RU

Keyword: «hacking»

The article presents the evolution of protection systems, using the example of the most popular systems at the time. There were indicated ways of how cybercriminals bypassed the protection of mobile products (cybercriminals provide unauthorized access to licensed products). The purpose of this paper is to verify the execution of the copyright protection program.