Feeds

Chilean anti-piracy law drafted on pirated software

.doc shocker in the houze!

Secure remote control for conventional and virtual desktops

Chilean lawyer Guillermo Frêne is having a bit of a bad hair day after it was revealed that draft legislation aimed at cutting the internet connections of illegal downloading ne'er-do-wells was presented in .doc format written on pirated software.

The full outrage was exposed here, which shows that the firm of attorneys responsible for the document goes by the rather unusual name of "The houze":

Document properties showing the organisation as The houze!

According to the exposé, "many modified (and illegal) copies of Microsoft Office are identified as belonging to 'The houze!'", and that the program forms part of a "Windows Unattended Edition".

Frêne, meanwhile, has responded (in Spanish, natch) that he was "never involved in drafting the said legislation".

He admits he doesn't know how his name came to be on the document, but explains he worked as a parliamenary adviser between 2007-8 and suspects it was based on some file from the personal computer he used at that time. ®

Beginner's guide to SSL certificates

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.