Feeds

Microsoft names and shames Net pirates

Counterfeiters scuppered

  • alert
  • submit to reddit

Intelligent flash storage arrays

Microsoft is suing alleged software pirates across six US states for selling illegal goods via the Internet. According to Microsoft, three of the defendants were flogging fake software through online auction sites, and at least two relied on spamming via email. All used the Inernet as their primary forum for distributing the software, it said. The software giant has filed legal action and asked for injunctions to stop the individuals offering and distributing the goods. One of the companies, Capital One, is also accused of having forged email headers and disguising the source of its emails to pass fake software off as genuine. Those hit with the legal action are: Abu Salahuddin, Morgantown, W. Va: for alleged distribution of counterfeit Office 97 Professional Edition via Internet auctions. Capital One CDRom Warehouse, aka Internet Marketing, of Corpus Christi, Texas: for alleged distribution of counterfeit Office Professional 97 via mail as advertised through mass unsolicited e-mail. KT Services, aka Vantage Software, Pacific Ventures, Los Angeles: for alleged distribution of counterfeit Microsoft Windows 98 operating system and Office Professional 97, via various Web sites as advertised through unsolicited e-mails. http://www.vantages.com, http://www.softwareselect.com,http://mall5.register.com, http://www.cdsales.com, http://www.ebiz5.com, http://www.kts1.com,http://www.cheapy.net, http://208.12.66.216, http://63.68.194.43, http://63.68.194.44 Martin Johns, Fond Du Lac, Wis: for alleged distribution of counterfeit Office Professional 97 via Internet auctions. NC Software/Kent Bishop, Wilmington, NC, for alleged distribution of counterfeit Windows 95 and 98 and Office Professional 97 via Web sites and Internet auctions. http://store.yahoo.com/ncsoftware/ Software Blowouts and Arthur Young, Hackettstown, NJ, for alleged distribution of counterfeit Office Pro 97 via various Web sites. http://wwwsoftwaremadness.com, http://www.nationalsoftware.com,http://www.bargainsoftware.com, http://www.softwareblowouts.com "Internet piracy is growing nearly as rapidly as the Internet itself, and it is severely harming confidence in feeling safe to conduct legitimate business online," said Tim Cranton, corporate attorney for Microsoft anti-Internet piracy. Related stories Novell takes pirate to task BSA breaks chatroom piracy ring Stealing Microsoft software is wrong -– but...

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.