Contacts

Software examination, or how scammers profit from government contracts. Software and computer examination Assessment of damage from the use of uncertified software

(software and hardware examination) is carried out to check the operability of a software object and its compatibility with the equipment and software installed on this computer system, in order to establish the authenticity of the software product. Another task of examination software– checking the compliance of actually completed software products with the technical specifications and the contract.

Software expertise required:

  • to determine the causes of software malfunction;
  • to assess the cost and quality of software;
  • to determine changes to the program;
  • to determine the authenticity or counterfeitness of a software product;

Types of software examination

Software expertise can:

  • determine the type and main characteristics of the operating system installed on this computer;
  • determine the type, group affiliation of the software, its purpose, operating algorithm, installation time, methods of input/output of information, types of supported hardware and software platforms;
  • determine the current state of the software object, the presence or absence of deviations from standard (normal) parameters;
  • determine the initial state of the program and the changes made;
  • determine whether changes have been made to the program to overcome the defense;
  • determining how to make changes to the program software environment errors (software environment errors, unauthorized access, exposure to malware, etc.);
  • identify signs of counterfeit software;
  • determine the cause of program failures: action malware, malfunction of hardware components or software errors;
  • determine the existence of a causal relationship between user actions affecting the software and the resulting consequences;
  • determine the identity of the original program and its copy on the media of the computer system under study;
  • identify authorship by specific features of the program;
  • determine whether this program object of copyright and whether it has protection against unlicensed use, and what it consists of.

Software expertise (software and computer expertise, software and hardware expertise, software product expertise) is a study of the functional purpose of a software product, its current state and structural features, characteristics, and operating algorithm. Also, examination of programs makes it possible to determine whether any changes have been made to the software, including changes aimed at overcoming protection. When conducting an independent examination of software, the expert is guided by Federal Law “On Protection of Consumer Rights”, Federal Law “On Information, information technology and on the protection of information” by the Federal Law “On Personal Data” and other legislative acts of the Russian Federation.

Objects software expertise: OS, utility programs, service system information, tools for developing and debugging programs, general-purpose applications (graphical and text editors, spreadsheets, Email etc.).

Software examination issues:

  • What general characteristics does the presented software have? What programs does it consist of?
  • What is the type, name, version, type of application program presented?
  • What is the functional purpose of the software object under study?
  • What is the functional purpose of the presented software product?
  • Determine the compatibility of this software with the software and hardware of the computer system?
  • Have any changes been made to the software algorithm compared to the original state?
  • Does the software object contain hostile functions that lead to blocking, destruction or modification of information?
  • Does the software object have signs (specific signs are listed) of counterfeiting?
  • Are there deviations from normal parameters in the program (signs of infection, undocumented functions)?
  • Do the characteristics of the software correspond to those stated in the regulatory and technical documentation?
  • Does the completed software product (software, developed technical specifications, website, etc.) comply with the requirements of the technical specifications, agreement (contract)?

This story happened more than 3 years ago, so I can safely remove the “trade secret” stamp and voice its details on the Internet.
Colleagues from the financial control department of the Ministry of Defense of the Russian Federation contacted our company with a request to conduct an examination of the software - “ Flight emergency simulation stand" It must be said that colleagues from the Ministry of Defense immediately suspected a catch in the software and decided to conduct an independent expert assessment in order to understand what they were dealing with and whether it was worth the money that was announced in the government contract. And the government contract was no joke; the total cost of the project was about 20 million rubles!

Initial data:
For the study, files were obtained on flash media with a total volume of 2,252,414,699 bytes. The root of the media contained two directories: FltRec02; SM-AS 2006.

Operating system on the computer under study: Microsoft Windows XP Professional.
Analysis of files in a directory FltRec02
File size: 472,899 bytes.

Among all the presented files, only one is bootable - FLTREC02.exe, which cannot be launched.

Analysis of files in a directory SM-AS 2006
Fighter Ace II

Directory size: 2,251,941,800 bytes.

Boot file FIGHTACE.exe

After launching the file, the window shown in Fig. appears on the screen. 2

The presence of an already entered security “key” (see highlight in Fig. 3) indicates the “pirated” origin of the software product!

After installing and launching the program in “play” mode, the user must register on the server of the official manufacturer – Microsoft.

In " training"The “training mode” opens in front of the user, see fig. 5 and 6

Conclusion: The software under study belongs to the class “ Computer games- Simulators", developed by Microsoft Corp., released in 1999, called Fighter Ace II.

The cost of the software product, taking into account its “pirated” origin, is about 70 rubles.

Microsoft Flight Simulator 2002

Boot files FLTSIM98.exe, FS2000.exe, FS2002.exe

These files launch the “Microsoft Flight Simulator 2002” program, which is hidden under the “Flight Emergency Simulation Stand” screensaver. The company ZAO "ХХХХХХ" violated copyright by identifying itself as the developer!

We could not find any information about the legal origin of the software product!

Boot file FSUNINSTALL.exe

Boot file FSEDIT.exe

Conclusion: The software under study belongs to the class “Computer Games - Simulators”, the developer of which is Microsoft Corp., year of release 2002, name – “Microsoft Flight Simulator 2002”.

The cost of the software product, taking into account its “pirated” origin, as well as the cost of designing the splash screen (Fig. 7), is about 200 rubles.

In total, the total cost of software submitted for examination is about 270 rubles.

As a result of the examination, the Ministry of Defense employees were recommended to contact the military prosecutor's office and counterintelligence to conduct an investigation!

    company's newsThe Moscow City Bureau of Commodity Expertise was founded on May 4, 1936. Since then, the Bureau's experts have conducted more than a million examinations. The Bureau has unquestionable authority, both among corporate clients, and among individuals.

    Independent examination reviewsThe MGBTE company provides expert assessment services for all types of property with high quality and conscientiousness and has an excellent reputation among business partners.

    Examples of auto examinationsAfter reading the articles in this section, you will be able to see with your own eyes the whole variety of automotive examinations performed by competent specialists of the Moscow City Bureau of Commodity Examinations.

Expertise of software for compliance with technical specifications

The purpose of the examination: examination of software to determine its compliance with the requirements and conditions of the specification.

Research part

To carry out the examination, access was provided to the software "...", which was installed in local network XXX LLC for the duration of the study.

Software "..." is a system that is designed to maintain a unified database of the company's clients and manage: the full sales cycle, projects, marketing, as well as customer service.

Table 1 - Results of testing technical and functional characteristics

Functionality under study

Conclusion

1. Client management

Unified database of company contacts and contractors

Present, there is a connection between contacts and counterparties

Possibility of multi-level segmentation of contacts and counterparties according to any direct and indirect criteria

Multi-level segmentation is present in the system and works by contact and account fields

Storing data and addresses with the ability to view on a map, careers and contact profiles on social networks

The ability to store data and addresses is present, viewing addresses on interactive map supported, profiles of contact persons on social networks (twitter and facebook) are available

2. Communications management

Maintaining schedule and tasks

Present in the corresponding tabs

Possibility of flexible settings of reminders for various types of activities. Sending reminders to user email

Present. There is a mechanism for setting up sending notifications from business processes. Letters are sent to users' emails

13. System Administration

Multilingual user and administrator interface

On the test bench it is possible to change the language between Russian and English, and vice versa

Setting up access rights to sections with distribution of rights to view, edit and delete down to the fields. The ability to configure access to individual records or operations, as well as specify which sections a user of a certain role will see in his workplace

This functionality is available to the system administrator through the System Design section

14. Other

Availability of training materials

Availability of applications for Android, iOS, Windows Mobile

Applications for Android, iOS and Windows Mobile were found on the corresponding trading platforms

*******************************************************************************************************************************************************

Conclusion

According to the subject of the agreement, it is established that the software complies with all technical and functional characteristics stated in Appendix No. 1 to the License Agreement.

Leave a request for examination

Our professional services will help you protect your legitimate interests in court, as well as before law enforcement agencies.

What we can

Most often, we are contacted by software owners whose copyrights have been violated. To calculate the amount of damage caused by illegal actions of third parties, an assessment is necessary. The examination of the programs will record the fact you need, and the document issued based on the results of the study will have full legal force.

In addition, our specialists will analyze factors indicating the degree of security, including legal security, of your software product. The examination of programs will help to identify any weaknesses in this context, and the expert report will contain recommendations for eliminating them.

We also provide the following services:

  • checking the quality of the developed software;
  • checking the software for compliance with the technical specifications and terms of the contract.

Definition of concepts

Independent examination of information systems and software products is a whole complex of studies. Its goal is to solve problems of the identification level of information and software on appropriate media. Specialists discover patterns in the development and use of software, study the functional meaning and characteristics of the algorithm, structural features and current state, and also determine whether changes have been made to overcome the protection. Information research is carried out on the basis of an analysis of the media format and placement of data, where access to it is determined (degree of security, characteristics, ability to overcome protection), assessment of information created by a program or user to organize information processes.

Expertise of software and information systems involves research:

  • system software
  • application software
  • data in multimedia formats
  • text and graphic documents
  • information in database formats and other applications of an applied nature.

When is software and information systems expertise needed?

An independent study is required in the following cases:

  • if it is necessary to check various business systems, organizational management systems (ERP, CRM, etc.) for compliance with the standards of the technical specifications;
  • if it is necessary to determine whether changes have been made to the program;
  • if it is necessary to determine whether protection is available software from unlicensed use;
  • if it is necessary to determine the essence of hidden information;
  • if it is necessary to determine whether there are attempts in the data system to illegally access information;
  • if it is necessary to determine the possibility of recovering deleted data;
  • if it is necessary to determine the causes of software malfunction;
  • if it is necessary to determine the type of storage medium;
  • if it is necessary to determine the presence of a mechanism of damage to the storage medium;
  • if it is necessary to determine the last correction of data on the storage medium;
  • if it is necessary to determine the possibility of making changes to the storage medium;
  • if it is necessary to determine a quality assessment information system;
  • if it is necessary to determine the cost of the information system;
  • if it is necessary to determine what type of hardware and software the document was produced on;
  • if it is necessary to determine an assessment of the cost and quality of the software.

Expert actions

Our information systems and software specialists perform the following activities:

  • analysis of related documentation and regulations;
  • examination of the information system for compliance with the technical specifications;
  • preparation of an evidentiary expert opinion (must be in writing).

Regions

If you want to seek services from our center, but do not live in Moscow or Voronezh, we offer you several options for interaction:

  • our employees can travel to any region of Russia to conduct an examination;
  • you or your representatives can contact the branches of our center in Moscow or Voronezh;
  • Our specialists can conduct examinations based on the documents provided.

You can find out more about working with Russian regions.

Did you like the article? Share it