1/61
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
What is the primary way you acquire software?
You license the use of the software.
Why is software licensing necessary?
Because all software is copyright protected and easy to duplicate.
software licensing
Highest TCO of a system (Total Cost of Ownership)
Two ways software licensing can be categorized
- proprietary
- free/ open source
all software is licensed t/f
t
license usually comes w/ off-the-shelf software
OEM license included w/ software bundled w/ hardware
e.g. new computer purchase
licensing is usually confirmed through the use of a license agreement`
EULAs are included
What is proprietary licensing?
A license granted for use of a copy of software while ownership remains with the publisher.
What rights are typically limited in proprietary licensing?
Many rights denied to the end-user include reverse engineering, source code modifications, and redistributions.
What must the end-user do before installing proprietary licensed software?
The end-user must accept the license agreement prior to installation.
two models of proprietary licenses
time based
deployment based
some licensing schemes combine these two
time based licensing
perpetual licenses
annual licenses
software rental (use for demo versions of software)
What is software maintenance?
An add-on program where you pay an annual fee to get upgraded support.
What does software maintenance typically cover?
Functionality upgrades and security fixes.
What is required to access software maintenance?
A valid license for the software.
What type of support does software maintenance include?
A support program that goes above and beyond the standard warranty.
Are there different tiers available in software maintenance?
Yes, tiers are available that provide better service for more money.
Is the cost of software maintenance additional to the initial software/license cost?
Yes, it is an additional cost.
deployment based licensing
Licensing that is based on how software is deployed, not based on time
two types of deployment based licensing
- stand-alone software licensing
- client /server licensing
Stand-Alone Licensing
Software that runs on an individual machine rather than in a client/server environment
Two approaches to stand-alone licensing
individual licenses (tied to particular machine)
floating licenses (cover concurrent usage, regardless of the number of installations)
Client / Server Licensing
Software that has both a client-side andserver-side component
teo approaches of client/ server licensing
pre-connection licenses
client access licenses (CAL)
What are Per-Connection Licenses?
Licenses that govern the number of concurrent connections to a particular server.
How are Per-Connection Licenses enforced?
They are enforced on the server.
How are Per-Connection Licenses purchased?
They are purchased per server regardless of the number of clients.
What are client access licenses?
Licenses that govern how a client accesses server-based resources.
How are client access licenses purchased?
Purchased per client regardless of the number of servers.
volume licensing
When offered, volume licensing allows asingle license key to validate multiplesoftware copies
Often used in government or education
Costs are allocated based on the number of individuallicenses in the pool
Originally, there was no formal mechanism to track how many copies of the software wereinstalled
More recently, this was replaced with activationrequirements
volume licensing is easy to exploit
FCKGW key
Timestop t2a hack
Microsoft deployed several mechanisms to eliminate piracy
- enforced proct activation
- windows genuine advantage
- key management server deployments
What is KMS in the context of Microsoft solutions?
KMS stands for Key Management Server, which is Microsoft's solution to volume licensing.
What is configured with a Volume License Key (VLK) in KMS?
The KMS host is configured with a Volume License Key (VLK).
How does Microsoft validate a key in KMS?
Microsoft validates the key through the KMS host.
How do clients activate with the KMS host?
Clients activate by registering their key with the KMS host.
What command is used for KMS management?
The slmgr command is used for all aspects of KMS management (server and client).
What is the activation threshold for KMS?
The activation threshold is the minimum number of clients that must register with the KMS host, typically 25 for clients and 5 for servers.
What is granted by an open source license?
License is granted for use of a copy of software.
Who retains ownership of the copyright in open source licensing?
The publisher retains ownership of the copyright.
Is acceptance of the open source license agreement mandatory?
Acceptance of the license agreement is optional.
What rights do end-users have under open source licensing?
End-users have the right to reverse engineer, modify source code, and redistribute.
consitions that pertain to opern source licensing
- any modifications and redistribyuted must include source code
- end user not allowed to re-assert the removed copyright restrictions
What is the most common open source licensing?
GNU General Public License
Which open source license originally governed the BSD OS?
BSD License
What software is governed by the MIT License?
X-Windows and PuTTY
Why should software license audits be done?
To ensure compliance.
What can result from non-compliance with software licenses?
Monetary and legal liability.
Who can conduct software license audits?
Internally, voluntarily by a third-party, or forcibly.
Is it possible to be 100% sure of software compliance?
No, it can be difficult to be 100% sure.
What documents are needed if asked for software compliance?
The license and invoice proving legitimate purchase.
What is one way a vendor can conduct an external software audit?
The vendor can be hired to do an audit.
What can a vendor do if they suspect non-compliance?
The vendor can hire a third-party to conduct an audit.
What is the Software & Information Industry Association (SIIA)?
A trade group representing many software vendors.
What was a popular campaign by the SIIA in 1992?
The campaign was called 'Don't Copy That Floppy.'
When was the Business Software Alliance (BSA) founded?
1988
What is the main focus of the Business Software Alliance (BSA)?
To stop software copyright infringement
Name three members of the Business Software Alliance (BSA).
Microsoft, Dell, HP, Adobe, Intuit, Cisco, Sybase, Symantec
What controversial tactic has the BSA used to gather information?
Offering a reward of $200K to disgruntled employees who report on their company
Who can provide information to the BSA about copyright infringement?
Fired employees or competitors
What type of collaboration does the BSA engage in to enforce copyright laws?
Collaboration with vendors and law enforcement
What are the potential consequences of copyright infringement according to the BSA?
Criminal liabilities
software license audits should be done
periodically