• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 262
  • Last Modified:

What is the best DRM sollution to impliment as a DRM sollution

what is the least expensive
what is the best technology
0
itbabe
Asked:
itbabe
  • 2
  • 2
2 Solutions
 
Rich RumbleSecurity SamuraiCommented:
For what content?
PDF files try FileOpen http://www.fileopen.com/products_compare.html The methods used in fileopen are as of yet, not publicly exploited, however print-screen can still be used to copy an image of a PDF no matter what "DRM" is employed.
As far as video and audio, nothing works, all have fallen. DVD, X-box, PS2, MacroVision, Windows DRM, Apple iTunes, Napster MP3's .... all have work arounds that produce very highquality copies, or hacks that produce exact copies.
http://en.wikipedia.org/wiki/Digital_rights_management
Sony F'd up and installed a rootkit... http://xinn.org/Sony-DRM.html

For those users that aren't savvy enough to work around DRM software, there is plenty to choose from. Just know that you cannot and will not protect all content as long as you do not control the hardware itself.
-rich
0
 
kaerezCommented:
Please be more specific, DRM solution for which sort of content ?
What sort of DRM managment would you like to have for this content?
0
 
itbabeAuthor Commented:
It has to be used to control access to streaming video.
0
 
Rich RumbleSecurity SamuraiCommented:
Microsoft has a good DRM scheme. http://www.microsoft.com/windows/windowsmedia/forpros/drm/faq.aspx
QuickTime (apple) does also: http://en.wikipedia.org/wiki/FairPlay
-rich
0
 
kaerezCommented:
Why not spread the points as I have asked for which media type in order to give a specialized
response...

;-)
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Simple Misconfiguration =Network Vulnerability

In this technical webinar, AlgoSec will present several examples of common misconfigurations; including a basic device change, business application connectivity changes, and data center migrations. Learn best practices to protect your business from attack.

  • 2
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now