Feeds

Indiana man jailed for selling counterfeit software on eBay

Why are we not surprised?

Security for virtualized datacentres

An Indiana man bought some counterfeit Rockwell Automation software on eBay, set up the CD-duplicator and sold the disks on, you guessed it, eBay.

Now he's paying the price: 27 months in jail, forfeiture of computers and CD duplicators, a $2,000 fine, two years of supervised release, and an order to make restitution of $5,200.45

Courtney Smith, 36, of Anderson, Ind. made 4,149.97 in 32 auctions conducted in 2004– the retail value of the software sold was more $700,000, so eBay once again lives up to its reputation as a place for bargain hunters.

In England, criminals never get to be called "Mister" by the newspapers. The US's Department of Justice is more courteous:

"Mr. Smith exploited eBay to sell hundreds of thousands of dollars worth of counterfeit software at drastically reduced prices, thereby illegally profiting on the back of the copyright holder," said Assistant Attorney General Fisher. "The Department of Justice is committed to prosecuting individuals who exploit legitimate online auction sites to sell pirated software and commit other acts of fraud."

Press release here. ®

Security for virtualized datacentres

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.