Hardware Guides

  Home arrow Hardware Guides arrow Converting DRM Protected WMA to MP3
Watch our Tech Videos 
Dev Hardware Forums 
Computer Cases  
Computer Processors  
Computer Systems  
Digital Cameras  
Flat Panels  
Gaming  
Hardware Guides  
Hardware News  
Input Devices  
Memory  
Mobile Devices  
Motherboards  
Networking Hardware  
Opinions  
PC Cooling  
PC Speakers  
Peripherals  
Power Supply Units  
Software  
Sound Cards  
Storage Devices  
Tech Interviews  
User Experiences  
Video Cards  
Weekly Newsletter
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
HARDWARE GUIDES

Converting DRM Protected WMA to MP3
By: Bruce Coker
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 5
    2009-05-12

    Table of Contents:
  • Converting DRM Protected WMA to MP3
  • How To
  • Procedure Explained
  • Other Processes

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH DEV HARDWARE

    Converting DRM Protected WMA to MP3


    (Page 1 of 4 )

    If you're tired of having to play some of your favorite WMA music strictly on players that are WMA-compatible because of DRM, keep reading. You can legally convert your purchased WMA music encoded with DRM to MP3s. This two-part series shows you how.

    The rapid spread of digital audio over the last ten years has caused an ever- increasing degree of concern within the music industry. The ease with which CDs and MP3 files can be copied with zero quality loss, along with the rapid growth of the Internet as a virtually unlimited distribution channel, has led to unparalleled opportunities for music piracy.

    In response, the industry has attempted to place limitations on the use of audio files, using a range of technologies that are collectively known as Digital Rights Management or DRM. DRM technologies are essentially mechanisms which allow usage restrictions to be encoded directly into certain audio file formats, the most common variety of which is Windows Media Audio – WMA.

    Typically, DRM seeks to limit the copying and conversion of audio files to other, unrestricted, formats. However, there is no standard approach. Different files will be licensed for different types of usage: for example, one may be licensed for burning to CD while another may not. Some files will be playable only on certain players, or while the owner holds a time-restricted license.

    All of this has provoked a high degree of controversy, especially with regard to the restrictions DRM has placed on what has up until now been regarded as “fair use” of media. It has always been legally acceptable for an individual to make copies of music they have bought, as long as these are for personal use, such as backing up a CD in case the original fails, or transferring a CD to an MP3 player for listening when out and about.

    DRM-restricted media often allow no such duplication: WMA files must be played on WMA-compatible hardware devices, seriously – and unfairly in many peoples’ view – restricting the use to which legally purchased media may be put.

    More Hardware Guides Articles
    More By Bruce Coker

    blog comments powered by Disqus

    HARDWARE GUIDES ARTICLES

    - Top 10 Valentine`s Tech Gifts for Men
    - Top 10 Women`s Tech Gifts for Valentine`s Day
    - Intro to RAIDS
    - 2012`s Most Anticipated Tech Releases
    - Top Tech Stocking Stuffers for 2011
    - The Top Tech Gifts Under $100 for 2011
    - How to Improve Your Smartphone`s Battery Life
    - Top Holiday Tech Gifts for 2011
    - Quick Tips for PC Beginners
    - How To Overclock Your CPU
    - TrueCrypt Hidden OS: Completing the Decoy
    - TrueCrypt: Hiding Your Operating System
    - Creating a Hidden OS with TrueCrypt
    - Cloning Your Hard Drive: Implementing SysPre...
    - Cloning Hard Drives: Part Three

    Developer Shed Affiliates

     




    © 2003-2014 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap
    KEITHLEE2zdeconfigurator/configs/INFUSIONSOFT_OVERLAY.phpzdeconfigurator/configs/ OFFLOADING INFUSIONSOFTLOADING INFUSIONSOFT 1debug:overlay status: OFF
    overlay not displayed overlay cookie defined: TI_CAMPAIGN_1012_D OVERLAY COOKIE set:
    status off