Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
DRM Games

Free Copy of the Sims 2 Contains SecuROM 234

dotarray (1747900) writes By now, everybody should know that if something looks too good to be true, it probably is. Let's apply that to EA, shall we? The publisher is giving away copies of The Sims 2: Ultimate Collection, for free... and not mentioning that it includes the controversial SecuROM anti-piracy software. Nobody likes SecuROM.
This discussion has been archived. No new comments can be posted.

Free Copy of the Sims 2 Contains SecuROM

Comments Filter:
  • Re:Who cares? (Score:2, Informative)

    by Anonymous Coward on Tuesday July 29, 2014 @07:37AM (#47556093)

    The difference between Steam and SecuROM is that when Steam fucks up, I can't play my game.

    When SecuROM 7 fucked up, I couldn't use my DVD burner.

    It's not as bad as Starforce, but that's not saying much.

  • Re:Anybody know? (Score:4, Informative)

    by Talderas ( 1212466 ) on Tuesday July 29, 2014 @07:50AM (#47556129)

    No. ESPESCIALLY for free games. Why add copy protection to free stuff anyway? It's free to begin with! No one needs or wants to "pirate" it. Unless of course you need a "pirated" copy of the game to keep the negative SecuROM effects from your system.

    Because everyone and their mother didn't pay attention to what actually happened. EA provides The Sims 2 through Origin at a cost. They are currently giving copies of the game away, through Origin, if you use a redemption code which is only valid through July 31st. After that date, you will have to go back to paying for the game if you want to acquire it. You could also acquire the game right now without the redemption code, you'll just have to pay for it. So the game isn't permanently free, it's temporarily free, and it's using the exact same distribution method and version that the not-free version of The Sims 2 uses.

  • Re:Could be worse (Score:5, Informative)

    by TheP4st ( 1164315 ) on Tuesday July 29, 2014 @08:12AM (#47556215)

    you got it for free if you had the promo code so can't really bitch about the DRM in it.

    If I have not been (clearly) informed of it's presence and implications by the publisher I certainly can and so should any person that consider themselves the owner of their machine when it is DRM that is known to:
    - Generate false positives on authentic discs.
    - Create files and reg keys that you cannot access/remove as admin.
    - Snoop on your software usage 24/7.
    - Conflict with debugging software and in some instances even require debuggers to be un-installed in order for you to play the game.
    - Remain installed after you have un-installed the game.

  • by TheP4st ( 1164315 ) on Tuesday July 29, 2014 @08:19AM (#47556237)
    It can be removed but not without quite a bit of hassle. http://www.reclaimyourgame.com... [reclaimyourgame.com]
  • Re:Anybody know? (Score:2, Informative)

    by Anonymous Coward on Tuesday July 29, 2014 @09:03AM (#47556463)

    I don't know about all versions of windows, but in at least some of them you can see all the processes, you just can't directly affect ones from other users.

    Not when a root-kit is in the kernel and masking certain processes from the standard APIs.

    http://en.wikipedia.org/wiki/Rootkit#Kernel_mode

    "Kernel-mode rootkits run with the highest operating system privileges (Ring 0) by adding code or replacing portions of the core operating system, including both the kernel and associated device drivers. Most operating systems support kernel-mode device drivers, which execute with the same privileges as the operating system itself. As such, many kernel-mode rootkits are developed as device drivers or loadable modules, such as loadable kernel modules in Linux or device drivers in Microsoft Windows. This class of rootkit has unrestricted security access, but is more difficult to write.[27] The complexity makes bugs common, and any bugs in code operating at the kernel level may seriously impact system stability, leading to discovery of the rootkit.[27] One of the first widely known kernel rootkits was developed for Windows NT 4.0 and released in Phrack magazine in 1999 by Greg Hoglund.[28][29][30]

    "Kernel rootkits can be especially difficult to detect and remove because they operate at the same security level as the operating system itself, and are thus able to intercept or subvert the most trusted operating system operations. Any software, such as antivirus software, running on the compromised system is equally vulnerable.[31] In this situation, no part of the system can be trusted.

    "A rootkit can modify data structures in the Windows kernel using a method known as direct kernel object manipulation (DKOM).[32] This method can be used to hide processes. A kernel mode rootkit can also hook the System Service Descriptor Table (SSDT), or modify the gates between user mode and kernel mode, in order to cloak itself.[3] Similarly for the Linux operating system, a rootkit can modify the system call table to subvert kernel functionality.[33] It's common that a rootkit creates a hidden, encrypted filesystem in which it can hide other malware or original copies of files it has infected.[34]"

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...