?
Solved

What is the best DRM sollution to impliment as a DRM sollution

Posted on 2006-07-09
6
Medium Priority
?
258 Views
Last Modified: 2010-04-11
what is the least expensive
what is the best technology
0
Comment
Question by:itbabe
  • 2
  • 2
5 Comments
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 17068809
For what content?
PDF files try FileOpen http://www.fileopen.com/products_compare.html The methods used in fileopen are as of yet, not publicly exploited, however print-screen can still be used to copy an image of a PDF no matter what "DRM" is employed.
As far as video and audio, nothing works, all have fallen. DVD, X-box, PS2, MacroVision, Windows DRM, Apple iTunes, Napster MP3's .... all have work arounds that produce very highquality copies, or hacks that produce exact copies.
http://en.wikipedia.org/wiki/Digital_rights_management
Sony F'd up and installed a rootkit... http://xinn.org/Sony-DRM.html

For those users that aren't savvy enough to work around DRM software, there is plenty to choose from. Just know that you cannot and will not protect all content as long as you do not control the hardware itself.
-rich
0
 
LVL 6

Assisted Solution

by:kaerez
kaerez earned 400 total points
ID: 17069207
Please be more specific, DRM solution for which sort of content ?
What sort of DRM managment would you like to have for this content?
0
 

Author Comment

by:itbabe
ID: 17080324
It has to be used to control access to streaming video.
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 1600 total points
ID: 17080797
Microsoft has a good DRM scheme. http://www.microsoft.com/windows/windowsmedia/forpros/drm/faq.aspx
QuickTime (apple) does also: http://en.wikipedia.org/wiki/FairPlay
-rich
0
 
LVL 6

Expert Comment

by:kaerez
ID: 17235161
Why not spread the points as I have asked for which media type in order to give a specialized
response...

;-)
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
Experts Exchange expands question security options for members.
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question