I have always paid for my software, but sometimes I have enjoyed not having to insert the cd. Then I came across an article about how commonly "malware" is packaged with these executables. Since I do serious programming work on my computer, there is no way I can risk compromising my system this way. What I am curious about, having read about the growing sophistication of hackers to package malware with executables that would otherwise appear "legit", is The Question: How effective or specialized can TDS-3 be doing more detailed forensics for trojans that may successfully conceal themselves and not exhibit suspicious behavior (for example, in the case of these executables, the file path and the name of the executable are legit. I was reading that hackers will do the same with "legit" system files, albeit the path to the executable will not be "legit". These hacks name themselves after a legitimate system file, and some of these names are associated with critical system processes where task manager will not allow you to "kill" the process, because task manager only sees the name of the file, it does not evaluate the file path, for example. The growing level of sophistication is amazing, but it seems that the key to successfully compromising someone's system is even still some style of "social engineering". This would apply to the issue of "hacked exe's". For example, the "disclamer at 'GameCopyWorld' states that the exe's are essentially legal so long as you own the cd. Well, if you are as I have been in the past, you might reason, "Well, I am the lawful owner of the software, I do not copy it or give it to anyone else, this is a legitimate way to use this software without the cd. Very tempting and in my opinion, valid when the ethics apply. Good luck! Of course, this particular venue is not likely to compromise a system where there is 'serious business'. I build software. I am not about to compromise my system. It seems that there could be more discussion about 'education' in addition to raising the question about what can be done at the engineering level to raise the level of sophistication and prevention at the software level. It appears to me that these cracked exe's pose an enormous security risk. I will simply use them no longer. But, I am curious if TDS-3 would be adequate for analysing cracked exe's I have used before to help ascertain the likelyhood my system has been compromised.