Tuesday, March 31, 2015

Police officers seized illegal software – Radio Opole

photo: archive of the police Policemen from Opole and Nysa gathered the evidence and came to the apartment of 23-year-old. Secured equipment worth about 100 thousand.

– The officers found a computer, hard drive and 4 illegal car diagnostic interfaces with the software without a license. Investigators determined that the man came down interfaces from China, was turning stickers and selling equipment on the internet as the original – says Karol Brandys younger aspirant of Komeda Provincial Police in Opole.

The man pleaded guilty to distribution of illegal software. He faces up to for five years in prison.

Listen posts:

ed. CP (WW)

tags : police, illegal software

LikeTweet

Monday, March 30, 2015

Illegal software in one of Koszalin companies – gk24.pl

Police officers from Koszalin PG department in one of Koszalin companies seized illegal software. Officers in this regard
judicial collaborated with experts in the field of computer science.

The police made a search of one of the companies in Koszalin. As a result of police action and secured twelve
laptop drives, which revealed the applications received without the consent of the beneficiaries.

The value of illegal software expert initially estimated at not less than 110 thousand.

Now, the contents of the hard drives will be thoroughly reviewed by experts. Only after receiving expert will know whether
31-year-old business owner hears allegations in this case.

In accordance with the provisions of the Code for the theft of a computer program is punishable by up to 5 years in prison.

LikeTweet

Pixar studio has provided its software for free! – Virtual Poland


  Great news for all animators and 3D graphic designers. Pixar’s studio has provided its RenderMan software for free.
 

 The only condition that puts Pixar, is non-commercial use of the work that you made in RenderMan. If you would like to make money on outfits created with the help of this software, you have to pay $ 495 for the commercial license.
 

 RenderMan is the software used in all the cartoons and Pixar productions such as the Pacific Rim and Godzilla. Now you can use it at home. And it’s free. Download applications from here: http://renderman.pixar.com/view/non-commercial-renderman
 

LikeTweet

Thursday, March 26, 2015

Who loses and who gains from the sale of illegal software? – Spider’s Web

While individual users are buying more often than they used the software in good faith, they can lose a lot of buying from an unauthorized vendor. Often, consumers want to buy legitimate soft, but choosing a cheaper offer unknowingly buy de facto illegal copy. Piracy causes a loss of the State or private companies.

In the online stores and auction sites auction, you can find hundreds of products in the digital version of unknown origin , stickers zerwanymi from dismantled computers and software used in boxed. Vendors often provide operating systems, office suites and software for professional artists for a fraction of the store price.



Using such offer very easily come across the scammers.

microsoft-windows-office

Users looking for software very often, because of how it might seem overpriced bypass official sales channels. The same product, at least in theory, can be purchased elsewhere for a fraction of the market price. It is not surprising, of course, consumers that want to buy as cheaply as possible.

Few people realize, however, that in most cases – and they are not exaggerated estimates – cheap keys for software purchased online turn out to be false. Buying such a “left” key, even on an invoice does not relieve you of the responsibility and entrepreneurs, if the key will be illegal or invalid.



Traffickers sometimes at the same insolent.

In preparation for this text, I had a long talk with representatives of Microsoft, who are constantly fighting against rogue vendors. The company regularly examines the contents of the websites dealing in key products. Are checked offer accounts that are selling massively keys auction sites such as Allegro. Microsoft itself also makes test purchases.

It turns out that the scale of the phenomenon of trafficking of dubious legality keys, is shocking. The chance to purchase legitimate Windows or Office at an attractive price at auction on the web is up to a few percent. The share of suspicious listings on third-party software is approx. 70 percent. sales (not just issued tenders!).

Why are illegal keys?

piracy-pirates-thepiratebay-rapidshare

Windows 7 and Office 2010 have never been sold in the Polish digital distribution. This means that you can have confidence bordering on certainty: if someone says that sells Polish official license to this product for download in electronic form, it just lies and trying to extort money from a client for kosher goods.

Traffickers use various tricks, and the keys come from the strangest places. Some of them were simply in the world created, and others taken from the sticker on the computer or drawn out of the box. Widespread practice is to sell these codes repeatedly to different customers.



The fact that the software is illegal client can learn only after several weeks or even months after the transaction, when the key goes on the black list.

In Germany, in December last year, massive market investigation has shown that sold at various auctions so many times the same. master-key – the key that allows the installation of the system at dozens of positions. He came from a Chinese educational institution. Microsoft has generated for the company’s new key volumes; but the extinction of the previous, which already went into circulation, slightly last.

Buying such trefnego key for the client can be quite problematic. System or office suite can be activated properly, but as soon as the software maker detects that the key is illegal, it is at best end up blocking. The seller may send another key or return the money, but often recovery is impossible.



Then you not only will be without the software, but also without funds to purchase – this time from a reliable source.

microsoft-windows-piracy-office-computer

In the worst scenario for the client, especially if he made the purchase on the company, the police may even commandeer the entire hard drive or computer as evidence in the case. If law enforcement reach customer lists dealer, who found himself in the spotlight, it can protect bought “product”.

In this case, the mere fact of purchase – even if it was an invoice – does not make it the buyer “is Indoor “. How very attractive price and a nice description of the “left” of the product would be, it does not make it the system or the legal office suite. For Microsoft Windows or buyer of such Office’s no different from … pirate.



This may seem rather harsh position, but when someone buys for 40 zł at auction to Windows key, costing a market about 350-400 zł, it should not count on the full value of the product.

The truth is that ignorance of the law is harmful and can not obscure the good intentions here. Even if one is not aware of market prices and buy software in good faith, it would be exposed to a number of trouble. Claims should be addressed directly to the seller.

It should not surprise anyone, because just this also works in the “analog” world. When buying a stolen cell phone, we will be exposed to unpleasant, when the police at a routine check IMEI number and discovers that it appears in the database of stolen phones.



To paraphrase a famous saying – if you offer software looks very attractive to be true, it probably is so.

If you are familiar with the Internet are aware that the payment of the popular rodent or other theater geek does not mean that the owner of the copyright to the music or the movie will see any money. This is the same software on the market – buying a key to the Windows or Office at auction does not mean that you have a clear conscience.

You have to remember that even such a large and well-known as the Allegro platform offers space for trade to other entities . Employees do not check with the principles of advertising, and even if they wanted to, it would run out of this capacity. In the case of software, it’s unfortunately be required to ensure that legitimate product to buy.



What to avoid?

Creativity crooks looking for easy earnings in the network indeed knows no bounds, and, according to IDC in the world 51 percent. bids for software in the network is trying to extort money. In Poland, in the case of such products as Microsoft Office 2010, it is estimated that the number of pirated copies sold online … it was 99 percent. all.

You should be especially wary when buying older software. For example, Office 2010 can no longer be one and a half year to buy the official sales channels, but such products Allegro is a dime a dozen. It does not prevent retailers license transfer of unknown origin.



What can threaten the illegal installation of the system?

 microsoft-windows-7

The worst thing you can do customer is the suggestion of some dealers to install Windows from a random torrentowni and activate it specified key. Very risky upload system is also lost on the plate DVD-R, even if the seller provides that it “backup one to one” original CD.

Not only receive from the dealer the board itself should light up the lamp warning, it is for that you never know if someone in such a system has not added a few of his bits. You can unwittingly become part of a botnet, install excavator bitcoins some nasty malware or steal money from your bank account.



During a conversation with representatives of Microsoft asked also about telling the most interesting story related to cunning traders.

The History of sharks heard a lot of business, but very few of them sticks to my mind. One of the merchants Microsoft’s lawyers admitted that the keys acquires from China and gave even Skype numbers and e-mail to its suppliers, which included members “key” in the name suggesting clearly the nature of business.

Other sly indicate that the keys come from “scrap computers”, although the OEM license expressly prohibits the resale. They should end the life of a sticker and certificate, together with your computer. Sellers, however, this does not acquire in China is even a special recycling center, which recovers the keys.



There are also “entrepreneurial” and honest students who freely sell given to them by the university of keys MSDNAA.

 43795-windows-xp-bliss

Some gazelles trying to illegally keys do substitute the real product and such. tear original box into three parts and sell the same key for three different clients. Fake and counterfeit plates or certificates are not uncommon, but some sellers even this will not forcibly – brazenly ensure customer counting on the ignorance that everything is carried out in accordance with the law.

There’s been already a situation where the company that won the tender for the institutions of the state, its dozens of systems supplied on CD … DVD-R. They were all versions of Windows, and Office, to choose the color. In this case, the keys were delivered in the form of a table. Microsoft did expertise of pirated software, and the case went to the prosecutor’s office and waiting for your final.



Is it possible to effectively combat these practices?

Microsoft reports Give suspected wherever it can. So far, the situation is dramatic, especially looking at the revenue that such trade can generate, but you can see the light at the tunnel. It happens that the turnover of several hundred per month, generating a turnover and sellers of this size, there are many. Microsoft began in mid-March, again working with Allegro to detect violations and reported auctions began within a few hours to disappear from the site.

Software manufacturers are almost helpless in the fight against cheaters creative. Catch someone red-handed it is often not enough to auction websites such delinquent account suspended and the court ruled against. Sometimes, even after Microsoft acquired as part of the so-called. Mystery Shopping several products (and proved that they were sold illegally) continue seller only function and increase your income.

This does not mean that traffickers with impunity, and have been taken even the first convictions without so. “Hinge”.

 prison

The traders who generate really high speed, is interested in sooner or later … IRS. Microsoft representatives laugh that fraudsters selling software – dealings today considered to be much more profitable than selling drugs! – Fall like Al Capone: not a crime, but the tax cheating. Office party fall even suspicion of money laundering.

Microsoft employees have already participated in cases where the Tax Audit Office asked for an analysis of the software sold. Offices of tax offenders, who traded commodity trefnym can not pull money – then the matter shall be referred to the prosecutor. Companies with the so-called. tax havens and suspected use of VAT carousel are monitored.

Microsoft does not want to fight with customers, even if you buy pirated Windows for 40 zł would only soothe your conscience.

The most important is to hinder life traffickers that their business is no longer profitable. Microsoft wants to combat this phenomenon at the source. It is also important to build consumer awareness of the legal and illegal software.

You have to mention threatening consequences for the use of illegal software and distribution takowego. Falls even exaggerated comparison software to arms: in both cases, you need to take not only the product, but also the appropriate license.



The problem of illegal keys should pay particular attention to the company.

 business smart home smart office

Licensing of unknown origin Office are bought almost wholesale for small businesses . This is a cheap electronic keys wasted money and a really risky game. In the case of the control has no chance to defend. You can try to show good will and avoid punishment, but the examination can take several months.

The loss of a disk that zarekwiruje student dorm after the raid and as the evidence of the police, it is a personal inconvenience to the user. If you run 50 such drives in the company, the same thing that makes her huge losses and bankruptcy. Protection orders illicit trade items are no longer issued.



So where to buy the software?

It will not be surprising that a software manufacturer suggests buying in one with authorized partners. Companies such as Microsoft, of course, they can not accuse any particular seller in the dark, and the final decision to purchase a product where the user belongs to. However, everyone must answer the same, whether such “savings” and purchase a key suspect is the game worth the candle.

Mi would be foolish indeed to charge your bank account hustla the company registered in the Seychelles or the Cayman Islands. I will not give money to someone who pushes me a key generator or fake box, which is reminiscent of the real – even with the film! Looking for Windows should go to Gaza Marek Allegro or shops such as Komputronik, Media Expert or Euro RTV.



The piracy lose lawful seller.

 lets go shopping

Microsoft is trying to educate customers, but not limited to the Redmond giant and treasury are losers on pocederze selling pirated keys. Many of the auctions and tenders in the network report to the official partners of Microsoft.

For them to sell their illegal keys for next to nothing is asked to develop a thread of unfair competition. It can not be affordable to fight with the pirates who do not pay taxes.



What sets apart OEM versions and BOX?

If someone insists on the to look for opportunities to go against this decision is unlikely to dissuade. In this case, I encourage you to read the Microsoft site called How to Tell, where you can find out what to look for when buying a used key. In an interview with Microsoft was able to also clarify BOX software and OEM versions. BOX license version can be installed on any hardware. You can even sell it, provided you remove the system from the previous machine.

Licenses OEM means assigning it to a particular computer. System sold with a laptop can not be transferred to a desktop computer. However, private users can buy never used OEM that bind to a particular computer – understood as the motherboard – the time of the first activation. Such a system can only sell the machine, which has been uploaded. If your computer gets broken, and the motherboard will go into the trash, then you lose the right to use the system.

At the end make no mistake: the purchase of software at a reduced price will usually be a bad investment. On trade in pirated keys in the long term gains not one, but home-grown business.

Some graphics from website Shutterstock.

LikeTweet

Pixar studio has provided its software for free! – CHIP

The only condition that Pixar puts a ban commercial use of the work that you made in RenderMan – if you would like to make money on outfits created with the help of this software, you have to pay 495 $ for a commercial license.

RenderMan is the software used All cartoons Pixar, and in such productions as the Pacific Rim, and Godzilla. Now you can use it at home. And it’s free. Download applications from here: http://renderman.pixar.com/view/non-commercial-renderman

LikeTweet

Tuesday, March 24, 2015

Microsoft’s software will be on devices with … – Banker


             Microsoft announced it has signed an agreement with 11 providers of electronic equipment from mobile operating system Android. Under the agreement, the devices will be pre-installed Office programs and messaging service Skype.
           

 

The US company has informed that the matter has reached an agreement with the companies: Samsung, Dell, TrekStor, JP Sa Couto, Datamatic, DEXP, Hipstreet, QMobile, Tecno, Casper and Pegatron. On devices manufactured and sold by these companies will be installed programs such as Word, Excel, PowerPoint, Outlook, OneNote, OneDirve and Skype.

 

“For manufacturers, this agreement will help increase the value of Android devices and enrich the experience of users who use this equipment,” – said in a statement vice president for Microsoft. Peggy Johnson business development.


 

Media note that Microsoft and creator of Android, Google, compete in the market for mobile operating systems. Microsoft offers its own Windows Phone platform, and Google has produced a number of applications which function in the Office programs. However, in the past, there have to work these conglomerates. (PAP)

 

lm / bk /

LikeTweet

Additional software allows AMD processors to achieve … – Your PC



 

 

 
 



 


 

 



 
 

 

 



0 Most read 0

 




 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 





 



 
188 646 | Memory Comparative test
14 USB3.0 flash drive memory with a capacity of 32 and 64GB
 
180 424 | Images
Mega-test: GeForce GTX 680, 580, 570, 560, Radeon HD 7970, 7950, 7870 …
 
127 894 | Hard Drives
Test 5 portable drives Seagate 2.5-inch USB3.0, HGST, WD, PQI, SP
 
98709 | Processors
Ivy Bridge Intel Core i7-3770K test o / c + HD4000
 
84221 | Hard Drives 120GB SSD
Test: OCZ Solid 3, Vertex 3 and Patriot Pyro
 
83689 | Sound
successor to the throne – Creative Aurvana Live Test! 2
 
80081 | Networks Test
routers in the price 150-300zł: Pentagram P 6343, D-Link DIR-645 and DIR-657
 
77150 | Images
test, comparing the Radeon R9 270X GeForce GTX 760 (2GB)
 
76993 | Software
Review of Windows 8 – what’s new in the final version?
 
75819 | Sound Test
Superlux HD 681 headphones and Brainwavz HM3: appearances can be deceiving
 
74801 | Processors
Tests E8400 vs 2500K – mighty duel of two eras
 
74303 | Hard Drives Test
five 120-tek SSD Kingston HyperX 120GB, 120GB SanDisk Extreme Verbatim 3 120GB and 120GB OCZ Petrol
 
71136 | TV Tuners
Test: DVB-T HD-Wiwa from 50 to HD-95 + Antenna AN-200
 
66623 | Images Test
HD7870, HD7850 and GTX 660Ti, 660, 650Ti new titles
 
65750 | Hard Drives 240GB SSD Test
Samsung 840 EVO, Adata SP900, HyperX 3K, S55, i520
 
64982 | Images
Radeon HD 7970 Review – A graphical revolution (part 1 theoretical)
 
64646 | Hard Drives Test
SSD: Intel 510 250GB Intel 520 240GB, 256GB Samsung 830
 
63179 | Notebooks Test
ultrabook Samsung NP-A02 530U3B
 
61983 | Software
Syndrome last quest, which is the phenomenon of Fallout
 
60485 | Sound
Eelectronics: digital sound – whether analog was really better?
 
59933 | Digital Cameras Test
SONY DSC-HX50 universal power
 
58134 | Smartphones and Tablets Test
GoClever Tab tablet R83.2 Mini
 
55779 | Smartphones and Tablets
Review: Tablet Shiru Shogun 10 “
 
55039 | Networks
TEST: Router? Repeater? No, it N.Plug
 
54932 | Sound
In search of the golden mean – Test Edifier 1280T
 
53792 | Processors Test
AMD FX (Zambezi) @ Bulldozer in Windows 8 Consumer Preview
 
51893 | Sound
test new speakers Creative Inspire T3300 2.1
 
50673 | Software
Review Doom 3 “BFG Edition”
 
50149 | Software
Overview Windows 8: what version Consumer Preview?
 
47349 | Smartphones and Tablets
Review Haier W910 smartphone, which is 100% ” China ” in the attack
 
46682 | Images Test
GeForce GTX 670 – the third Kepler attacks
 
46652 | Cases Test
completely passive housing Streacom FC8 Evo
 
44456 | Sound
Small, a madman. Review FiiO E07K Andes
 
44285 | Sound
Designed to entertain – 2.0 Edifier Speaker Test Studio R1600TIII
 
43833 | Images Test
GPU ~ 1000 PLN – OC Radeon HD 6950 vs GTX 560Ti OC
 


 
0  0 0

Your PC .com © 2001-2015



 

 

 



 

 

 

 

 



 

 

 



COMMENTS

 


  1. This is what is the point in May benchmarks? (author: rookie | Date: 03/23/15 | h .: 17:46 )
    If one ” update ” can be Results capsize?
  2. Temat (author: Prezi | Date: 03/23/15 | h .: 18:15 )
    It is a pity that was not specified string can be downloaded from where.

    Version 1.03B & gt;
    http://downloads.hwbot.org/…tools/BDC_R1.03B.zip

  3. 1 do not understand the question (author: Rush | Date: 23/03/15 | h .: 18:47 )
    each processor / gpu configurations is that you can manipulate the BIOS, microcode, or from internal interfaces secret

    This applet is cchyba over a year, and how to speculations were only appeared with the switch on fpu optimization can affect the stability in some situations

  4. and even easier to replace Prock on the blue (author: Sławekpl | Date: 23/03/15 | h .: 20:26 )
    oj becomes malicious for AMD, as you can see from love to hate short route, that E
  5. @ 04 (author: djXone | Date: 23/03/15 | h .: 21:29 )
    Because the benchmarks better?

     I’m out of your AMD FX-8350 happy. All whizzes like this doll, there is silence, even at maximum load, and more games like 40-60FPS not need.
  6. djXone me with the new i3 also sail system faster than (author: Sławekpl | Date: 03/23/15 | h. 21:52 )
    Phenomie II x4 3,2GHz, which had so far,

     I have the meter IDLE instead of 85W is 30, the difference just to power the monitor;)
  7. AMD (author: Prince | Date: 23/03/15 | h .: 21:58 )
    on the slides and written under the AMD benchach is cool. In the real application of overpaying for poor performance compared to the competition.
  8. Prince and which are written in AMD? (author Sławekpl | Date: 23/03/15 | h .: 22:12 )
    from what I understand it all chipzillę favor, only in the real coding using all the cores do not see so devastating advantage, although it is actually paid for higher TDP, but not all of this take …
  9. @ 06 (author: djXone | Date: 03/23/15 | h .: 22:37 )
    cool :) somehow wrong to me working at Intel. It may be faster, but even with a buddy on the i7 as I installed everything that I could do more things at once he began to think. As I like to have permanent all open and a lot of applications in the background is out of Intel for me. Therefore do not already have a laptop.

    As for the collection I have a 75W in IDLE + monitor 20-25W so much more not pay unless you 6-10 zł for 2 months. Makes a difference: P

  10. djXone if the HDD is any Procek will “think” (author: Sławekpl | Date: 24/03/15 | h .: 0:04 )
    or some free SSD, I was at home and did not notice where the i7 my

     pants pants here and there have already paid for the net, which by the way I got out (orange) and the two hours I can not connect, I had to plug the modem to the aero whoa
  11. @ 10 (author: djXone | Date: 24/03/15 | h .: 0:10 )
    Well interrupts me something last time neta, especially at night, because I am on the phone requests for passwords to e-mail, I do cancel and try and you are done, but it is annoying. Just a question, router, or supplier: P

LikeTweet

Friday, March 20, 2015

New software Tesla protect against battery discharge … – Onet.pl

Software Update, the Model S to be remotely carried out at the end of March. Chairman of Tesla Motors Elon Musk announced yesterday that the changes “will provide drivers with peace of mind,” and so solve the problem. range anxiety. Software Version 6.2 introduces a system to warn against excessive remoteness from the last charging station for electric vehicles, which in turn may result in the car’s battery and its immobilization.

One Coverage Service (ang. Range Assurance) will continue to monitor how far the vehicle is from the charging station, apart from the way those that are heavily loaded. When there is a risk that driving on a planned route, the battery runs out, the driver will be informed and asked if they want to continue to run in that direction.

– will have to answer, “Yes, I’m sure” – and that twice. This will prevent battery discharge, unless he deliberately wants to lead – Musk said at a press conference. If you wish to charge the battery system will direct the driver to the nearest station.

Software Update, as in the past, is done via mobile data.

– designed Model S to be like a computer on wheels. (…) The update is the same as in phones and laptops – Musk emphasized at a press conference.

The issue of the limited range and poor vehicle charging station infrastructure is one of the main problems of the electric car industry. The exception is the United States, where Tesla has made large investments to ensure proper vehicle charging station network. In such a place, the driver can in half an hour to charge the battery or replace it with less than three.

Company announces that in Europe is now more than 400 such sites, most of which is located in Germany. In Poland, there is no official station of the company. On its website the manufacturer says that on a full battery Model S can drive approx. 500 km.

Tesla estimates that 90 per cent. Americans live within approx. 281 km from one of the charging station equipment.

(AF)

LikeTweet

Wednesday, March 18, 2015

Pirated software only in theory has a lot to offer … – Spider’s Web

Pirated software is potentially a lot to offer. Tempts the convenience of access, bargain price, or even free use of the program, costing a substantial sum of money otherwise. Before using this opportunity should however make a simple balance of profit and loss, as we face the consequences of inappropriately high for the benefits.

Regardless of whether use of illegal software unknowingly or deliberately, its use may cause bandwidth potential problems, the existence of which we are often not even aware of it.

Buying the program from the official distribution has one key advantage – it gives absolute certainty the source from which it is derived. The same can not be said of course pirated copies. With this in mind, we should remember that deciding to download or purchase software of unknown origin issue primarily compromised our security.



The threat is very real

Pirated software downloaded from torrents and other file-sharing networks does not give any warranty as to its content. Very often, therefore, that we get … the egg with a twist. And it’s a very unpleasant surprise.

It may, for example, find that installing an illegal copy, open your computer to potential attacks using malicious software that can then bring very unpleasant consequences.

In recent times, especially the popular “bonus” attached to pirated copies were two “worms” – Conficker and dorkbot. There is a high probability that they were used to create so-called “zombie computers” that is, the components of the botnet.

 dorkbot

A botnet is a collection of computers infected in a manner undetectable by the user, and allows the designer to exercise remote control of all infected computers.

A botnet is a very serious threat, since it allows you to make various attacks on users from spam, to the surveillance and stealing personal data. Especially the latter are particularly dangerous, because the range of such deed goes far beyond the computer screens.

It is well known cases of stealing credit card numbers and passwords to web sites and services. In extreme cases, they even identity theft using data obtained using malware localized in an illegal copy of the software. Although this should not be considered as a rule, there were also a very serious cases to clear the bank accounts of users, and we have to admit that it is a much more serious problem than the unwanted mail with offers.

 Confiker

At first glance, it might seem that this practice applies only to pirated versions downloaded from dubious sources, however, the problem is as real in the case of the purchase of illegal copies, the legal form of distribution. Even at the Allegro.

Subject selling pirated software through the auction site will be more thoroughly addressed in the later parts of the cycle, but today should realize that the mere fact that the software is sold on Allegro, not testifies to its legality.

The scale of trafficking is huge, and as a result – all the more dangerous. According to data from January this year, released Spider’s Web, 91% -99% of the available on Allegro distribute two recent versions of Windows and MS Office are illegal copies. It has been estimated that the total revenues from the sale amounted to about 1.9 million.

Just a huge influence (1.4 million) was recorded in the total sales of illegal copies of software Corel, Adobe, and Symantec over January and February. It must be emphasized that it is the amount that goes to the … cheaters, dishonest traffickers preying on the money buyers. These are gigantic sums that should well illustrate how easy to purchase illegal software version, with a seemingly legitimate source.

Also in the case of this form of sale must reckon with possible attacks carried out with malicious software. Especially in the case of purchasing a license key, it is very common to send their emails, in which neither the key nor redirected to the manufacturer, but redirect the user through the entire network naszpikowanych malware websites. This is no different absolutely nothing, by downloading files from torrents – well, except that we spent the money.

 piracy-piracy

Of course, speaking about the consequences of using illegal software, not to mention the legal issues. And here at the beginning you have to make it clear – every time the use of pirated copies of software is a violation of law and is punishable by law.

A comment on this aspect of the case asked James Kralka, the site techlaw.pl .

The computer program is protected by copyright. Both in relation to the question code and graphic design. Therefore, the use of the software piracy are provisions of the Act of Copyright and Related Rights of 1994. Interestingly, these records it appeared only in 1994, before the law did not include them, because prior to this period piracy to flourish.

Art. 74 of the said Act clearly defines the legal nationality of the software:

  1. Computer programs are protected as literary works, unless the provisions of this Chapter do not provide otherwise.
  2. The protection granted to the program computerized includes all forms of its expression. Ideas and principles underlying any element of a computer program, including the base lines, are not protected.

It is worth stressing that copyright excludes from the scope of permissible software use. In contrast to the contentious issue of serials download from sites like Rapidshare, downloading software always violate the law.

Criminal liability in the event of a breach of copyright law defines art. 116 of the Copyright Act:

Whoever, without authorization or against its conditions distributes someone else’s work in its original form or in the form of the development, performance, phonogram, videogram or broadcast, the penalty of restriction of liberty or imprisonment up to 2 years.

  1. If the perpetrator commits the act referred to in paragraph. 1 in order to achieve financial gain, is punishable by imprisonment up to 3 years.
  2. If the perpetrator did the offense referred to in paragraph. 1 a regular source of income or criminal activity, as referred to in paragraph. 1, organizes or directs, be punished by imprisonment from 6 months to 5 years.
  3. If the perpetrator of the act referred to in paragraph. 1 acts unintentionally, subject to a fine, imprisonment or imprisonment for up to a year.
  4. A liability is determined while Art. 79 of this Act, which describes what actions may be entitled to claim that copyright has been infringed, the person who violated the law.

It also follows a moral consequence of the use of illegal software – except that deprive creators due to earnings, supporting criminal activity. Especially in the case of buying pirated copies, including on auction sites, it is worth remembering that not only break the law, but also support the illegal dealings.

An even more serious consequences associated with the use of illegal software may affect companies and institutions that have the commit

I would say that in this case, the losses can be much more severe than in the case of home users.

While private user can, in many cases cover the ignorance of the offense and the purchase of pirated copies, it For companies illegal software is used most often, deliberately.

piracy pirate pirates torenty torrent

Typically, such actions are dictated by the desire to save money, especially in the initial stages of the business, although this is not the case. Also in respected, highly successful companies there were cases of the use of illegal software.

This is particularly true of institutions, in which the cost of a single license for the program is very high, such as design offices and advertising agencies, using the very expensive software.

An employer who decides to take such a step, it risks de facto much more than just place allegations of copyright infringement. Apparent savings resulting from the use of illegal software are also not worth the risk, especially if we take into account several factors.

First of all, by virtue of said art already. 79 of the Act on the Copyright, software developer has the right to demand compensation “by paying a sum of money in an amount equivalent to two times, and if the violation is at fault – three times the appropriate remuneration, which at the time of the investigation would be payable in respect of the award by an authorized permission to use the song. “

Even the need to pay three times the value of the software must be sufficiently” deterrent “. If this is not suggestive enough, we should also take into account the losses resulting from the so-called. lost profits. And these may be the nail in the coffin of the company.

At the moment in which the suspected use of illegal software and the police arrives, we really lose the opportunity to continue to work, because it needed to requisition equipment.

A few years ago there was a situation in which a certain advertising agency won the tender for the campaign of 20 million. However, it was caught using pirated software worth 1.5 million, as a result had to pay a fine, the amount could be as much as three times that amount.

pirate-piracy-keyboard-handcuffs-computer-pc

But that was not the worst – for the duration of the process the agency was deprived of work opportunities, and therefore was not able to realize the signed contract. It is hard to imagine how big the losses suffered in this way. We only know that that the agency has not been able to pick up after them.

Apart from such extreme cases, where the use of illegal software apprentice’s activities or institutions, even the single case of the use of pirated software may err on the fate of the company. Because it affects a very negative impact on the company’s reputation and business reputation is a factor not to be underestimated.

In particular, if we take into account the previously reported attack on the possibilities of digital computers infected with pirate software, it is difficult to expect that customers have entrusted their company data from which these data can be stolen.

It should be remembered also that the consequences are always burdened by the employer. Even if pirated software is detected on the computer of one employee, the employer bears the whole responsibility under Art. 120 of the Labor Code:

  1. If the cause by an employee in the performance of his duties as employee injury to a third party, to make good the damage is the only employer.
  2. In view of the employer who repaired the damage caused to a third party, employee responsibilities as stipulated in the provisions of this chapter.

James Kralka adds:

If someone uses the freeware for non-commercial license to operate, also runs the prawnocywilną liability for breach of license under Art. 79

It is worth mentioning that the problem of illegal software applies not only to private companies, but sometimes … of state institutions

You can use the analogy here to buy on Allegro – it that the entity starts in a legal tender for software announced by the institution does not mean that the product comes from a legitimate source. It would seem that when the tenders should be subject to strict controls (stress – “should”. Reality verify) has no right to come to a situation where a state institution use of illegal software.

Unfortunately, such a situation occurs quite often, according to the analytical data provided Spider’s Web. The majesty of the law traffickers fake copies of software are tendering and very often they win, they usually winning bid determines one factor – price.

prison jail crime punishment piracy pirate

Here you go back even deeper implications, especially in relation to tarnish the reputation. In a situation where a state institution is caught using pirated software loses public confidence in the eyes of citizens, thus resulting in a subsequent public opinion, because as you know, the public likes to generalize.



Everything the hands of the user’s awareness

It would be easy to close this article moralizing cliché, but I think that such matters should be left to their own conscience. It should, however, keep in mind all the consequences described here, especially when deliberately decide to make use of pirated software.

It’s hard to argue that even doing the fast balance of profit and loss, the latter can be overwhelmingly more, the potential benefits. This applies to both home users and businesses.

In the case of people who use illegal copies unconsciously, is unfortunately only sensitivity to the pervasive piracy and informed purchasing from reliable sources. It should be openly question the suspiciously low purchase price, with somewhere in the back of the head that acquired in this way, the product may not be legal.

It should trust their own, common sense, because both in law and in For other threats, we are always guilty themselves.

* Some graphics from website Shutterstock

LikeTweet

Search asteroid with NASA. Agency released a software … – News 24

NASA is implementing a new program that will allow amateur astronomers to locate potentially dangerous for the Earth asteroids. Developers ensure that it has a simple to use interface that does not require advanced scientific knowledge.

 / Fig. Catalina Sky Survey, the University of Arizona Date Hunter Asteroid Program prepared by the NASA Planetary partnership with Resources to search for asteroids by amateur astronomers. A special algorithm uses data from telescopes. The new method has to be about 15 percent. better than previous methods for locating objects in the asteroid belt, located between the orbits of Mars and Jupiter – read on the project website.

Developers ensure that it has a simple to use interface that does not require advanced scientific knowledge. Its installation should not cause any trouble. This software is open source, advanced users can modify its source code.

NASA conducted since 1998. Search for near-Earth objects (Near Earth Objects – NEO). Researchers are looking for observing and photographing the asteroid in the same places in search of moving objects. Observations are conducted by many telescopes.

Why NASA engages in the exploration of amateur astronomers asteroid? Because in a sea of ​​data to generate research centers there is no perfect method to verify all information. Participation enthusiasts discovery increases the likelihood of previously unknown objects.



Read also: Drones will fight with poachers hunting for elephants and rhinos? Please raising money for the program shepherd Air


program can be downloaded from the project website. At the time of the text was not possible to download the application, as previously detected an error in it. Developers are working on fixing it. The program you want to appear on the page within 24 to 48 hours.

LikeTweet

Friday, March 13, 2015

Permanently leave time for “buy and you have”. Subscriptions to … – Spider’s Web

subscription model in recent years gained popularity in many industries. Ranging from access to entertainment services such as Spotify and Netflix on professional programs, such as Adobe’s offer. This year subscriptions are entering new territory – the music production industry.

During the biggest annual music fair NAMM in Los Angeles, two great players market Digital Audio Workstation (DAW) announced that new versions of their programs will be available in the subscription model. The first is Avid ProTools software and – the most popular, professional DAW, used in countless music studios around the world.



ProTools more “Pro”

Although the price of access to ProTools 12 has not yet been given, Avid says that subscribers will have access to a specially prepared app store and RTAS plug-ins that are not available to other customers. With the release of Pro Tools 12 will also be running Avid Service Cloud Collaboration, which brings to the world of music production easy to share projects and collaborate via the cloud.

 protools_sub

The second product, the new version will be available for subscription is Sonar, Cakewalk DAW, directed mainly to smaller studios and home users. Depending on the package, the new Sonar will cost respectively $ 9.99, $ 19.99 or $ 49.99 per month.

For customers opting for a subscription Cakewalk preparing additives in the form of extra features, and the extension of basic Sonar about some of your own synth. The most interesting of these is the Addictive Drums 2, widely recognized as one of the most faithful, virtual percussion.

Both programs also will be available for a flat fee, however, involve a certain number of drawbacks. In both cases, along with the purchase, customers will receive a year’s access to services and subscription version update, but after the 12-hundred months of their versions will not be supported and supplemented by new additions.

 sonar-sub

Interestingly, parallel Avid has released a free version of its program, ProTools First, with limited capabilities, but that is an ideal environment for learning for home-grown music producers.

Competition does not look ready

The representatives of competing companies have reacted in a mixed way to move Avid and Cakewalk. On the one hand we have such powers as Steinberg, who themselves are working on similar models.

On the other hand, very severely criticized these decisions the company responsible for the two fiscal DAW-y, Image-Line (FL Studio) and Acoustica ( Mixcraft). According to the representatives of the manufacturers, software for creative work should not be measured in this way, and the introduction of subscriptions has their opinion, to force the customer to pay over and over for the same.

 ProTools_First_Main_GUI

The idea of ​​condemning particularly representative Acoustici, proclaiming that once purchased software should constantly receive support and updates without requiring extra charges from users who’ve already purchased the product again.

It seems, however, that the subscription model is the inevitable future

Similar concerns have taken the whole world and videografii when Adobe launched in 2012. Creative Cloud service for the full portfolio of products, and a year later to the general controversy announced that the previous versions of the boxed will not receive new features.

Three years, and Adobe subscription packages are used by over 2.8 million users. So I guess we can talk about the success. Despite the very high amount in total, which comes to pay for access to Adobe customers choose to subscribe just because of the constantly increasing functionality and collaboration capabilities offered by Creative Cloud.

 Adobre Creative Cloud

Despite the popularity of professional circles, for most users segment DAW software and Adobe Suite will remain a niche. Subscription model but also reached into one software, which is the undisputed standard for commonly used, office applications. Of course we are talking about Microsoft Office.

With the integration of cloud OneDrive and additional spot on MS servers for a single fee, with Office 365 is already using 9.2 million users. Despite initial reluctance, even customers are accustomed to paying for the service once they decide to license fee, since the amount of the benefits flowing from it is worth many times more than a one-time purchase price.

 Celtx-sub

Returning for a moment to subscriptions to professional, but – for the average user – niche industries, it is worth mentioning the program Celtx, standard in the world of film scripts.

In its base Celtx is free form, but enough to pay $ 9.99 or $ 19.99 to get access to all features of the program, from the simplest (such as scripts breaking apart and outlining each piece) at a very advanced, such as budget planning of the project, to-do list and access to free webinars from the creators of the program.

More for less? May!

Looking at these examples, it is difficult for any doubt as to the subscription access to software – this is the future. The music industry is at the stage of the first step towards the future, and thus, that put him two recognized company, the rest of the producers will have in the near future to provide consumers with a viable alternative.

If the market wants to avoid music production monopolization by one, two service providers have to look to new solutions, making sure it’s all about the interest of the client. It’s time to face the truth – time boxed artistic services programs are slowly fading into the past.

Let alone the benefits of purchasing new models carried tangible benefits enough to justify the monthly fee.

LikeTweet