Solved

What is the best DRM sollution to impliment as a DRM sollution

Posted on 2006-07-09
6
249 Views
Last Modified: 2010-04-11
what is the least expensive
what is the best technology
0
Comment
Question by:itbabe
  • 2
  • 2
6 Comments
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 17068809
For what content?
PDF files try FileOpen http://www.fileopen.com/products_compare.html The methods used in fileopen are as of yet, not publicly exploited, however print-screen can still be used to copy an image of a PDF no matter what "DRM" is employed.
As far as video and audio, nothing works, all have fallen. DVD, X-box, PS2, MacroVision, Windows DRM, Apple iTunes, Napster MP3's .... all have work arounds that produce very highquality copies, or hacks that produce exact copies.
http://en.wikipedia.org/wiki/Digital_rights_management
Sony F'd up and installed a rootkit... http://xinn.org/Sony-DRM.html

For those users that aren't savvy enough to work around DRM software, there is plenty to choose from. Just know that you cannot and will not protect all content as long as you do not control the hardware itself.
-rich
0
 
LVL 6

Assisted Solution

by:kaerez
kaerez earned 100 total points
ID: 17069207
Please be more specific, DRM solution for which sort of content ?
What sort of DRM managment would you like to have for this content?
0
 

Author Comment

by:itbabe
ID: 17080324
It has to be used to control access to streaming video.
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 400 total points
ID: 17080797
Microsoft has a good DRM scheme. http://www.microsoft.com/windows/windowsmedia/forpros/drm/faq.aspx
QuickTime (apple) does also: http://en.wikipedia.org/wiki/FairPlay
-rich
0
 
LVL 6

Expert Comment

by:kaerez
ID: 17235161
Why not spread the points as I have asked for which media type in order to give a specialized
response...

;-)
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Suggested Solutions

It’s a strangely common occurrence that when you send someone their login details for a system, they can’t get in. This article will help you understand why it happens, and what you can do about it.
Never store passwords in plain text or just their hash: it seems a no-brainier, but there are still plenty of people doing that. I present the why and how on this subject, offering my own real life solution that you can implement right away, bringin…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now