SAFE Banner

OCTOBER 2016

VOLUME 8, ISSUE 5

Software Scan

The President's Column

Are you up to a software forensics challenge? If so, prove it and earn $100,000 in the Zeidman Challenges. Read the details in this month's Scanning IP section of the SAFE newsletter.

What do you need to do to protect your software intellectual property? Read about it in this month's Scanning the Literature section of the SAFE newsletter.

Regards,


Bob Zeidman
President, SAFE Corporation


Scanning IP

The $100,000 Zeidman Challenges

Zeidman Consulting is offering two $100,000 awards for solving software forensic problems using accepted forensic tools and techniques.

Challenge #1: Prove DOS was copied from CP/M

Bob Zeidman has determined that DOS was not coped from CP/M. If you can prove him wrong, here are the instructions for applying for the award.

Challenge #2: Find Gary Kildall's Secret Command in DOS

Bob Zeidman has determined that the long-rumored secret command does not exist in either CP/M or DOS. If you can prove him wrong, here are the instructions for applying for the award.

First, you might want to view Bob's presentation at the Vintage Computer Festival here, you can read his paper in the Journal of Computer and Communications here, and you can download his results here.

Scanning the Literature

How do you protect your software intellectual property?

Fifteen years ago when CBS first tapped the seemingly bottomless well that is the CSI: Crime Scene Investigation television franchise, no one could have predicted the genre would reach such heights. Today, entire television networks are devoted to “whodunit” stories that are solved with modern-day forensics by a single fiber or a tiny speck of blood. As fascinating as this area is, most of us will hopefully never be involved in a situation where we need this level of sophisticated investigative skills. But we may be involved with cybercrime. In the digital world, the smoking gun is often digitally encoded and can be identified by scanning hard disks, log files, and user accounts for any hint of wrongdoing.

So, what happens when a digital crime is committed, and how would you go about solving it? Read the article "What If Someone Steals Your Code?" in the Fall 2016 issue of Better Software Magazine.

Advanced Tools to Detect Plagiarism and IP Theft

CodeSuite® & CodeSuite-LT®
Sophisticated sets of tools for analyzing software source code and object code including:

BitMatch®
Check binary object code for plagiarism.

CodeCLOC®
Measure software IP changes between versions of a program.

CodeCross®
Cross check source code for plagiarism.

CodeDiff®
Compare source code to find differences and measure changes.

CodeMatch®
The premiere tool for pinpointing copied source code.

SourceDetective®
Scour the Internet for plagiarized code.

CodeSuite-MP®
Speed up your analysis on a multiprocessor system.

CodeGrid®
Turbo charge your analysis on a supercomputer grid.

HTML Preprocessor
Divide HTML pages into their basic elements for easier analysis.

DocMatch
Find signs of copying in any document.

Get Smart

SAFE offers training at our facility or yours or on the Web. Contact us to make arrangements:

MCLE credit in software IP

CodeSuite certification

Your New Office

Remember that you can have your own secure office at the SAFE facility for storing proprietary software, running CodeSuite, analyzing the results, and getting onsite support. We're located at

20863 Stevens Creek Blvd.
Suite 456
Cupertino, CA 95014
(408) 517-1167

 

This newsletter is not legal advice. Views expressed herein should be checked for accuracy and current applicability.
Copyright 2016 Software Analysis & Forensic Engineering Corporation