user's computer into believing the disk image is the software's physical CD-ROM and it is in the drive. As a side benefit, data from mounted disk images generally load much faster than a real disk would because the data is stored on the hard drive. Some programs, however, attempt to discover such disk image emulators and will refuse to work if one is found. Other programs exist that attempt to hide the presence of disk image emulators from such protected software.

See the below excerpt from United States Copyright Law in regards to computer software.


§ 117. Limitations on exclusive rights: Computer programs

(a) Making of Additional Copy or Adaptation by Owner of Copy. — Notwithstanding the provisions of section 106, it is not an infringement for the owner of a copy of a computer program to make or authorize the making of another copy or adaptation of that computer program provided:

(1) that such a new copy or adaptation is created as an essential step in the utilization of the computer program in conjunction with a machine and that it is used in no other manner, or

(2) that such new copy or adaptation is for archival purposes only and that all archival copies are destroyed in the event that continued possession of the computer program should cease to be rightful.

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK