{"id":2775,"date":"2014-01-13T10:53:44","date_gmt":"2014-01-13T15:53:44","guid":{"rendered":"http:\/\/www.kaspersky.co.in\/blog\/?p=2775"},"modified":"2020-12-14T23:37:19","modified_gmt":"2020-12-14T18:07:19","slug":"telltale-signs-of-illegal-software","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/telltale-signs-of-illegal-software\/2775\/","title":{"rendered":"Telltale Signs of Illegal Software"},"content":{"rendered":"<p>Hello Kaspersky Lab blog readers! We\u2019re always reminding you how important it is to buy licensed products. However, you should remember that not all software sold in stores or online is official. There are cases where this software turns out to be pirated copy, even if they look authentic at first glance. This problem is especially important when you deal with seasonal sales and clearances.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/05094704\/pirated.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3426 aligncenter\" alt=\"pirated\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163825\/pirated-1.jpeg\" width=\"640\" height=\"480\"><\/a><\/p>\n<p>Today I am going to explain how to avoid becoming a victim of fraud. As soon as you try to activate a <a href=\"https:\/\/www.kaspersky.com\/free-trials\/multi-device-security-download?redef=1&amp;reseller=blog_en-global\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky product<\/a> with a pirated code, the software will inform you it is invalid.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/05083806\/Screen-Shot-2014-01-13-at-10.28.33-AM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3427 aligncenter\" alt=\"Screen Shot 2014-01-13 at 10.28.33 AM\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163829\/Screen-Shot-2014-01-13-at-10.28.33-AM-1.png\" width=\"702\" height=\"427\"><\/a><\/p>\n<p>Attempts to request a refund from pirates are never successful. That is why it is better to take a closer look at the box before you buy it.\u00a0 In this article you will find a few tips on how to distinguish a genuine product from counterfeit software. All the pictures in this post are real examples of pirated copies of Kaspersky Lab products. The codes you see on the pictures are already blocked.<\/p>\n<p>The design of cards and boxes can differ depending on the region, but some general components remain the same. The most evident example is the use of grammatical errors.\u00a0 All text on original cards and boxes is written <b>correctly<\/b>.<\/p>\n<p>First and foremost, the only correct spelling of the company name is \u201cKaspersky Lab\u201d.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/05083813\/piracy1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3428 aligncenter\" alt=\"piracy1\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163831\/piracy1-1.png\" width=\"255\" height=\"129\"><\/a><\/p>\n<p>All words in the name of the product start with capital letters:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/05083811\/piracy2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3429 aligncenter\" alt=\"piracy2\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163835\/piracy2-1.png\" width=\"754\" height=\"194\"><\/a><\/p>\n<p>As well as the CEO\u2019s last name:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/05083810\/piracy3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3430 aligncenter\" alt=\"piracy3\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163840\/piracy3-1.png\" width=\"740\" height=\"375\"><\/a><\/p>\n<p>As you can see in these pictures, pirates rarely care about the correct spelling of the company name. It is one of the most evident signs of a pirated product.<\/p>\n<p>Errors can vary, though. Here you can see some grammatical issues:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/05083808\/piracy4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3431 aligncenter\" alt=\"piracy4\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163844\/piracy4-1.png\" width=\"477\" height=\"325\"><\/a><\/p>\n<p>Missed spacebars,<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/05083808\/piracy5-1024x296.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3432 aligncenter\" alt=\"piracy5\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/05084510\/piracy5-1.png\" width=\"1717\" height=\"497\"><\/a><\/p>\n<p>letters, and even words:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/05083804\/piracy6-1024x431.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3437 aligncenter\" alt=\"piracy6\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163905\/piracy6-1024x431-1.png\" width=\"1474\" height=\"621\"><\/a><\/p>\n<p>Sometimes you can get a whole range of mistakes and typos on one package:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/05083802\/piracy7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3439 aligncenter\" alt=\"piracy7\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163911\/piracy7-1.png\" width=\"606\" height=\"299\"><\/a><\/p>\n<p>When the pirates distribute their goods in more than one region, you can encounter the unfilled regional restrictions template on the box, like the one in the picture:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/05083801\/piracy8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3440 aligncenter\" alt=\"piracy8\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163915\/piracy8-1.png\" width=\"479\" height=\"401\"><\/a><\/p>\n<p>Here is a more advanced variant:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/05083800\/piracy9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3441 aligncenter\" alt=\"piracy9\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163918\/piracy9-1.png\" width=\"245\" height=\"279\"><\/a><\/p>\n<p>Well, you have found a box that does not cause any suspicion and looks perfectly normal on the outside. Still, we recommend opening it and checking the contents in the sales clerk\u2019s presence. What should you expect to find inside? The original package includes the document (a card or a Quick Start Guide) with the activation code, End User License Agreement and the installer. The clerk must provide you with a receipt that contains the name of the purchased product and the date of purchase. Otherwise the product is most likely a pirated copy.<\/p>\n<p>But even if all previous tests went smoothly, you still can find some unusual items in the box. The activation code can be used only for one product. What we see here is the code for two products:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163700\/piracy10-1024x609.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3442 aligncenter\" alt=\"piracy10\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163931\/piracy10-1024x609-1.png\" width=\"1056\" height=\"628\"><\/a><\/p>\n<p>The card should have a rectangular form and the code should be covered with a scratch-off layer:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163723\/piracy11-1024x693.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3443 alignnone\" alt=\"piracy11\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163947\/piracy11-1024x693-1.png\" width=\"1430\" height=\"968\"><\/a><\/p>\n<p>The code consists of 20 characters,<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163731\/piracy12.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3444 aligncenter\" alt=\"piracy12\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163954\/piracy12-1.png\" width=\"911\" height=\"281\"><\/a><\/p>\n<p>and is divided into four 5-character groups:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163751\/piracy13-1024x657.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3445 aligncenter\" alt=\"piracy13\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22164008\/piracy13-1024x657-1.png\" width=\"1430\" height=\"918\"><\/a><\/p>\n<p>This card contains some additional contact information and instructions, but these are not the only oddities. Look at the city in the address.<\/p>\n<p>Finally, the cover should be scratched off with a hard object, not torn off:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163809\/piracy14-1024x642.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3446 alignnone\" alt=\"piracy14\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22164022\/piracy14-1024x642-1.png\" width=\"1427\" height=\"894\"><\/a><\/p>\n<p>And it should correspond to the height of the characters in the code:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22163820\/piracy15-650x1024.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3447 aligncenter\" alt=\"piracy15\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/01\/22164031\/piracy15-650x1024-1.png\" width=\"680\" height=\"1072\"><\/a><\/p>\n<p>As you can see, the easiest way to detect a pirated copy is to pay attention to the package and the text on it. Do not rush to buy a cheap product, as you then might have to pay twice: the company bears no responsibility to exchange or refund in the case of a pirated copy.<\/p>\n<p>Your safest bet is to buy licenses from our authorized partners. On the official website, you will find the list of Kaspersky Lab partners in your region: <a href=\"https:\/\/me.kaspersky.com\/en\/partners\/buyoffline\" target=\"_blank\" rel=\"noopener\">https:\/\/me.kaspersky.com\/en\/partners\/buyoffline<\/a><\/p>\n<p>Enjoy your genuine Kaspersky Lab software!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hello Kaspersky Lab blog readers! We\u2019re always reminding you how important it is to buy licensed products. However, you should remember that not all software sold in stores or online<\/p>\n","protected":false},"author":208,"featured_media":2776,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[352,498],"class_list":{"0":"post-2775","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-products","8":"tag-kaspersky-lab","9":"tag-software-products"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/telltale-signs-of-illegal-software\/2775\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/telltale-signs-of-illegal-software\/2669\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/telltale-signs-of-illegal-software\/2992\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/telltale-signs-of-illegal-software\/2831\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/telltale-signs-of-illegal-software\/3434\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/telltale-signs-of-illegal-software\/3434\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/telltale-signs-of-illegal-software\/3434\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/kaspersky-lab\/","name":"Kaspersky Lab"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/2775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/208"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=2775"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/2775\/revisions"}],"predecessor-version":[{"id":22244,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/2775\/revisions\/22244"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/2776"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=2775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=2775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=2775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}