A computer-implemented method of protecting content includes receiving a
request from a user to access the content. The user is enabled to
perceive the content based on the request received from the user. The
user is prevented from capturing the content when perception of the
content is enabled. The method may be performed by a Java applet running
in a network environment.