Here’s some theft info from Website Magazine. Click on picture for full story.
Do you ever wonder why software licenses are so complicated, and what you can do about them?
Beyond simply waiting for the software industry to clean up their act, there are a few ways that customers can better protect themselves when purchasing software. For example, never trust the spoken word of your software sales representative. Some will say anything simply to “lock in” a deal. That includes lying about how you’re allowed to use their software. Unfortunately, this means you’re going to have to read the fine print. Even better, have an attorney that specializes in IT and licensing matters review the license for you. They can then explain the agreement in a way you can better understand.
Click on picture for full story.
Getting at the heart, or kernel, of the Linux matter. Is Microsoft “the only [company] doing serious innovating with Linux?” That’s Jessie Frazelle’s contention. Frazelle, who rose to prominence in the developer community with Docker and later Google Cloud, made the bold claim to justify her departure to Microsoft. On its face it seems silly, an over-exuberant claim to justify a career move.
(Click on the picture of the word Linux above for the
WannaCry took down wide swaths of the internet over the weekend, then disappeared. Here’s what you need to know, without the hype.
(click on the picture for the full article.)
So I don’t need to worry about it right now?
Wrong. Very wrong. This is one of those rare times when the Windows sky is falling. We already have reports from Matt Suiche of a new WannaCry variant that’s been sinkholed with 10,000 infections logged. The clones are coming, and many of them won’t be easy to stop. You have to get your Windows PC patched now.
Microsoft’s security team fixed a type confusion flaw in its malware engine that affects practically all of its security products. The point of antivirus is to keep malware off the system. A particularly nasty software flaw in Microsoft’s antivirus engine could do the exact opposite and let attackers install malware on vulnerable systems. Click on the picture to get the full scoop.