he ones that are linked to the internet. By this individuals can anonymously put out copyrighted software for the use of any anonymous user of the internet such as the type of system that Mr. LaMacchia ran. The second way to be involved in software piracy is to be on the receiving end. These individuals can be anyone. All they need is a computer or access to a computer. In this an individual willingly breaks copyright law and retrieves by whatever means copyrighted software. In effect this individual steals the software for their use. Again in this case the offenders are usually minors. Keep in mind that is it not only minors that are committing acts of software piracy, many adults and especially companies and corporations still pirate software but they do so at a very low profile. There are many ways that an individual can commit software piracy. Six different methods are of the most evident ways to pirate software. The first and most common method of software piracy is called 'End User Copying' or 'softlifting.' This type of piracy is the out right copying of a program and giving it to a friend or a colleague. An example of this is an individual just bought a brand new computer game from the store. They liked it so much that they made a copy and gave it to a friend. The second form of piracy is what is referred to as hard disk loading. This is where a computer dealer or company copy and load unauthorized copies of software onto the hard disks or the main storage facility on the computer they will sell. This is a more commercial aspect of software piracy and many of these companies use this as an incentive to sell their machines by making more software for the machine available to the customer. The third method is becoming more popular as many more people are getting connected to the internet. This is the downloading or sending copyrighted/illegal software via a modem to a public or private bulletin board system or the i...