Software Scan
|
The President's Column
|
Are you up to a software forensics challenge? If so, prove it and
earn $100,000 in the
Zeidman Challenges. Read the details in this
month's Scanning IP section of the SAFE
newsletter.
What do you need to do to protect your software
intellectual property? Read about it in this month's
Scanning the Literature section of the SAFE
newsletter.
Regards,
Bob
Zeidman
President, SAFE Corporation
|
Scanning IP
|
The $100,000 Zeidman Challenges
Zeidman Consulting is offering two $100,000 awards for solving
software forensic problems using accepted forensic tools and
techniques.
Challenge #1: Prove DOS was copied from CP/M
Bob Zeidman has determined that DOS was not coped from CP/M. If
you can prove him wrong,
here are the instructions for applying for the award.
Challenge #2: Find Gary Kildall's Secret Command in DOS
Bob Zeidman has determined that the long-rumored secret command
does not exist in either CP/M or DOS. If you can prove him wrong,
here are the instructions for applying for the award.
First, you might want to view Bob's presentation at the Vintage
Computer Festival
here, you can read his paper in the Journal of Computer and
Communications
here, and you can download his results
here.
|
Scanning the Literature
|
How do you protect your software intellectual property?
Fifteen years ago when CBS first tapped the seemingly bottomless
well that is the CSI: Crime Scene Investigation television
franchise, no one could have predicted the genre would reach such
heights. Today, entire television networks are devoted to “whodunit”
stories that are solved with modern-day forensics by a single fiber
or a tiny speck of blood. As fascinating as this area is, most of us
will hopefully never be involved in a situation where we need this
level of sophisticated investigative skills. But we may be involved
with cybercrime. In the digital world, the smoking gun is often
digitally encoded and can be identified by scanning hard disks, log
files, and user accounts for any hint of wrongdoing.
So, what happens when a digital crime is committed, and how would
you go about solving it? Read the article "What If Someone Steals Your Code?" in the
Fall 2016 issue of Better Software Magazine.
|
|
Advanced Tools to Detect Plagiarism and IP Theft
|
|
CodeSuite®
& CodeSuite-LT®
Sophisticated sets of tools for analyzing software source code and
object code including:
BitMatch®
Check binary object code for plagiarism.
CodeCLOC®
Measure software IP changes between versions of a program.
CodeCross®
Cross check source code for plagiarism.
CodeDiff®
Compare source code to find differences and measure changes.
CodeMatch®
The premiere tool for pinpointing copied source code.
SourceDetective®
Scour the Internet for plagiarized code.
CodeSuite-MP®
Speed up your analysis on a multiprocessor system.
CodeGrid®
Turbo charge your analysis on a supercomputer grid.
HTML
Preprocessor
Divide HTML pages into their basic elements for easier analysis.
|
DocMatch™
Find signs of copying in any document.
|
Get Smart
|
SAFE offers training at our facility or yours or on the Web. Contact
us to make arrangements:
MCLE credit
in software IP
CodeSuite
certification
|
Your New Office
|
Remember that you can have your own secure office at the SAFE facility
for storing proprietary software, running CodeSuite, analyzing the
results, and getting onsite support. We're located at
20863 Stevens Creek Blvd.
Suite 456
Cupertino, CA 95014
(408) 517-1167
|
|