Microsoft steps up fight against Internet piracy

Microsoft Corp. said that it has joined with law enforcement and several software companies to fight software piracy and on-line fraud around the world. In a statement, the company said that it has assisted enforcement agencies that have taken action against organized criminal counterfeiters in 22 countries, including Argentina, Brazil, Canada, Hong Kong, Taiwan, Thailand, Colombia and Germany.

In addition, Microsoft has sought the immediate removal of alleged counterfeit and illegal software offerings from Internet sites and auctions, bringing the number of takedowns to more than 47,000 in six months and 88,000 in the past two years, according to the statement. Launched just over six months ago, Microsoft’s Internet Scanning Tool, which runs around the clock to identify illegal on-line offerings, has allowed Microsoft to find Web pirates faster than was previously possible, the company said.

Symantec unveils systems management suite

Software developer Symantec Corp. has launched an upgraded version of its PC management tool Ghost, called Ghost Enterprise Edition 7.0.

Ghost 7.0, which competes with products such as PowerQuest Corp.’s Drive Image Pro., will provide IT administrators with the ability to configure, clone and back-up computers remotely, the Cupertino, Calif.-based company said.

New worm targets unprotected Linux systems

Security analysts recently warned that another worm is hunting the Internet for Linux systems left unprotected against several well-publicized vulnerabilities, including one commonly found in Version 7.0 of Durham, N.C.-based Red Hat Inc.’s Linux release.

Known as Adore, the new worm is the third found to be targeting Linux servers since January, following earlier ones called Ramen and Lion. The newest worm is similar to Ramen and Lion in the way it acts. Adore creates back doors in computers based on the open-source Linux software, then automatically transmits configuration data and other identifying information about the compromised systems to four e-mail addresses.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Empowering the hybrid workforce: how technology can build a better employee experience

Across the country, employees from organizations of all sizes expect flexibility...

What’s behind the best customer experience: How to make it real for your business

The best customer experience – the kind that builds businesses and...

Overcoming the obstacles to optimized operations

Network-driven optimization is a top priority for many Canadian business leaders...

Thriving amid Canada’s tech talent shortage

With today’s tight labour market, rising customer demands, fast-evolving cyber threats...

Staying protected and compliant in an evolving IT landscape

Canadian businesses have changed remarkably and quickly over the last few...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now