Chapter Fifty-Three
Economic income is the main driving force of the author code.
Without the support of life, no one can continue writing.
Please support genuine versions by book friends, so that the author can have the energy to update words every day, and also allow the stories they like to have a beginning and an end.
Here is the anti-theft seal - refreshed in five minutes!
Flower skin!
Qidian Chinese website!
I hope the big guys can understand that it is difficult to write and live a life of writing, but the author and readers are actually not contradictory to understand the interests.
Because the author's code is for readers to see, not for pirated versions.
——————————
Pirate refers to the act of reproduction of works, publications, etc. that are completely consistent with the source code by a new manufacturer without the consent or authorization of the copyright owner. In most countries and regions, this act is defined as an illegal act that infringes on intellectual property rights, or even constitutes a crime, and will be punished by the country where it is located. Pirated publications usually include pirated books, pirated software, pirated audio-visual works, and pirated online knowledge products. Pirates, that is, the term "d version". This infringes on the law and the purchaser cannot obtain the protection of the law.
The box office of theater movies in the 2019 Spring Festival period set a new record, but the issue of pirated films has also attracted social attention. The State Copyright Administration announced on the 18th that in order to maintain a clear online copyright order and promote the healthy and prosperous development of the film industry, the State Copyright Administration, the State Film Administration and other departments have taken various measures to strengthen the copyright protection of theater movies in the Spring Festival period, and severely cracked down on all kinds of online infringement and piracy. [1]
Crazy Spring Festival pirated version
Chinese name pirated foreign name cht �
Table of contents
1 Piracy of Books
?Classification
?Discribing method
2 Piracy of audio-visual products
3 �
?Fake behavior
?End user copy
4 The hazards of piracy
?Technical risks
?Safety risk
?Legal risks
5 Social Risk
6 The pirated ancestor
Book pirated edit
Classification
There are two main types of pirated books in terms of printing quality:
1.
Low-end pirated books. The overall printing quality is poor and easy to identify, which is reflected in: poor paper (thin paper, yellow, gray), uneven ink color, abnormal color, inaccurate overprinting, unclear images, blurred images, often tape marks or patch marks on the edges of the pictures and texts, unstable cutting of the finished product, poor binding quality (there are many quality problems such as missing lines, wrong pages, etc.), and there are many errors in the text and punctuation marks (some typos can reach more than ten in one code), and there are many wrong sentences.
2.
High-end pirated books. The overall printing quality is high, not much different from genuine books, and it is difficult to distinguish. It is reflected in: the paper is better, the ink color is more uniform, the color is better, the overprint is more accurate, the image layer is clearer, the finished product is cut squarely, the binding quality is better, and the text errors are fewer.
Pirated and genuine books
Pirated and genuine books
Generally speaking, low-end pirated books are printed with low-end equipment in small printing factories or underground printing factories. They are produced by some small pirated booksellers, piecemeal and guerrilla warfare. High-end pirated booksellers are made with relatively strong pirated booksellers using higher-end equipment, and some are even printed with imported equipment.
It can be believed that pirated books are still mainly low-end pirated books, and this situation will last for quite some time, but you should also see a small number of high-end pirated books. Therefore, it is not simply believed that "a good printing quality is not a pirated book, and a poor printing quality is a pirated book", nor do you simply think that "pirated books must be cheaper than genuine books."
The most accurate way to identify pirated books is to compare them with the same edition of the original books on paper, printing, and content, and also check whether the copyright page of the book (the copyright page of the genuine book must include the book cataloging data, the publishing unit name and address, book opening, edition, etc.) and international standard book number and barcode logo are complete and clear. If necessary, consult the publisher of the genuine book. Of course, if there is an anti-counterfeiting logo, it is still not difficult to distinguish.
Methods of distinguishing
1. Quality
1. Detailed review of the appearance of the book. Specifically, it is: first-instance cover. Compared with genuine books, the cover of pirated books is often inconsistent in color, either dull and listless, or gorgeous and charming, and the colors are often mixed. As long as you compare it frequently, the differences between them are not difficult to distinguish. Second, look at binding. According to the conventional rules of the publishing industry, an authentic book with more than 200 pages should be discarded and locked wire stapled, plastic wire or wireless glue stapled. However, pirates have pirated books of 300 due to the limitations of printing and binding equipment or the cost reduction.
, Wire staples are still commonly used for more than 400 pages. Third, look at the printing factory. Each publishing house has several fixed printing users, and each printing factory has its own characteristics in paper, ink, and printing. If you pay attention to this, it will help identify pirated books. Fourth, look at the paper. The book should be printed on both sides. If the paper is too thin, it will be easy to mix ink and make the handwriting blurred and difficult to recognize. Therefore, except for dictionaries, the paper used for genuine books is 52 grams or more. Once you encounter a book with thin paper and the other side of the handwriting is exposed, be careful.
2. The text of the book review. There are three characteristics of pirated books in the text: one is typos, different characters, detached characters, and detached characters. There are many wrong sentences: the second is that the layout is often neat, either sparse or dense, with a tight visual sense; the third is that it looks like a copy. Some pirated books do not type separately, but are arranged according to the original copy. Although this can avoid errors in the text and ugly patterns on the typesetting, there are many ink dots on the paper, and the handwriting tends to be fat, which looks similar to the copy that came out of the copy machine. In fact, no matter how fake it is, there is always a distance between pirated books and genuine books. Therefore, it is best to compare multiple books when buying books.
3. Pay attention to book publishing information, such as publishing houses, isbn, editions, etc.
2. Price
Authentic books are priced by relevant departments, so the purchase discounts of genuine booksellers are relatively high, and the purchase discounts are almost the same. Therefore, when asking buyers to buy books in online bookstores, you must compare and ask some books with super low prices before buying them. Don’t be greedy for cheap ones.
3. Source
When buying genuine books, it is best to choose some online bookstores with larger scale and better credit, because these sellers generally have more legitimate purchase channels. If you cannot determine whether the book you want to buy is genuine, you must ask the seller for information and ask the seller to make a guarantee. After receiving the seller's book, if you find that some of the above pirated books are characterized by the above, you should immediately report and complain to the relevant department and make a return request to the seller.
The way of cheating
The way of cheating
Audio-visual products pirated editing
"Piracy of audio-visual products" refers to the illegal copying of copyrighted audio-visual products, counterfeiting and distributing software products. Multimedia products such as movies, TV series, music dramas, etc. are the most common.
Taking movies as an example, there are usually the following forms:
1. Disc version: Most of the pirated discs with relatively better effects are ripped from foreign versions (such as Zone 1) (a few are also made using genuine release discs). Although the visual effect is basically the same as genuine video discs, most of the Chinese dubbing is of very low quality, because the Chinese audio tracks are usually not from the right sources (sneaking recordings in the cinema, etc.), and there are many translation errors.
2. Large disc version: both high-definition movies, usually refer to DVDs, and also to high-quality vcd converted from DVDs.
3. Gun Version (also known as movie version): Movies recorded secretly in cinemas usually have blurry effects, rough and poor quality, dark tones, and sometimes shaking, shadows and noises, but the release speed is extremely fast, only slightly later than the official release abroad.
In addition, a new term for pirated CDs, the D version is often referred to by sellers as the DVD version. The correct source should be the first letter of the pirated word "pirated" pinyin of the word "pirated".
Software pirated editing
"Software piracy" refers to the illegal copying of copyrighted software programs and counterfeiting and distributing software products. Software piracy has a common set of judgment criteria. For specific software, it is necessary to refer to its end user license agreement (eula).
The most common forms of software piracy include:
Fake behavior
Large-scale copying and distribution of illegal software copies
Pirated software on the market
Pirated software on the market (2 photos)
Sales. Counterfeiting refers to the large-scale illegal copying and sales of software products. Many piracy gangs are suspected of organized crime - most of them use cutting-edge technology to imitate and package software products. Packaged pirated software will be sold in the form of similar legal software. In the case of mass production, software piracy has evolved into an absolute criminal activity. With the increasing improvement of the technical means used by counterfeiters, many ordinary consumers cannot effectively distinguish between legal software and counterfeit products. However, for senior professionals or software practitioners, it is not difficult to identify as long as he/she is willing.
End user copy
Simple software copying activities conducted by enterprises and individuals without permission are the most common software piracy. Many commercial software charges fees based on a license (lise). If a user has a license, it means that the user can only use one copy of the software, but usually does not limit the number of installations; some software restricts a certificate to be installed on one machine, and in most cases, sharing with friends can also cause illegal use. This includes the following behaviors:
Install software products on our company's computers beyond the number of licenses purchased;
informal disk recitation behavior between friends and partners;
Formal or informal, anonymous or non-anonymous software sharing behavior, including p2p sharing.
Famous pirated software vendor
The famous pirated software vendors on the market include Century Star, Genuine Star, Popular Science Star, Sutra Library, New Software World, etc. These pirated versions cover the fields of system software CDs, game CDs, music CDs, etc. Most CDs have viruses and malware programs, which bring users the danger of destroying system security.
Pirated hazards
Technical risks
The software is not perfect. Various problems that will arise during use, such as technical risks such as data loss, are usually unable to obtain legal technical support and maintenance services through normal channels. The losses caused may exceed the costs saved by piracy, especially for companies that rely heavily on information technology. In addition, pirated software cannot be fully guaranteed in terms of content, and sellers cannot provide any guarantee for integrity and availability.
Security risks
In the era of i-popularity, viruses often live in pirated software, and ordinary users are usually unable to rely on their own strength to avoid information security risks. Please refer to the virus regulations for the risks derived from this.
Legal risks
Individuals, companies, and organizations that produce, use, and disseminate pirated software may be sued for infringement.
Windows' black screen action when cracking down on piracy
Windows' black screen action when cracking down on piracy
.For production and disseminators, use the Tomato Garden case and Microsoft's crackdown on piracy as reference learning. For users, especially corporate users, you should pay attention to not be lucky and greedy for small profits when you can.
Social risk Editor
Software piracy has greatly hit the domestic information industry, especially the software industry. The domestic software industry is still in its infancy. The ideal situation is that software practitioners develop, sell software products to make profits, and then return to enterprises to cultivate, attract talents, launch better new products, and strengthen the industry. In fact, due to the prevalence of piracy, products are either left unattended or piracy is rampant, and enterprises cannot obtain normal profits to maintain operations. So far, the domestic software industry cannot compete with multinational IT giants. Many outstanding talents are gathered in foreign companies, and domestic software companies also have no funds to cultivate talents and attract talents to develop excellent products. This is a typical vicious cycle. Many software companies have become outsourcing service providers of foreign companies and it is difficult to establish independent products. This is also a pain in China's software industry. Pirates damage national tax revenue.
Before the United States rose to become a global hegemon, in order to improve its education and cultural literacy for all, the United States was a paradise for pirates and gave birth to a "book hunter" with the goal of foreign bestsellers.
New York’s Canal Street and Broadway Street are known as the “Show Water Street” in New York. They are no less famous in the United States than Wall Street because they are the base camp for pirated American products.
In the American version of "Xiu Shui Street", many small shops selling pirated copies hire people to solicit customers. One floor of these shops is full of cheap tourist souvenirs, but the basement is unique. The narrow stairs are crowded with customers, and the simple counter is filled with various pirated discs, including the currently released "Transformers Ii", and the film company will not release genuine discs a few months after the release. There are also a large number of pirated CDs, including the latest rap album that has not yet been released. The genuine computer software costs about $250, which only costs $20 to $25 here; the pirated CDs only cost about $6.
An Australian guy named Diano bought a counterfeit Louis Vuitton leather bag here and exclaimed: "Oh my God, the anti-pirated defender America is actually pirating the copy too!"
In fact, the history of piracy in the United States is as long as the history of this country. The piracy that has been licensed by the US authorities alone lasted for more than a century. Big-name writers such as Dickens and Mark Twain have suffered greatly. No wonder Taiwanese scholar Li Ao said: "The United States is the founder of piracy!"
"Dickens fever" is actually due to piracy
Chapter completed!