Wednesday, April 29, 2015

Microsoft: piracy of software and video in Poland is … – PC World

Yesterday I took the World Intellectual Property Day and
 Microsoft this occasion together with the consulting firm PwC has prepared an interesting
 report, which analyzed the software piracy in our
 country
. That takes into account both the pirated software,
 as well as the problem of watching illegal movies
 network.

Unfortunately, we have nothing to be proud of. It turns out, that
 from 29% to 49% of the respondents
in response to a question
 paid for obtaining access to services, where you can
 watch illegally movies , replied:
 Yes. PwC estimates that the sposo b Polish economy loses
 from 500 to 700 million
per year! Besides, we
 that occur in the country each year to about 400-500 million plays
 films, plays 650-750 million episodes and 150-180 million
 plays transmission of sporting events. These are values ​​that
 hard to imagine.

The data presented in the report show that theft
 video is a common phenomenon in Poland.
 Worrying is the attitude of some web portals
 operating on the Polish market that instead of educating users
 and fight the phenomenon, maintain services that provide access to
 pirated content and derive from them additional benefits, eg. selling
 there advertising space
“- says Sabina Leipzig
 Video director of the group Onet-RASP.

It is no different for software on computers. Here
 n ajwięcej lose such companies as Microsoft, Corel, Adobe
 or Norton
. It turns out that the software listed
 up companies is very often offered in the auction, as
 Allegro. Unfortunately, fighting out; is not that easy,
 although possible, what we pretend
 Thomas Z. case where the court in Slupsk sentenced to three years
 imprisonment. Without the “hinge”.

piracy_p.jpg Piracy in Poland is standard. Unfortunately

The BSA has established that in January this year in one of the largest
 auction services more than 90% of the copies of Windows 7/8 and
 Office 2010/2013 was illegal
. It is worth noting,
 that the sale of this type of software in January was almost 2
 million. As you might notice, Microsoft itself much on the
 earned.

Microsoft products, such as operating systems Widnows 7
 and 8, as well as packages of Office 2010 and 2013 are the most widely used
 illegal software. We need to constantly educate users,
 that the use of such software is not only illegal,
 but also dangerous for them.
“- says Krzysztof
 Florczak from the Polish branch of Microsoft.

In addition, BSA reports that from month to month sale
 illegal (or suspects) copies of the software companies
 Adobe, Corel and Norton grow. In February of – respectively – 86%, 71%, and
 90%.

Remember that buying illegal software we have
 reckon with the consequences
. Not only legal, but
 also related to the use of the pirates, who often do not
 receive the update, and it makes the work environment is
 more vulnerable to threats from the network, as viruses and Trojans

»See also:
  Game of Thrones set a new record … illegal downloads from
 torrent

Source: press release

LikeTweet

What exactly is illegal software? Where pirates take … – Spider’s Web

Piracy is not theft? Even if you agree with this, it is still a criminal offense, especially if you decide to sell illegal software. But where it comes from “left” goods, since software developers use various anti-piracy?

What is the definition of illegal software? Contrary to appearances, it is not that easy to determine. Illegal software may be such that it is not used in accordance with the license attached to it. This can also be defined in advance software as illegal (they are all sorts of “crack”). Finally, it can be a legitimate copy of the software, which is performed by someone other than an authorized distributor, often strikingly reminiscent of the original (referred to here, of course, on the packaging and the media).

The biggest problem of piracy is the fact that developed it to the level of a gigantic business. This in turn means that pirated copies are becoming increasingly powerful, less and less distinguishable from legitimate products. All this in order to introduce us to mistake for us to earn and … expose us to unpleasant consequences.

The Polish law on piracy is raw, and in accordance with Art. 74-772 of the Law on Copyright and Related Rights, the very use of pirated software threatens a fine, restriction of freedom, requisition instrumentalities (computers, servers), even if they do not belong to the perpetrator and imprisonment from three months to five years. The company, which infringed the copyright of a computer software company may also be forced to pay the amount of compensation.

The Pirates want to enrich us and do not care about our subsequent troubles with the dimension of the law. But to stretch those honest with us, we must first create confusion. Unfortunately, over the years have come to the incredible skill.



Boxes still on the wave

Despite the increasing emphasis on digital distribution and offering software as a service, selling “boxes”, so the software distributed on physical media is still one of the main channels of distribution. Pirates did not forget and built around this whole industry. Tolerated by one of the world’s superpowers, and thus China.

 counterfeit-software

According to a study commissioned by the United Nations, more than 70 percent boxes of counterfeit software comes from the Middle Kingdom. Why was there? It’s very simple: after all, is a country of cheap artisans, whose capacity to perfection wyszlifowała world economy. It is the largest manufacturer and exporter of goods in the world. Abilities gained in the manufacture of legal products uses so when creating fakes. Often using the same production lines and technological processes.

The smugglers introducing Chinese fakes on the European and American market are extremely efficient. They use both Internet trading platforms, such as Amazon and Allegro and also through local partners bring boxes for sale.



Pirates are ready for the digital age distribution

Older Readers Spider’s Web, remembering a time when copyright in our country was not in force, certainly not forgotten how “activates a up” purchased on the stock exchange games and programs. To the product was included so-called crack, and so cheating additional anti-piracy program. And although computer exchanges times are long behind us, cracks still exist and they’re doing better than ever.

The crack spreads are treated by the law with a particular “anointing”. Act of 4 February 1994. On copyright and related rights Art. 1181 says that anyone who manufactures equipment or its components for the unauthorized removal or circumvention of effective technological protection measures before playing, recording or reproducing works or objects of related rights or trades in such devices or their components or advertises them for sale or lease, subject to a fine, imprisonment or imprisonment up to 3 years who owns, keeps or uses the devices or their components referred to above shall be subject to a fine, imprisonment or imprisonment for a year.

The crack spreads are particularly problematic for software developers and law enforcement agencies due to the fact that they can actually make anyone who is good at programming. Often the biggest talents in uncovering algorithms are sitting in a house in the suburbs and their all-night coding scheme negative impact on geography quiz the next day. These individuals motivated by a desire I develop safeguards to show off in front of colleagues or ideological motives hooking of anarchism. It’s also a free labor force for people who want to illegally enrich on software sales.

 the-Pirate-Bay

Distribution scrackowanego the software is much cheaper than boxed, but also requires logistics and planning to “catch” those persons who wish to have legitimate programs. Operating diagram is usually very similar. First, pirates, using botnets controlled by himself and computers, begin to send out spam to users in a given country. Spam refers to “promotion”, “unprecedented offer” on the software. But “just click, you will perform the transfer and the software is ready to download”. Fully working, activated, looking like the real thing, downloaded from the indistinguishable at first glance from a typical online store. Installing it we break the law without knowing it, and “distributor” does not assume virtually no cost associated with breaking the security of the program or game.



The worst thing, however, is perfidious lie

To defend yourself before buying trefnego, a box of software just to make purchases in the well-known stores or directly from the distributor. The same goes for programs, moreover, digitally distributed: just a little prudence in observing promotion and use them only if you know and trust a particular vendor. A serious problem starts at the point where we see the desired program on the popular site, buy it and … we become pirates.

Many times already encountered situations where, for leading our country, and auction platforms for group buying software appeared cheaper by up to 90 percent. Not only buy, right? But normally this office suite for business license costs 2300 gold, and offer him there for 400 …

This software does not come from China or any other factory counterfeits. Nor is it in any way sckrackowane. After installation normally activated and there is no indication it would be with him something was wrong. Meanwhile, both we commit the crime, as well as the entity that sold the software to us. All the … license.

Software developers often offer the same product at different prices, tailored to the needs of the customer groups. What else is the end user software for free for noncommercial purposes, and another exactly the same software used by the purchaser for business purposes. Therefore, often to tender hit stores as part of a larger program license agreement. We get only a partial license that is not valid, if we are not a member of the organizational structure (for example, corporations). Product description in our offer, as you might imagine, does not mention such minor details.

 & # x17A; r & # XF3; d & # x142; by: kotaku.com

Source: kotaku.com

How to defend themselves? The worst part is that it’s not that simple. It’s hard because when web users expect that this, every time he sees “incredible opportunity”, instead of hastily purchased, decides to go to the vendor’s site, look for a license for the type of software and load in a difficult ciężkostrawny document.

Pirated software still appears on Internet auctions and online group buying websites. This is what has changed over the years, the intentions of selling these programs. Today, they are increasingly using the ignorance of buyers and distribute the goods declared its originality, which often seems to indicate price close to that official. We have been cooperating with the police, trying to minimize this illegal activity and its harmful effects. People who buy such software are exposed not only to legal consequences, but also the loss or theft of data, eg. By malicious applications running in the background. For a small business the use of illegal software – consciously or not – sooner or later may mean a loss contractors and losses or penalties, leading them to ruin. Therefore, we recommend the use of official channels of software distribution and, in case of doubt, report to Microsoft that will help verify the seller and offered his products . – Says Ilona Tomaszewski of the Polish office of Microsoft, responsible for the protection of intellectual property.

Microsoft declares, therefore, that in case of doubt the technical support will help in determining the legality of that offer. Other software vendors are not necessarily obliged to provide such assistance, although many are doing it. And that means that sometimes we rely on ourselves ….



Software as a service can solve the problem

With him because pirates can not cope for purely technical reasons. What else is off transaction of sale, and another permanent provision of the service. Not only deepens the relationship between the company and the consumer and the service provider or reseller, but virtually impossible to “falsification” of this service by third parties. It is true that a quick trip to Web sites offering pirated software somewhat verifies our views (you can easily find the “broken” of Office or Adobe Creative Cloud and others), but the procedure security breaches such software client, which in addition must be repeated at every change on the part of the service provider makes a person decides to pirated versions is fully aware of violations of their rights.

Software as a Service there is still a future song. Companies and consumers are still wary about the idea, accustomed to the traditional form of software distribution. It may, however, prove that the subscription programs will become an ideal compromise between the two parties (the user and the service provider), and the subscription price will be shaped solely by demand and offer competition. Without having to compensate losses incurred as a result of the creators of fakes, deliberately placing their clients in error.

* The illustrations come from the service Shutterstock

LikeTweet

Tuesday, April 28, 2015

What exactly is illegal software? Where the pirates are taking … – Spider’s Web

Piracy is not theft? Even if you agree with this, it is still a criminal offense, especially if you decide to sell illegal software. But where comes the “left” goods, since developers use various anti-piracy?

What is the definition of illegal software? Despite appearances, this is not so easy to determine. Illegal software may be such that it is not used under license attached to it. It may also be a software defined in advance as an illegal (these are all sorts of “crack”). Finally, it may be a legal copy of the software, which is performed by someone other than an authorized distributor, often strikingly reminiscent of the original (referred to here, of course, on the packaging and the media).

The biggest problem of piracy is the fact that developed it to the level of a giant business. This in turn means that pirated copies are becoming increasingly powerful, less and less distinguishable from legitimate products. All this, to introduce us to mistake for us and earn … expose us to unpleasant consequences.

The Polish law on piracy is raw, and in accordance with Art. 74-772 of the Law on Copyright and Related Rights, the very use of pirated software threatens a fine, restriction of freedom, requisition instrumentalities (computers, servers), even if they do not belong to the perpetrator and imprisonment from three months to five years. The company, which infringed the copyright of the manufacturer’s software can also be forced to pay the amount of compensation.

Pirates of us want to get rich and do not care about our subsequent troubles with the dimension of the law. But to stretch those honest with us, we must first be misleading. Unfortunately, over the years have come to the incredible skill.



Boxes still wave

Despite the increasing emphasis on digital distribution and offering software as a service, sale of “boxes”, and so on distributed software physical media is still one of the main channels of distribution. Pirates have not forgotten about it, and built around the entire industry. Tolerated by one of the world’s superpower, so China.

 counterfeit-software

According to a study commissioned by the United Nations, more than 70 percent boxes of counterfeit software comes from the Middle Kingdom. Why is there? It’s very simple: after all, is a country of cheap craftsmen whose ability to perfection wyszlifowała world economy. It is the largest manufacturer and exporter of goods in the world. Abilities gained in the production of legal products used so when creating fakes. Often using the same production lines and processes.

The smugglers introducing Chinese fakes on the European and American market are extremely efficient. Use both Internet trading platforms such as Amazon and Allegro, and also through local partners bring boxes for sale.



Pirates are ready for the digital age distribution

Older Readers Spider’s Web, remembering a time when copyright law in our country was not in force, certainly not forgotten how “activates a the” purchased on the stock exchange games and programs. The product was included so-called crack, so cheating additional anti-piracy program. And although computer exchanges times are long behind us, cracks still exist and are better than ever.

crack spreads are treated by the law with a particular “anointing”. The Act of February 4, 1994. On Copyright and Related Rights Art. 1181 says that anyone who produces devices or their components for unauthorized removal or circumvention of effective technological protection measures before playing, recording or reproducing works or objects of related rights or trades in such devices or their components, or advertises them for sale or lease, subject to a fine, imprisonment or imprisonment up to 3 years who owns, holds or uses equipment or its components, referred to above shall be subject to a fine, imprisonment or imprisonment for up to a year.

crack spreads are particularly problematic for software developers and law enforcement on the grounds that it may actually make anyone who is good at programming. Often the best talent in uncovering algorithms are sitting in a house in the suburbs and their all-night coding scheme negative influences of geography quiz the next day. These individuals motivated by the desire to secure we work out to show off in front of colleagues or ideological motives hooking anarchism. It is also a free labor for those who want to illegally enrich on software sales.

 the-Pirate-Bay

Distribution scrackowanego software is much cheaper than the box, but it requires logistics and planning in order to “catch” those persons who want to have a legitimate programs. Functional diagram is usually very similar. First, pirates, using botnets controlled by them and computers, they begin to send out spam to users in the country. Spam refers to “promotion”, “unheard of” senior software. After all, “just click, perform the transfer and software will be ready for download”. A fully functioning, activated, looking like the real thing, downloaded from the indistinguishable at first glance from the typical online store. Installing them break the law without knowing it, and “dealer” does not assume virtually any costs associated with security violations of the program or game.



The worst thing, however, is treacherous lie

In order to defend themselves before buying trefnego, a box of software enough to make purchases in the well-known stores or directly from the distributor. Moreover, the same goes for digitally distributed programs: just a little prudence in observing the promotion and use them only if they know and trust a particular vendor. Serious problem starts at the point where we can see the desired program on the popular site, buy it, and … we become pirates.

Many times already encountered situations in which, in our country’s leading auction platforms and for group purchasing software appeared cheaper by up to 90 percent. Not only to buy, right? But normally the office suite for business license costs 2300 gold, and offer him there for 400 …

This software does not come from China or any other factory counterfeits. Nor is it in any way sckrackowane. After installation normally activated and there is no indication that anything was wrong with him wrong. Meanwhile, both we commit a crime, as well as the entity that we sell software. All the … license.

Developers often offer the same product at different prices, tailored to the needs of the customer groups. What other software is transferred to you for free for non-commercial purposes, and another exactly the same software used by the purchaser for business purposes. Therefore, shops often get to the offers that are part of a larger program license agreement. We get only a partial license, which is valid if we are not a member of the organizational structure (for example, corporations). Product description in our offer, as you might imagine, makes no mention of such small details.

 & # x17A; r & # XF3; d & # x142; o: kotaku.com

Source: kotaku.com

How to defend themselves? The worst part is that it’s not that simple. It’s hard to expect because the internet user that is, every time I see the “amazing opportunity” rather than hastily buy, decides to go to the manufacturer’s website, look for a license for the type of software and load in a difficult ciężkostrawny document.

Pirated software still appears on Internet auctions and group buying websites. What has changed over the years, the intentions of selling these programs. Today, they are increasingly using the ignorance of buyers and distribute the goods declared its originality, which often seems to indicate the price close to that official. We have been cooperating with the police, trying to minimize the illegal activity and its harmful effects. People who buy such software are exposed not only to the legal consequences, but also the loss or theft of data, eg. By malicious applications running in the background. For a small business use of illegal software – consciously or not – sooner or later may mean the loss of customers and losses or penalties, leading them to ruin. Therefore, we recommend using the official software distribution channels, and in case of doubt, the application from Microsoft that will help verify the vendor and products offered by the . – Says Ilona Polish Tomaszewski from Microsoft Office, responsible for the protection of intellectual property.

Microsoft declares, therefore, that in case of doubt the technical support will help in determining the legality of the offer. Other software vendors are not necessarily required to provide such assistance, although many are doing it. And that means that we often rely on ourselves ….



Software as a service can solve the problem

With the pirates because they can not cope with purely technical reasons. What else is a one-off transaction of sale, and another permanent provision of the service. Not only deepens the relationship between the company and the consumer and the service provider or reseller, but virtually impossible to “falsification” of the services by third parties. It is true that a quick trip to sites offering pirated software bit verifies our views (you can easily find the “broken” Office’a or Adobe Creative Cloud and others), but the procedure of such security breaches client software, which is in addition to be repeated for each change on the part of the service provider makes the person deciding on pirate versions is fully aware of violations of their rights.

Software as a Service is still a song the future. Companies and consumers are still wary about the idea, accustomed to the traditional form of software distribution. It may, however, prove that the subscription programs will become an ideal compromise between the two parties (the user and the service provider), and the subscription price will be shaped only by demand and offer competition. Without the need to compensate for losses incurred as a result of the creators of fakes, deliberately placing their clients in error.

* The illustrations are from the site Shutterstock

LikeTweet

Monday, April 27, 2015

Microsoft: piracy software and video in Poland is … – PC World

Yesterday I took the World Intellectual Property Day and
 Microsoft this occasion together with the consulting firm PwC has prepared an interesting
 report, which analyzed the software piracy in our
 country
. That takes into account both the pirated software,
 as well as the problem of watching illegal movies
 the network.

Unfortunately, we have nothing to be proud of. It turns out, that
 from 29% to 49% of the respondents
in response to a question
 paid for obtaining access to services, where you can
 watch illegally movies , replied:
 Yes. PwC estimates that the sposo b Polish economy loses
 from 500 to 700 million
a year! Besides, we
 that occur in the country each year to about 400-500 million plays
 films, plays 650-750 million episodes and 150-180 million
 plays transmission of sporting events. These are values ​​that
 hard to imagine.

The data presented in the report show that theft
 video is a common phenomenon in Poland.
 Worrying is the attitude of some web portals
 operating on the Polish market, which, instead of educating users
 and fight the phenomenon, maintain services that provide access to
 pirated content and derive additional benefits from them, eg. selling
 there advertising space
“- says Sabina Leipzig
 Video Director of Onet-RASP.

It is no different in the case of software on computers. Here
 n ajwięcej losing companies such as Microsoft, Corel, Adobe
 or Norton
. It turns out that the software listed
 above companies are often offered in the auction, as
 Allegro. Unfortunately, fighting out; is not that easy,
 although possible, what we pretend
 Thomas Z. case where the court in Slupsk sentenced to three years
 imprisonment. Without the “hinge”.

piracy_p.jpg Piracy in Poland is standard. Unfortunately

The BSA has established that in January this year in one of the largest
 auction services more than 90%, and a copy of Windows 7/8
 Office 2010/2013 was illegal
. It is worth noting,
 that the sale of this type of software in January was almost 2
 million. As you might notice, Microsoft itself much on the
 earned.

Microsoft products, such as operating systems Widnows 7
 and 8, as well as packages of Office 2010 and 2013 are the most widely used
 illegal software. We need to constantly educate users,
 that the use of such software is not only illegal,
 but also dangerous for them.
“- says Krzysztof
 Florczak from the Polish branch of Microsoft.

In addition, BSA reports that the month-to-month sales
 illegal (or suspects) copies of the software companies
 Adobe, Corel and Norton grow. In February of – respectively – 86%, 71%, and
 90%.

Remember that buying illegal software we have
 reckon with the consequences
. Not only legal, but
 also related to the use of the pirates, who often do not
 receive the update, and it makes the work environment is
 more vulnerable to the network, such as viruses and Trojans

“See also:
  Game of Thrones set a new record … illegal downloads from
 torrent

Source: Press Release

LikeTweet

Friday, April 24, 2015

Samsung released the next version of the software for the media SSD … – PCLab.pl

Memory Samsung SSD 840 EVO in the time of their entry the market has been enthusiastically received by consumers, as offered very good performance and seemed to be cost-effective price. Unfortunately, at the end of September last year, it has been shown that after some time their performance drastically decreases. The manufacturer quickly correct the problem by issuing the appropriate update, but it turned out that it helps only temporarily.

After some time of users to install the patch again began to report more lower productivity, and the researchers found that it is responsible for this allocation algorithm configured incorrectly cells and atrophy of goods contained in the individual cells of NAND Flash. Even though you know what is causing the decline in the performance of this repair this problem has not been easy, as evidenced by a failed first attempt. Despite this, Samsung did not give up and finally released the next version of the software, which is definitely solve the problem with the carriers SSD 840 EVO.

The latest version of Samsung Magician marked as number 4.6 offers the option of Advanced Performance Optimization, which is designed specifically for said model. Unfortunately, the repair of the problem is not limited to the use of this feature, because you must also update the software to version EXT0DB6 media, but it can be done easily directly through the user interface Samsung Magician. The new version of the program can be downloaded from the official website of the manufacturer. Initially, the company’s servers seemed to be overly burdened and did not allow you to download the file, but now it seems that everything is fine.

According to the first test, the very media software update improves the performance, but the use of the Advanced Function Performance Optimization further improves performance. According to PCPerspective service, operating parameters actually returning to normal, although it is not known whether this time the improvement will last, whether the problems again after some time return. Given all the confusion surrounding media SSD 840 EVO, Samsung would rather not commit to that. The results of these tests are shown below.

before upgrading

After updating

After updating and using the Advanced Performance Optimization

The Samsung SSD 850 EVO 250 GB – test

LikeTweet

Thursday, April 23, 2015

The Samsung SSD 840 EVO: new software solves … – benchmark.pl (Register)

Samsung SSD 840 EVO disk image

Samsung has released a new version of Samsung Magician software that solves the problem of performance degradation SSD 840 EVO media.

Please note that the first information about the problems already appeared last autumn – Users then noticed a decrease in disk read performance of older files. Shortly thereafter, has released new software that theoretically would solve blemish media. However, the problem returned, because in January, users again began to complain of loss of power.

Samsung has long worked on the problem and released a new version of the version of the Samsung Magician – among the major changes appeared in feature advanced performance optimization (Advanced Performance Optimization) for carriers of a series of SSD 840 EVO. To use it, however, is required disk firmware update to version EXT0DB6Q (can be done from the application Samsung Magician).

Samsung Magician 4.6 - Advanced Performance Optimization option

The first tests show an improvement in performance – even just after updating the software, but the same function Advanced Performance Optimization also brings an additional increase in performance.

Samsung SSD 840 EVO 128 GB - performance
Samsung SSD drive capacity 840 GB 128 EVO before updating the software

Samsung SSD 840 EVO 128 GB - performance
Samsung SSD drive capacity 840 GB 128 EVO software update

Samsung SSD 840 EVO 128 GB - performance
Samsung SSD drive capacity 840 GB 128 EVO software update and activate functions Advanced Performance Optimization

Let’s hope that this is the end of the adventure with a decrease in disk performance Samsung SSD 840 EVO.

Download Project Maelstrom
Download Samsung Magician 4.6

Source: Samsung, PC Perspective

LikeTweet

New firmware for the Canon XF205 – swiatobrazu.pl

Canon unveiled the new firmware for the camera Canon XF205 Full HD. Firmware improves the opportunities for reducing noise when recording in low light conditions and allows for live transmission over an IP network. The update was developed based on feedback from users – eg TV operators and wedding – and offers improved recording modes and increased productivity.

 Updated firmware for the camera Canon XF205 Full HD adds new settings for the image quality. Users will be able to record material with less noise, even when shooting in low-light conditions. Already available updated to better match the image quality of the situation and operator preference. The choice is not yet available default mode in which the image is recorded in the highest quality, as well as the new setting, allowing you to record with less noise.

 Additional update, which will be available in June 2015. Enable the realization of video transmission over IP networks, which is the standard often used in the television industry. With this feature, you will carry out live broadcasts of news or websites.

 In addition, thanks to the new software, the camera will work XF205 transmission hardware Fujitsu – Network devices IP-900IID and IP-920D HD / SD [1] – as well as the software that supports IP streaming. New features will transmit video over an IP network without the need for additional tools or editing systems, such as those used by television stations.

 The new firmware, not only introduce IP streaming, but will also make available two new features recording. Saving material in MP4 format operator will be able to use the recording in slow / fast motion – releasing the action as much as 40 percent. or speeding up to 250 per cent. In addition, choosing a camera XF205 Wi-Fi settings menu appears with an improved interface, which will provide even more intuitive.

Advertising

  Additional Notes:

 The update for IP streaming will support follows XF205 camcorder video formats:

 




 
 
 


 
 


 
 
 
 


 
 
 
 


 
 
 
 


 
 
 
 
 


  XF205 starting material

 


 


  Fujitsu IP-900IID Network and IP-920D HD / SD Compact Video Decoder

 


 


  Software supporting IP streaming

 

 


  Resolution

 


 


  Frequency

 

 


 1280 x 720 pixels

 


 


 29.97P (9 Mb / s / 4 Mb / s)

 


 


 Support from April 2015

 


 


 Supported

 

 


 1280 x 720 pixels

 


 


 25P (9 Mb / s / 4 Mb / s)

 


 


 Support from April 2015

 


 


 Supported

 

 


 640 x 360 pixels

 


 


 29.97P (1.5 Mb / s)

 


 


 –


 

 


 Supported

 

 


 640 x 360 pixels

 


 


 25P (1.5 Mb / s)

 


 


 –


 

 


 Supported

 

 

 




 [1] Fujitsu IP-900IID Network and IP-920D are trademarks of Fujitsu Limited, registered in Japan and other countries. Fujitsu Network Devices IP-900IID and IP-920D I support the XF205 camcorder from April 2015. Fujitsu Network Devices IP-900IID and IP-920D HD / SD can not be available in all countries / regions.

 

 

LikeTweet

Tuesday, April 21, 2015

New firmware for the Canon XF205 – swiatobrazu.pl

Canon unveiled the new firmware for the camera Canon XF205 Full HD. Firmware improves the opportunities for reducing noise when recording in low light conditions and allows for live transmission over an IP network. The update was developed based on feedback from users – eg TV operators and wedding – and offers improved recording modes and increased productivity.

 Updated firmware for the camera Canon XF205 Full HD adds new settings for the image quality. Users will be able to record material with less noise, even when shooting in low-light conditions. Already available updated to better match the image quality of the situation and operator preference. The choice is not yet available default mode in which the image is recorded in the highest quality, as well as the new setting, allowing you to record with less noise.

 Additional update, which will be available in June 2015. Enable the realization of video transmission over IP networks, which is the standard often used in the television industry. With this feature, you will carry out live broadcasts of news or websites.

 In addition, thanks to the new software, the camera will work XF205 transmission hardware Fujitsu – Network devices IP-900IID and IP-920D HD / SD [1] – as well as the software that supports IP streaming. New features will transmit video over an IP network without the need for additional tools or editing systems, such as those used by television stations.

 The new firmware, not only introduce IP streaming, but will also make available two new features recording. Saving material in MP4 format operator will be able to use the recording in slow / fast motion – releasing the action as much as 40 percent. or speeding up to 250 per cent. In addition, choosing a camera XF205 Wi-Fi settings menu appears with an improved interface, which will provide even more intuitive.

Advertising

  Additional Notes:

 The update for IP streaming will support follows XF205 camcorder video formats:

 




 
 
 


 
 


 
 
 
 


 
 
 
 


 
 
 
 


 
 
 
 
 


  XF205 starting material

 


 


  Fujitsu IP-900IID Network and IP-920D HD / SD Compact Video Decoder

 


 


  Software supporting IP streaming

 

 


  Resolution

 


 


  Frequency

 

 


 1280 x 720 pixels

 


 


 29.97P (9 Mb / s / 4 Mb / s)

 


 


 Support from April 2015

 


 


 Supported

 

 


 1280 x 720 pixels

 


 


 25P (9 Mb / s / 4 Mb / s)

 


 


 Support from April 2015

 


 


 Supported

 

 


 640 x 360 pixels

 


 


 29.97P (1.5 Mb / s)

 


 


 –


 

 


 Supported

 

 


 640 x 360 pixels

 


 


 25P (1.5 Mb / s)

 


 


 –


 

 


 Supported

 

 

 




 [1] Fujitsu IP-900IID Network and IP-920D are trademarks of Fujitsu Limited, registered in Japan and other countries. Fujitsu Network Devices IP-900IID and IP-920D I support the XF205 camcorder from April 2015. Fujitsu Network Devices IP-900IID and IP-920D HD / SD can not be available in all countries / regions.

 

 

LikeTweet

Saturday, April 18, 2015

What to do in order not to be deceived and do not buy illegal … – Spider’s Web

PC got his first as a 10-year-old. Even then I had some idea of ​​the pirate software. I was fully aware that the boards of the original games and programs have very nice prints, while their illegal counterparts are just signed marker. It was later found out that this issue is much more complicated than it may seem.

perfectly aware of the people who Several years ago, decided to buy a used OEM Windows bundled with … mouse or keyboard. For a long time Microsoft allowed to buy your operating system along with the peripheral device. Whether or not it was legal, depend on many variables. For example, if the first holder of the software is not only installed it on your computer, but also registered them, has been assigned to a specific hardware.

large_windows_98_wallpaper_by_jlsgraphics-d41y8cx

And thus, install it on another machine was illegal. Such a system could then sell only to the computer on which to work. However, if you do not register the system could with (almost) clear conscience resell it with that accessory. This means that the user deciding to purchase the software you use really buying a pig in a poke, and did not know whether legal receive the operating system.



The provisions in this matter were extremely vague.

It is difficult to So no surprise that Microsoft finally gave up the opportunity to sell their systems of computer accessories. However, the deletion of a single defective license does not record that made all the doubts disappeared Software purchased on Internet auctions. It turns out that on popular auction sites, you can easily find a huge number of seemingly legitimate programs only.

They are characterized by a very attractive, often several times lower than in the store price. This makes them decide to purchase multiple users łasych for promotions. For sold in this way programs are mainly operating systems Windows 7 and Office 2010 office suite.

 microsoft-windows-7

They are usually sold in digital form and delivered in the form of a key to install the software. In this case, the disc from the system or program must be downloaded on their own. However, the digital versions of these products are not sold in the Polish distribution. Therefore, almost certainly they are not legal. Many are sold in this way is spisywanych keys with labels located on the chassis of computers lined up with boxes of legal software, or simply generated through the appropriate application.

Many sellers do not know the limits of their insolence and decides to … illegal selling of the same keys for several people at the same time. The scale of trafficking perfectly provide the information made available by Microsoft. According to them, more than 90% of the Windows operating systems are available on auction sites is illegal.



The very fact pay for something that makes the product is legal.

Contrary to appearances, this is a very logical. After all, if you buy a stolen car, and you’ll pay for the thief, will continue this stolen car. Many people, however, can not translate the rational principles to the world of digital purchases. The problem with this are not only those who use the computer occasionally, but also people who while working with handfuls use of new technologies. An example of such a person is Teresa Bochwic, Member of the Board of the Polish Journalists Association.

The company wanted to buy her grandson animated film. I did it using … with Chomikuj.pl, or a place that is often used to share illegal copies of various types of files. When it turned out that “bought” it does not work properly file … complained to “shop” for Twitter. After many file shares your message probably noticed his mistake, he deleted the tweet felernego. Or rather, tried to do so. Anyway, see for yourself:

 Capturing

Therefore, prior to the acquisition of any digital content, make sure that … we buy it at all. Payment of a subscription to the service which allows downloading does not make it downloaded via the data becomes legal. Of course, I realize that Polish law allows you to download music and movies for your own use. However, this does not mean that you have to use that option. It’s a matter of decency.

In the end, by downloading from illegal sources do not pay the creator of the work of creating it, even though we use it. In addition, at their own request, we deprive ourselves of any technical assistance. Picked by Teresa Bochwic movie turned out to be looped advertising. Had bought a movie in the renowned store, surely such a problem would not occur.

And even if by some miracle would occur, the correct version of the film would be sent again, or there would be a refund. It should also be noted that Polish law treats differently video, music and games and programs. If you illegally download a new movie or a music album, it is a morally questionable, but does not wait for you for criminal liability as long as it does not share with others. If you download an illegal game or program, you are a criminal, even without access to it.

windows-8-pro-office-365-microsoft

Many people say that an effective way to protect against piracy is definitely on purchase network services, such as Office 365.Cóż, not really. Coupons from access to the Office’s annual 365 are often attached to computers, tablets and even smartphones with Windows. Unfortunately, a large part of sellers feeds on ignorance clients and … these coupons are removed from the boxes with the hardware. About practices such employee told me one of the largest electronics chain stores in Poland.

Tickets to the movies, coupons and vouchers game that gives you access to all sorts of software then get on Internet auctions. There are described as legitimate, even though their resale without equipment is prohibited and in violation of license terms. An even greater problem arises when someone wants to buy such software on the invoice. Then the use of illegal software reaches a fiscal offense, which is a much more serious offense.



Before such situations, however, impossible to prevent.

Just buy the software in reputable stores. Places enjoying a high reputation can not afford to sell pirated software. Differently than small shops just developing. These have to fight by all means for customers. That is why some of them are opting for illegal activities described above.

If you want to be 100% sure that no illegal software depresses you, go to a reputable, existing for many years, a chain of stores and buy the product you’re interested in right over there. You’ll pay a little more, but in return you will gain something far more precious than money, namely peace of mind. Absolutely sure of your purchase or you can be if you bought the software or subscribe directly on the site of its manufacturer. In this case, Microsoft.

 Office 365

This applies not only to the Office, but also all other programs and games purchased digitally. Do not believe us? Go to Allegro and type the title of any new game console. You’ll see that you can get for a fraction of the price of the Playstation Store visible or Xbox Store. However, when you load exactly the content of the auction, you will see that it really does not buy her a full-fledged version, but only a temporary access to your account, which is a game.

After a set time on the auction you lose access to your account and to the game. As if that were not enough, the title you can not play on your account and get behind any of his achievements. It is also possible to buy a single access to the installer. Then what is true, you can use the game to his credit, but after replacing the hard drive or a hard reset of the console you lose access to all their titles. Well, this is inconsistent with the licensed game.

A good choice can also be strongly software added to the equipment. Therefore, buying a ready computer, such as a laptop, it is best to select the version of the device with an attached Windows operating system and Office productivity suite. Before buying such equipment should make sure that it is equipped with several elements of authentication software. One of them is the label genuine Microsoft software.

 surface 3 1

In most cases, it is placed on the back or the lower part of the equipment. However, some devices, such as mobile or tablet Windows Phone Windows can not have her. Therefore, we also make sure that your computer is equipped with a Certificate of Authenticity. This label is most often placed on the housing PC or, in the case of some of the newer laptops in the battery compartment.

It has security features it before sfałszowaniem.Jednym of them is a thread woven into the paper. In places where comes to the surface, see the different fibers of the paper. Another safety feature is an edge coated with a special ink. It changes color from green to magenta, when viewed from different angles.

You have to admit, however, that finding a reputable store illegal computer preinstalled with the operating system of a miracle. Of course, the relative certainty of purchase is not the only aspect of the reason to choose the software that came with the hardware. All because selling duo consisting of hardware and software pays for absolutely everything.

 microsoft office

Manufacturers can sell a complete device that right out of the box will just work. The customer receives a computer software package, you do not have to personally install, configure and set. Microsoft, in turn, benefit from this, because users accustomed to its services and thereby raising future customers.

That’s why the company from Redmond often joins the hardware your software for a nominal fee or even for free. This means that buying hardware from the operating system and office suite is pure profit. You want practical examples? Here you are. Annual price of Office 365 is at least 199 zł. But you can also get it by buying a tablet costing just over 300 zł.

This means that if right now you need an office package, you can get a tablet for an additional charge of just over 100 dollars. Remember that we are talking about equipment that can be used as an inefficient, but still PC. Just plug it into a monitor, keyboard and mouse. This is really something.

 Office on the iPad

Do you have the original software?

If the reading of the text started to wonder if you held by the software certainly is original, you should go to How to Tell created by Microsoft. You can on it to see how it looks genuine Windows, Office and Xbox games. The site also shows what you should pay careful when buying hardware or software both in store, as well as over the Internet.

If you have purchased pirated software unknowingly or have a suspicion that someone is selling them, can such a case report by clicking this link. Microsoft then carefully check of the vendor and will make sure that the products sold by him are indeed genuine. Thus, not only upewnicie that you buy not sell, but also sprawicie that a potential fraudster will no more victims. In short, you do a good deed.

Read also:

* Some of the photos from website Shutterstock.

LikeTweet

Friday, April 17, 2015

Poland computers infected with malware – Interia

1 hour. 31 minutes ago

280,000 – enough computers in Poland every day infected with malware – According to the data collected for 2014 years by the CERT Poland operating within NASK research institute. As emphasized by the experts, as many as four of the ten biggest threats is distributed by cyber criminals targeting e-banking customers.

Of the ten most common in Poland threats based on malware until four are banking Trojans.

/ © 123RF / Picsel

Kaspersky Lab reported a rare and unusual an incident in which one cybercriminal formation attacked the other. In 2014. Hellsing, small and unremarkable group cyberszpiegowskie mainly attacking government organizations and diplomatic missions in Asia, has become a goal-oriented … read more

Among the most dangerous threats in the form of a botnet malware is called ZeroAccess and ZeuS, which also includes the Citadel and its derivatives. In a statement, they took respectively second and third. The biggest botnet in Poland remains Conficker, although its percentage in relation to 2013 decreased by almost 5 percentage points. Interestingly, both the botnet and ninth on the list of Virut is a malicious software over which cyber criminals no longer have control, which means that they are not active at this time. As experts emphasize CERT Poland, their presence in the statement provides, inter alia, that most of the infected computers remain infected for years, sometimes up to the end of the operation of the devices themselves.


Of the ten most common in Poland threats based on malware until four are banking Trojans. Respectively: ZeuS ZeuS GameOver, Bankpatch, Banatrix. The Trojans are in most cases on the infected computer to modify the appearance of the web page of the bank, which cybercriminals have full access to the victim’s account and can transfer funds in it. Except as inform professionals, is Banatrix, which replaces the bank account number in the memory of the browser process, resulting in money instead of getting to the recipient’s bank account cybercriminals.

– If we assume that for every inhabitant of Polish there is one computer, then averaging the results for 2014 years we can say that the day’s infected with malware is a city the size of Katowice. This is best illustrated by the scale of the phenomenon and its potential effects on the functioning of our country – says Piotr Kijewski, head of the CERT Poland. – The increase in cyber activity directed at online banking users in our opinion the most important and the most disturbing trend of the previous year, resulting in a real loss of money many actors – emphasizes Piotr Kijewski.

LikeTweet

Poland haven for cyber criminals. Infected hundreds of thousands of … – Virtual Poland


  280 000 – enough computers in Poland on a given day are infected with malware – According to the data collected for 2014 years by the CERT Poland, operating within NASK research institute. As emphasized by the experts, as many as four of the top ten threats are distributed by cybercriminals are aimed at the e-banking customers.
 

 Among the most dangerous threats in the form of a botnet malware is called ZeroAccess and ZeuS, which also includes the Citadel and its derivatives. In a statement, they took respectively second and third. The biggest botnet in Poland remains Conficker, although its percentage in relation to 2013 decreased by almost 5 percentage points. Interestingly, both the botnet and ninth on the list Virut are malicious software over which cybercriminals no longer control, which means that they are not active at this time. As experts emphasize CERT Poland, their presence in the statement provides, inter alia, that most of the infected computers remain infected for years, sometimes up to the end of the operation of the devices themselves.
 

 Of the ten most common in Poland threats based on malware until four are banking Trojans. Respectively: ZeuS ZeuS GameOver, Bankpatch, Banatrix. The Trojans are in most cases on the infected computer to modify the appearance of the web page of the bank, which cybercriminals have full access to the victim’s account and can transfer funds in it. Except as inform professionals, is Banatrix, which replaces the bank account number in the memory of the browser process, resulting in money instead of getting to the recipient’s bank account cybercriminals.
 

 – If we assume that for every inhabitant of Polish there is one computer, then averaging the results for 2014 years we can say that the day’s infected with malware is a city the size of Katowice. This is best illustrated by the scale of the phenomenon and its potential effects on the functioning of our country – says Piotr Kijewski, head of the CERT Poland. – The increase in cyber activity directed at online banking users in our opinion the most important and the most disturbing trend of the previous year, resulting in a real loss of money many players – he said.
 

  See also: How do worms that infect smartphones
 

LikeTweet