Computer virus

computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, datafiles, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".[1][2][3][4] Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPUtime, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, logging their keystrokes, or even rendering the computer useless. However, not all viruses carry a destructive payload or attempt to hide themselves—the defining characteristic of viruses is that they are self-replicating computer programs which install themselves without user consent.
Virus writers use social engineering and exploit detailed knowledge of security vulnerabilities to gain access to their hosts' computing resources. The vast majority of viruses target systems running Microsoft Windows,[5][6][7] employing a variety of mechanisms to infect new hosts,[8] and often using complex anti-detection/stealth strategies to evade antivirus software.[9][10][11][12] Motives for creating viruses can include seeking profit, desire to send a political message, personal amusement, to demonstrate that a vulnerability exists in software, for sabotage and denial of service, or simply because they wish to explore artificial life and evolutionary algorithms.[13]
Computer viruses currently cause billions of dollars' worth of economic damage each year,[14] due to causing systems failure, wasting computer resources, corrupting data, increasing maintenance costs, etc. In response, free, open-sourceantivirus tools have been developed, and an industry of antivirus software has cropped up, selling or freely distributing virus protection to users of various operating systems.[15] Even though no currently existing antivirus software is able to uncover all computer viruses (especially new ones), computer security researchers are actively searching for new ways to enable antivirus solutions to more effectively detect emerging viruses, before they have already become widely distributed.[16]

Vulnerabilities and infection vectors

Software bugs

Because software is often designed with security features to prevent unauthorized use of system resources, many viruses must exploit and manipulate security bugs (security defects) in system or application software to spread and infect.Software development strategies that produce large numbers of bugs will generally also produce potential exploits.

Social engineering and poor security practices

In order to replicate itself, a virus must be permitted to execute code and write to memory. For this reason, many viruses attach themselves to executable files that may be part of legitimate programs (see code injection). If a user attempts to launch an infected program, the virus' code may be executed simultaneously.[17]
In operating systems that use file extensions to determine program associations (such as Microsoft Windows), the extensions may be hidden from the user by default. This makes it possible to create a file that is of a different type than it appears to the user. For example, an executable may be created named "picture.png.exe", in which the user sees only "picture.png" and therefore assumes that this file is an image and most likely is safe, yet when opened runs the executable on the client machine.[18]

Vulnerability of different operating systems to viruses

The vast majority of viruses target systems running Microsoft Windows. This is due to Microsoft's large market share of desktop users.[19] The diversity of software systems on a network limits the destructive potential of viruses and malware.[20]Open-source operating systems such as Linux allow users to choose from a variety of desktop environments, packaging tools, etc., which means that malicious code targeting any of these systems will only affect a subset of all users. Many Windows users are running the same set of applications, enabling viruses to rapidly spread among Microsoft Windows systems by targeting the same exploits on large numbers of hosts.[5][6][7][21]
Only a few major viruses have hit Macs in the last years.[22][23] The difference in virus vulnerability between Macs and Windows is a chief selling point, one that Apple uses in their Get a Mac advertising.[24]
While Linux and Unix in general have always natively prevented normal users from making changes to the operating system environment without permission, Windows users are generally not prevented from making these changes, meaning that viruses can easily gain control of the entire system on Windows hosts. This difference has continued partly due to the widespread use of administrator accounts in contemporary versions like XP. In 1997, researchers created and released a virus for Linux—known as "Bliss".[25] Bliss, however, requires that the user run it explicitly, and it can only infect programs that the user has the access to modify. Unlike Windows users, most Unix users do not log in as an administrator, or root user, except to install or configure software; as a result, even if a user ran the virus, it could not harm their operating system. The Bliss virus never became widespread, and remains chiefly a research curiosity. Its creator later posted the source code to Usenet, allowing researchers to see how it worked.[26]

Infection targets and replication techniques

Computer viruses infect a variety of different subsystems on their hosts.[27] One manner of classifying viruses is to analyze whether they reside in binary executables (such as .EXE or .COM files), data files (such as Microsoft Word documents orPDF files), or in the boot sector of the host's hard drive (or some combination of all of these).[28][29]

Resident vs. non-resident viruses

memory-resident virus (or simply "resident virus") installs itself as part of the operating system when executed, after which it remains in RAM from the time the computer is booted up to when it is shut down. Resident viruses overwriteinterrupt handling code or other functions, and when the operating system attempts to access the target file or disk sector, the virus code intercepts the request and redirects the control flow to the replication module, infecting the target. In contrast, a non-memory-resident virus (or "non-resident virus"), when executed, scans the disk for targets, infects them, and then exits (i.e. it does not remain in memory after it is done executing).[30][31][32]

Macro viruses

Many common applications, such as Microsoft Outlook and Microsoft Word, allow macro programs to be embedded in documents or emails, so that the programs may be run automatically when the document is opened. A macro virus (or "document virus") is a virus that is written in a macro language, and embedded into these documents so that when users open the file, the virus code is executed, and can infect the user's computer. This is one of the reasons that it is dangerous to open unexpected attachments in e-mails.[33][34]

Boot sector viruses

Boot sector viruses specifically target the boot sector/Master Boot Record (MBR) of the host's hard drive or removable storage media (flash drivesfloppy disks, etc.).[28][35][36]

Stealth strategies

In order to avoid detection by users, some viruses employ different kinds of deception. Some old viruses, especially on the MS-DOS platform, make sure that the "last modified" date of a host file stays the same when the file is infected by the virus. This approach does not fool antivirus software, however, especially those which maintain and date cyclic redundancy checks on file changes.[37]
Some viruses can infect files without increasing their sizes or damaging the files. They accomplish this by overwriting unused areas of executable files. These are called cavity viruses. For example, the CIH virus, or Chernobyl Virus, infectsPortable Executable files. Because those files have many empty gaps, the virus, which was 1 KB in length, did not add to the size of the file.[38]
Some viruses try to avoid detection by killing the tasks associated with antivirus software before it can detect them (for example, Conficker).
As computers and operating systems grow larger and more complex, old hiding techniques need to be updated or replaced. Defending a computer against viruses may demand that a file system migrate towards detailed and explicit permission for every kind of file access.[citation needed]

Read request intercepts

While some antivirus software employ various techniques to counter stealth mechanisms, once the infection occurs any recourse to clean the system is unreliable. In Microsoft Windows operating systems, the NTFS file system is proprietary. Direct access to files without using the Windows OS is undocumented. This leaves antivirus software little alternative but to send a read request to Windows OS files that handle such requests. Some viruses trick antivirus software by intercepting its requests to the OS. A virus can hide itself by intercepting the request to read the infected file, handling the request itself, and return an uninfected version of the file to the antivirus software. The interception can occur by code injection of the actual operating system files that would handle the read request. Thus, an antivirus software attempting to detect the virus will either not be given permission to read the infected file, or, the read request will be served with the uninfected version of the same file.[39]
The only reliable method to avoid stealth is to boot from a medium that is known to be clean. Security software can then be used to check the dormant operating system files. Most security software relies on virus signatures, or they employheuristics.[40][41]
Security software may also use a database of file hashes for Windows OS files, so the security software can identify altered files, and request Windows installation media to replace them with authentic versions. In older versions of Windows, filehashes of Windows OS files stored in Windows—to allow file integrity/authenticity to be checked—could be overwritten so that the System File Checker would report that altered system files are authentic, so using file hashes to scan for altered files would not always guarantee finding an infection.[citation needed]

Self-modification

Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for so-called virus signatures. Unfortunately, the term is misleading, in that viruses do not possess unique signatures in the way that human beings do. Such a virus signature is merely a sequence of bytes that an antivirus program looks for because it is known to be part of the virus. A better term would be "search strings". Different antivirus programs will employ different search strings, and indeed different search methods, when identifying viruses. If a virus scanner finds such a pattern in a file, it will perform other checks to make sure that it has found the virus, and not merely a coincidental sequence in an innocent file, before it notifies the user that the file is infected. The user can then delete, or (in some cases) "clean" or "heal" the infected file. Some viruses employ techniques that make detection by means of signatures difficult but probably not impossible. These viruses modify their code on each infection. That is, each infected file contains a different variant of the virus.

Encrypted viruses

One method of evading signature detection is to use simple encryption to encipher the body of the virus, leaving only the encryption module and a cryptographic key in cleartext.[42] In this case, the virus consists of a small decrypting module and an encrypted copy of the virus code. If the virus is encrypted with a different key for each infected file, the only part of the virus that remains constant is the decrypting module, which would (for example) be appended to the end. In this case, a virus scanner cannot directly detect the virus using signatures, but it can still detect the decrypting module, which still makes indirect detection of the virus possible. Since these would be symmetric keys, stored on the infected host, it is in fact entirely possible to decrypt the final virus, but this is probably not required, since self-modifying code is such a rarity that it may be reason for virus scanners to at least flag the file as suspicious.[citation needed]
An old, but compact, encryption involves XORing each byte in a virus with a constant, so that the exclusive-or operation had only to be repeated for decryption. It is suspicious for a code to modify itself, so the code to do the encryption/decryption may be part of the signature in many virus definitions.[citation needed]
Some viruses will employ a means of encryption inside an executable in which the virus is encrypted under certain events, such as the virus scanner being disabled for updates or the computer being rebooted. This is called Cryptovirology. At said times, the executable will decrypt the virus and execute its hidden runtimes infecting the computer and sometimes disabling the antivirus software.

Polymorphic code

Polymorphic code was the first technique that posed a serious threat to virus scanners. Just like regular encrypted viruses, a polymorphic virus infects files with an encrypted copy of itself, which is decoded by a decryption module. In the case of polymorphic viruses, however, this decryption module is also modified on each infection. A well-written polymorphic virus therefore has no parts which remain identical between infections, making it very difficult to detect directly using signatures.[43][44] Antivirus software can detect it by decrypting the viruses using an emulator, or by statistical pattern analysis of the encrypted virus body. To enable polymorphic code, the virus has to have a polymorphic engine (also called mutating engine or mutation engine) somewhere in its encrypted body. See polymorphic code for technical detail on how such engines operate.[45]
Some viruses employ polymorphic code in a way that constrains the mutation rate of the virus significantly. For example, a virus can be programmed to mutate only slightly over time, or it can be programmed to refrain from mutating when it infects a file on a computer that already contains copies of the virus. The advantage of using such slow polymorphic code is that it makes it more difficult for antivirus professionals to obtain representative samples of the virus, because bait files that are infected in one run will typically contain identical or similar samples of the virus. This will make it more likely that the detection by the virus scanner will be unreliable, and that some instances of the virus may be able to avoid detection.
There has also been virus called undetectable virus (proposed in Yongge Wang [46] ). Undetectable virus is one kind of polymorphic virus that is static signature-free and whose dynamic signatures are hard to determine unless some cryptographic assumption fails.

Metamorphic code

To avoid being detected by emulation, some viruses rewrite themselves completely each time they are to infect new executables. Viruses that utilize this technique are said to be metamorphic. To enable metamorphism, a metamorphic engine is needed. A metamorphic virus is usually very large and complex. For example, W32/Simile consisted of over 14,000 lines of assembly language code, 90% of which is part of the metamorphic engine.[47][48]


Trojan horse (computing)

Trojan horse, or Trojan, in computing is any malicious computer programwhich misrepresents itself as useful, routine, or interesting in order to persuade a victim to install it. The term is derived from the Ancient Greek story of the wooden horse that was used to help Greek troops sneak invading the city of Troy.[1][2][3][4][5]
Trojans are generally spread by some form of social engineering, for example where a user is duped into executing an e-mail attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many moderns forms act as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.[6] While Trojans and backdoors are not easily detectable by themselves, computers may appear to run slower due to heavy processor or network usage.
Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves.[7]

Purpose and uses

Destructive

Use of resources or identity

Money theft, ransom

Data theft

Spying, surveilance or stalking

Trojan horses in this way may require interaction with a malicious controller (not necessarily distributing the Trojan horse) to fulfill their purpose. It is possible for those involved with Trojans to scan computers on a network to locate any with a Trojan horse installed, which the hacker can then control. .[10]
Some Trojans take advantage of a security flaw in older versions of Internet Explorer and Google Chrome to use the host computer as an anonymizer proxy to effectively hide Internet usage,[11] enabling the controller to use the Internet for illegal purposes while all potentially incriminating evidence indicates the infected computer or its IP address. The host's computer may or may not show the internet history of the sites viewed using the computer as a proxy. The first generation of anonymizer Trojan horses tended to leave their tracks in the page view histories of the host computer. Later generations of the Trojan horse tend to "cover" their tracks more efficiently. Several versions of Sub7 have been widely circulated in the US and Europe and became the most widely distributed examples of this type of Trojan horse.[10]
In German-speaking countries, spyware used or made by the government is sometimes called govware. Govware is typically a trojan horse software used to intercept communications from the target computer. Some countries like Switzerland and Germany have a legal framework governing the use of such software.[12][13] Examples of govware trojans include the Swiss MiniPanzer and MegaPanzer[14] and the German "state trojan" nicknamed R2D2.[12]
Due to the popularity of botnets among hackers and the availability of advertising services that permit authors to violate their users' privacy, Trojan horses are becoming more common. According to a survey conducted by BitDefender from January to June 2009, "Trojan-type malware is on the rise, accounting for 83-percent of the global malware detected in the world." Trojans have a relationship with worms, as they spread with the help given by worms and travel across the internet with them.[15] BitDefender has stated that approximately 15% of computers are members of a botnet, usually recruited by a Trojan infection.[16]

Notable examples

The Exiled Realm of Arborea

TERA (The Exiled Realm of Arborea) is a 3D fantasy themed massively multiplayer online role-playing game (MMORPG) developed by Bluehole Studio. The game was released in South Korea on January 25, 2011, in Japan on August 18, 2011, in North America on May 1, 2012, and in Europe on May 3, 2012, with closed and open beta testings taking place before the launch dates.NHN Corporation, NHN Japan Corporation, En Masse Entertainment andFrogster Interactive Pictures publishes the game in these regions, respectively.[3][4][5] In February 2013 the game was renamed to TERA: Risingconcurrently with the game's launch to the free-to-play model.


Gameplay


TERA has typical MMORPG features such as questing, crafting, and player versus player action. The game's combat uses a real-time battle system that incorporates third-person camera view. The player targets an enemy with a cross-hair cursor rather than clicking or tabbing an individual opponent (which is called the "Non-Target battle system" by the developer). The Players need to actively dodge enemy attacks.[6] A keyboard and mouse or a control pad can be used to control the character.[7]
The developers collaborated with CCP Games and their successful use of "PLEX" for Eve Online as a way of deterring gold farmers. As a result, TERA released a currency called "Chronoscrolls" that works similarly, as it allows game time to be purchased with real money and sold for in-game gold. The use of Chronoscrolls is only available to users who have purchased the game either digitally or physically. Those with the "Discovery Edition" cannot use Chronoscrolls.[8]
In February 2013, Tera in North America and Europe transitioned to "Tera Rising", which changed the subscription model to a "freemium" design (free play plus buyable premium status and customization options). The developer has promised no time, level, or content restrictions for free players after this update.[9] Players who purchase a 30-day "Elite" status will receive increased dungeon rewards, in-game discounts and other metagame advantages.[10] Due to the new model, the "Chronoscrolls" mentioned above are being phased out, and are no longer sold by the developer, nor usable to extend game time. Existing chronoscrolls can be sold to merchants for 2,000 gold.
The Japanese and Korean versions of Tera also became free to play in December 2012 and January 2013, respectively.[11]

Races


Characters may be one of seven races:
  • The Aman, a race of draconian humanoids
  • The Baraka, a giant, intelligent race
  • The Castanics, a demon-like race
  • The Elins, an innocent nature loving race
  • The High Elves, a race of traditional and elegant humanoids
  • The Humans
  • The Popori, an animal-like race.[7]
The Baraka, Elin, and Popori are gender locked (only male Baraka and Popori, and female Elin exist). Both males and females are playable for the rest of the races. The Elin were originally projected as Female Popori in the early stages of the game creation.
Each race has a set of unique "racial skills" that gives them minor advantages. For instance, Elins and Popori have skills that increase out-of-combat movement speed, while High Elves can restore all of their MP on a long (2 hour) cooldown. Races also have their own unique animations for many class-specific skills, leading to small advantages and disadvantages in framerate, animation speed, movement distance, attack distance, or other attributes for each individual skill depending on which race the player has chosen.

Classes



Archer

The Archer is a “Ranged Damage Class,” using a bow and wearing leather armor. They have the lowest health pool with no defensive advantages to compensate, making them more challenging to solo with. This class is known to possess a wide range of abilities to help control the fight by using traps and ranged attacks, which reduce attack speed, snare, and stun. Archers' damage scales based on the distance to the target. Within 10 meters, damage is unchanged. For every 3 meters past 10, damage is reduced by 15%. The exact scale is 11–14 meters, 15%, 15–18 meters, 15% The basic Arrow attack extends to a maximum range of 19 meters, but suffers a 1.5% penalty from the damage dealt at 18 meters. Despite this scaling, the biggest benefit to Archers is that they have the choice to remain at a safe distance, as most incoming Area of Effect attacks have an effective range of 10 meters. Their two charged attacks actually have a "kickback" component of pushing the Archer back 2–4 meters (depending on charge), meaning a well timed attack with an incoming AoE would create a simultaneous evasive maneuver and attack. In PvP, their stuns and high damage from their stances make them arguably the best PvP class.[13]


Berserker

The Berserker is a “Melee Damage Class,” using a two-handed axe and wearing heavy armor. This class is the heaviest hitter in the game but also the slowest. They can stay in the frontlines of a battle by blocking any attacks with their axe and provide powerful burst damage with charged attacks, where they unleash a single massive strike. Berserkers eventually become relatively fast at dealing massive damage through the use of certain glyphs and skill rotations. They are similar to the Sorcerer in speed and damage dealt, but have greater mobility and defense. In PvP, Berserkers are a constant threat as they can potentially one-hit KO a player with a big critical hit from their charged attack. As such, they are able to bully and keep other melee classes in check.[14]


Lancer

The Lancer is a “Blocking Tank,” using a shield with a lance and wearing heavy armor. The Lancer is the most defensive class in the game as they can use their shield to completely guard themselves and allies standing behind them from incoming attacks. Possessing the highest survivability of all the classes, Lancers also have the lowest damage output in the game, excluding the healing classes. In PvE, Lancers are generally accepted as the main tanking class as they are able to mitigate all incoming damage without any risks, compared to the much stricter dodge timing required by the Warrior. Lancers have two key skills that allow him to hold the attention of the enemy: Shield Counter with the extra threat glyph is their main skill, which can only be used after a successful block; Challenging Shout is their second skill, of which its large range can be used as a way to pull enemies from a distance. In PvP, Lancers serve to support the party by constantly harassing the enemy's support classes with stuns and interrupts while mitigating as much damage as possible to the party. Most notably, Baraka Lancers can make use of the game's collision detection by simply being large enough to block off key doorways with their body.[15]


Mystic

The Mystic is a “Support Healer Class,” using a scepter and wearing cloth armor. The Mystic provides more utility than the traditional healer by being able to create health and mana pickups instead of directly healing the party. This means that skilled parties who proactively avoid damage by dodging will actually benefit much more from a Mystic healer as the mana pickups will allow damage dealers to use their skills without any downtime. However, this means that Mystics are constantly running around the battlefield to keep the party optimized with heals, mana, or buffs. Between Mystics and Priests, Mystics are much more difficult to play. Mystics are most notable for being able to summon temporary minions to help with healing or to draw aggro while soloing, and for their powerful crowd control abilities which makes them invaluable for initiating team battles in PvP.[16]


Priest

The Priest is a “Primary Healer Class,” using a staff and wearing cloth armor. This traditional healer class uses a stationary style of healing, where healing doesn't require as much mobility on the Priest's part. This makes Priests much easier to play than Mystics, who must move around constantly to keep the party optimized. While Mystics specialize in boosting a party's offense, the Priest excels in keeping the party alive. Priests have all kinds of heals for any situation, and can cover the entire party with a temporary damage absorption shield. In PvP, Priests take on the tank role as the entire enemy team will naturally focus on the Priest. Their many heals gives them immense survivability and makes them quite difficult to finish off as the Priest's party will be picking off any pursuers.[17]


Reaper

A new, Elin-only class added in 2014 (exact date differs depending on version). The reaper is a "Mid-Range Damage Class," using a pair of sickle-scythes attached to chains to damage their enemies. Reapers wear leather, but are defensively fragile due to their innately low endurance stats. Instead, they rely on short teleports ('flash steps') and counterattacks to keep themselves alive in both PvP and PvE. Reaper skills execute quickly and have extremely high sustained damage, but have high cooldowns, necessitating cooldown and skill management.[18]


Slayer

The Slayer is a “Melee Damage Class,” using a two-handed sword and wearing leather armor. This class naturally excels in soloing because of the innate crowd control capability it possesses through knockdowns. Their high chance of knockdowns is always a huge threat in PvP, while in PvE it provides breathing room for the group. Slayers hit extremely hard and move very fast in combat, which makes them powerful in any situation. This class is very popular because it's easy to play as well as being very reliable, which cements its position as a staple role in both high level PvE and PvP.[19]


Sorcerer

The Sorcerer is a “Ranged Magic Damage Class,” using an arcane disc and wearing cloth armor. Sorcerers are capable of great sustained burst damage, and are able to restore their own mana pool relatively quickly with a very short cooldown. Sorcerers, as the traditional glass cannon, output the highest DPS in the game by maintaining a fast and continuous barrage of spells at the cost of survivability. In PvE, they are the most reliable source of DPS as they are generally out of harm's way and their spells hit very hard. In PvP, they are invaluable in team fights by forcing enemy groups to scatter to avoid their powerful AoE spells.[20]


Warrior

The Warrior is an “Evasive Tank” or "Melee Damage Class," dual-wielding twin swords and wearing leather armor. Warriors are the other tank in the game, relying on well-timed dodges to avoid incoming damage. As a result, Warriors are the hardest class to play in the game as it requires the player to become familiar with attack patterns to dodge efficiently, while the Lancer can just hold block whenever they feel threatened. This causes many of the people playing warrior choosing a DPS centered build rather than a tank build, because of its demanding requirements. Despite their light armor, Warriors actually gain higher endurance ratings than Lancers in the endgame due to their extremely good gear scaling, which means they take less damage from hits. However, Lancers will still easily outlast the Warrior due to the reliability of their block mechanic. Despite the obvious advantages of a Lancer tank, Warriors are more than capable of tanking all endgame content; it just requires a different approach. In a damage role, Warriors excel at it as they have high mobility to stay on their targets, which also makes their play style feel like the traditional thief/rogue class. Warriors are very powerful in PvP as their tanking nature gives them lots of natural survivability while their fast attacks keeps the target pinned down. Casters are especially vulnerable to Warriors and have a very difficult time trying to escape.Warriors are one of the most popular classes in TERA, but you will not see many in the endgame. This is due to the difficulty of this class, and many lesser experienced players eventually give up on the class.[21]


Gunner

The Gunner class was added with the release of the game on Steam. It is available to female characters only of the High Elf and Castanic races. The class uses a mystical based gun called an Arcannon, wears metal armor, and is able to summon two types of pets; one healing type and the other an offensive turret. It is a ranged damage class, which is designed to be fast and mobile. While all other classes use their skills with "Mana" and "Resolve", the Gunner utilizes "Willpower" instead of "Resolve". "Willpower", unlike "Resolve", does not gradually increase the more you wait, but does the opposite. If you dont attack, your Willpower decreases. Once you reach Max Willpower, your Arcannon starts glowing, and you can set off epic Wombo-Combos.


Reception


TERA has been met with generally favorable reviews,[31] citing the action-based gameplay, huge and widely varied seamless world, the exciting and recurring BAM fights, the ease of using the game's auction house (called the Trade Broker) and lush, detailed graphics as the game's high points.[32] The option of using a console controller also provided much satisfaction for players that wanted to play an MMORPG without relying on a keyboard and mouse.[32]The game's musical score received praise for its varied and emotionally charged tracks ranging from epic orchestral pieces to more mellow tunes.[33]Criticism is directed at the game's generic collect/kill/rendezvous quest grind to level up, with some quests backtracking simply to talk to the same NPC.[34]Player killing is commonly done in the Open World and has been met with a lot of praise due to the freedom and constant action it can bring to daily questing and traveling.[34] Critics have targeted the Nexus Wars feature as a blatant rip-off of Rift's system.[35]
In March 2013, after switching to a free-to-play business model, the game passed 1.4 million registered accounts.[36]

Adaptations

TERA short stories are available for sale as E-books in English at En Masse Entertainment's official site.[37]


Trade secret civil actions


In 2007, NCsoft filed a complaint to South Korean gosu gamer authorities and brought a civil action for damages and an injunction to Bluehole. The Bluehole founders and employees, formerly employed under NCsoft and working on the Lineage III development team, were convicted by a Korean criminal court for the theft of valuable trade secrets from NCsoft in 2009. In 2010, a Korean civil court held these individuals, along with Bluehole, liable for misappropriation of trade secrets, awarding NCsoft about $2 million in damages and issuing an injunction against utilizing trade secrets for monetary gain. The damages were later reversed by an appellate court, but the injunction remained in place. Both the criminal convictions and civil judgement are presently pending on appeal before Korea's highest court. Despite the injunction, Bluehole developed and released TERA in South Korea.
On January 9, 2012, NCsoft filed a civil action in the United States against Bluehole and its U.S. subsidiary En Masse. NCsoft seeks a preliminary and permanent injunction prohibiting the launch of TERA in the United States, or damages for the substantial harm that the launch will cause NCsoft. They assert claims for copyright infringement, trade secret misappropriation, breach of confidence, unfair competition, and unjust enrichment under the laws of the state of New York.
On April 18, 2012, En Masse Entertainment announced they were found not guilty in the Korean civil actions.[38][39]However, three employees were found guilty.

Source