Feeds

Hampshire cops caught using counterfeit MS software

MS and reseller use installation as case study

  • alert
  • submit to reddit

Intelligent flash storage arrays

Updated Microsoft has set the law on the coppers of Hampshire after it discovered the force was using counterfeit copies of Microsoft Office Pro 97.

Officers from the City of London arrested four men yesterday in connection with the crime, reports The Sun. Three of the men work for Protocol Solutions, the integrators who set up the Hampshire force's IT system. The fourth man was an ex-employee of Protocol.

One of the men arrested was a former superintendent of Hampshire. All four have been released without charge.

The police also raided Protocol's offices in Fareham.

According to a Microsoft case study Hampshire Constabulary's system comprises '2,000 desktop personal computers running on 40 Windows NT Server-based server machines.'

The volume price for the Open License Pack of Microsoft Office Professional 97, according to MS' web site, is $412.00.

City of London cops were brought in as independent investigators and because of their expertise in complicated fraud crimes.

Happily Protocol has also used the Hampshire Constabulary deal as a case study. The site doesn't seem to be working that well but the company seems a bit busy trying to compile an official statement about the situation.

Protocol is a Microsoft Certified Solutions Partner, as well as a reseller of IBM, Compaq, Citrix and Sun kit.

The Microsoft case study has quotes "David Walker, IT Project Manager for Hampshire Constabulary, explaining the value of Microsoft Systems Management Server."

"Firstly it performs a regular hardware and software audit of systems connected to the network." It also allows "the management of application licenses, through which savings can be made..." Good stuff that Microsoft SMS.

On a happy note the Hampshire force may be elligible for full authorised versions of the software via Microsoft's latest anti-piracy initiative. This allows resellers and punters to send in their dodgy disks, along with receipts, and then provide full information on how they got the software. They then hope for the merciful Microsoft to rule they've been genuinely stitched up and so deserve replacement CDs. ®

Related Links

Microsoft's case study
Protocol's case study

Related Stories

Insiders help Windows code leak to warez sites, claims 'finder'
Make MS happy: send in your hooky software
Swap your fakes for genuwine software

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.