Feeds

Grand Theft Auto IV PC debut gets SecuROM sideshow

Steal in this game. Don't steal this game

Security for virtualized datacentres

The upcoming PC version of Grand Theft Auto IV will install SecuROM 7 on customers' systems, although the game maker claims its properly de-fanged the detested DRM technology.

Rockstar told the gaming site IGN that GTA IV's flavor of SecuROM won't limit the number of installs of the game, nor will it restrict the number of machines it can be put on.

Those were arguably the most reviled SecuROM checks previously used on games such as EA's Spore, which have put many gamers up at arms. EA later backed down on the number total Spore installs, but kept the PC limit capped at five.

A Rockstar spokesperson told IGN:

GTA IV PC uses SecuROM for protecting our EXE until street date has passed, to ensure the retail disk is in the computer drive, and is used for Product Activation of the title. Product Activation is a one time only online authentication when installing the game.

The anti-DRM crowd will still have the rest of SecuROM's questionable repertoire to wag a finger at. It had been known to cause hardware problems for some, and even after a game has been removed from your system, uninstalling SecuROM is no easy task.

The latter point explains why the Rockstar rep added that even if a customer uninstalls and re-install GTA IV, it won't require re-authentication. (Unless a customer changes to "major" components on the PC, such as CPU and video card). "Active functions" of SecuROM are removed on the game's installation but "some traces will remain," according to Rockstar. The company said it's presently "working" with SecuROM just to post information on its support pages on how to remove the DRM completely.

Although an internet connection will be required for activation, the game maker said it will provide for rustic customers to activate the game using someone else's machine with web access.

To ward off those looking for the inevitable pirated version of GTA IV with SecuROM removed, the Rockstar spinster went with the angle that property theft isn't as easy, profitable, and amusing as each and every game in the GTA series would suggest:

Aside from the fact that warez are a great place to pick up a Trojan or key logger, using a cracked copy of GTA IV PC will result in varying changes to the game experience. These can range from comical to game-progress-halting changes.

It sounds a bit like the company is leaking bugged versions of the game on file-sharing sites. That may even keep freetards from getting their paws on a stolen digital copy for one — maybe two days tops by our estimate. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.