NB Productions  Your guide on the Web since 2000
Fujitsu Computer Systems Corporation
 
Spread The Word!

Bookmark and Share

 Subscrib 

 Follow nbproductioncom on Twitter

Navigation
· Home
· Advertising
· Archive
· Articles
· AvantGo
· Downloads
· Encyclopedia
· FAQ
· Forums
· Knowledge Base
· Latest News
· Legal
· Reviews
· Search
· Statistics
· Syndicate
· Topics
· Tutorials
· Web Links
Translator
Select Interface Language:

Affiliates

NSA

Referrals 

Windows 7 Home Page

Vista Home Page

Microsoft : Fast Facts

 Microsoft Fix It

 

Livin Low

Daniel D Low Franklin

Livin Low

Music Artist


1· AC / DC
· Cliff Adams
· Tori Amos
· The Beatles
· Chuck Berry
· Bon Jovi
· Kate Bush
· Clannad
· Eric Clapton
10 · Clark Hutchinson
11 · Joe Cocker
12 · The Corrs
13 · The Cranberries
15 · Deep Purple
16 · Diamond Rio
17 · The Doors
18 · Steve Earle
19 · Fleetwood Mac
20 · Free
21 · Peter Gabriel
22 · Rory Gallagher
23 · Genesis
24 · Goo Goo Dolls
25 · David Gray
26 · Guns''n''Roses
27 ·  Alex Harvey Band
28 · Jimi Hendrix
29 · John Lee Hooker
30 · Humble Pie
31 · Michael Jackson
32 · Janis Joplin
33 · Norah Jones
34 · B. B. King
35 · Jerry Lee Lewis
36 · Amanda Marshall
37 · Matchbox 20
38 · Nine below zero
39 · Sin?ad O''Connor
40 · Pink Floyd
41 · Elvis Presley
42 · Carlos Santana
43 · Dan Seals
44 · Steely Dan
45 · Steppenwolf
46 · The Rolling Stones
47 · U2
48 · Uriah Heep
49 · Neil Young
50 · Led Zeppelin
51 · ZZ Top

Donít Be Fooled by Software Pirates
One Microsoft Way

 it's April 2nd, but don't be fooled by bogus software--5 myths about software piracy

 There is a sense of relief when a cruel joke is quickly followed by a wisecracking “April Fools!” But when consumers fall victim to software piracy, you can be sure a pirate won’t relieve their misery with humor.

Software piracy is an unfortunate outgrowth of the technical age, but what multiplies the risk is that many people view software piracy as a victimless crime. A recent survey conducted by the Business Action to Stop Counterfeiting and Piracy (BASCAP)1 revealed that some consumers perceived the counterfeit business to be harmless and not unethical because no one gets hurt. Right?

Wrong. The reality is that all piracy, regardless of industry, can be dangerous, and software piracy is no exception. Here are five common misperceptions about software piracy — and how consumers can benefit from knowing what to look for when making their next software purchase to avoid being duped.

Myth: Software piracy isn’t a serious crime. What’s the big deal?

Reality: Actually, international police organizations have uncovered criminals setting up their own manufacturing plants and distributing software via sophisticated networks throughout the world — especially in countries with poorly enforced intellectual property laws. And what’s more, the profits from pirated and counterfeit software sales can often line the pockets of criminal syndicates. For example, in July 2007, Microsoft Corp. worked with the FBI and Chinese authorities to break up a Chinese-based syndicate believed to be the largest counterfeiting operation in the world, responsible for distributing an estimated $2 billion worth of counterfeit software to 36 countries across five continents. Eleven members of the syndicate arrested during these raids were sentenced in December 2008 to jail terms of up to six and half years.

Myth: Software piracy doesn’t hurt anyone. It’s not like anyone has ever been seriously injured, right?

Reality: Wrong. Consumers who download or buy hard copies of pirated software are at risk of receiving inferior products that leave them vulnerable to viruses, spyware and other malicious codes, as well as potential identity theft from transactions with unscrupulous businesses selling counterfeit software. For example, Media Surveillance, an anti-piracy solutions company based in Germany, recently downloaded several hundred pirated copies of Windows and found that 32 percent contained malicious code.

 

With that in mind, if you install illegally downloaded or counterfeit software there is a good chance that your computer will be infected with a virus that can steal or damage your information. In addition, the research found that today’s tech-savvy software pirates may also be creating large-scale botnets with computers using counterfeit software, and that these armies of compromised computers are being used to perform a host of illegal Internet activities such as spamming, without computer owners being aware this is happening.

Myth: Pirated software is cheaper than genuine software.

 

Reality: Actually, high-quality counterfeit software is often sold at market price, and in some cases can be more expensive than the genuine product.

 

Lower-quality counterfeit may be cheaper, but what might be cheaper could actually end up exposing your personal information, hurting your computer and disrupting your life — and with a large monetary burden. According to a 2006 study by the International Data Corp.2 (http://www.idc.com), the cost to recover from just one incident of malicious software on a single PC can run over a thousand dollars, and the cost to organizations from lost or compromised data can run into the tens of thousands of dollars per incident. Microsoft has also seen instances of credit card theft by those purporting to sell “discounted” software online that was later found to be counterfeit.

 

The best way to ensure you get the best value is to simply purchase the genuine item from a reputable source.

Myth: People who purchase counterfeit software are aware the product is pirated — they are just trying to get a good deal.

Reality: The truth is the majority of people who purchase counterfeit software are not aware they are victims of software piracy. Take a high-quality counterfeit, for instance, which can closely resemble the real deal. The best protection against counterfeit software is to know what to look for before you go shopping. The next time you are in the market for software, think about the following questions:

Are you buying from a reputable reseller?

Can your reseller confirm that their software would pass a Windows Genuine Advantage online validation test? 

Is a Certificate of Authenticity included?

Is a hologram CD, DVD or recovery media included?

Are the product packaging and documentation high-quality?

Is an End-User License Agreement included?

Then you can validate your Windows or Office software to ensure it is genuine. Go to http://www.microsoft.com/genuine, and it only takes a few easy clicks to check whether you purchased the real thing.

Myth: Software piracy is so rampant — what can you do? It’s not like consumers have the power to stop these software pirates.

Reality: Incorrect. At Microsoft, customers are vital to the company’s anti-piracy initiatives, as evidenced by the fact that thousands of enforcement actions have resulted from consumer tips and reports.

 

Over the past two years, Microsoft has seen a surge of voluntary reports — more than 150,000, which is more than double the previous records — from people who unknowingly purchased counterfeit software and wanted to report it. Microsoft encourages anyone who receives suspicious software to call the company’s anti-piracy hotline at (800) RU-LEGIT (785-3448). More information about genuine Microsoft products, licensing and labels is available at http://www.howtotell.com.

 

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential.

1 BASCAP Study, Sept. 10, 2009

2 IDC White Paper sponsored by Microsoft, The Risks of Obtaining and Using Pirated Software, Doc # WP1006GRO, October 2006

 

Note to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://www.microsoft.com/news. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other appropriate contacts listed at http://www.microsoft.com/news/contactpr.mspx.

 

TigerDirect

Posted on Friday, April 02, 2010 @ 17:33:05 UTC by NB
 
Login
Nickname

Password

Security Code
Security Code
Type Security Code

Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.
Related Links
· More about One Microsoft Way
· News by NB


Most read story about One Microsoft Way:
Donít Be Fooled by Software Pirates

Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Excellent
Very Good
Good
Regular
Bad

Options

 Printer Friendly Printer Friendly

Associated Topics

One Microsoft Way

Back to the top



†©† nb-productions.com 2000-2013


:: fiappleblue theme by www.nukemods.com ::