Gefühlt hat der Handel mit zweifelhaften Produkt-Keys und Datenträgern in den letzten Jahren deutlich zugenommen. Unser Partner Microsoft hat zwei Webcasts bereitgestellt, in denen sich Experten des Themenkomplexes annehmen und erklären, waren man echte Lizenzen und Produkte erkennen kann, wie man zweifelhafte Angebote meidet und welche rechtlichen Konsequenzen für Unternehmen erwachsen, wenn illegale Lizenzen zum Einsatz kommen.

Teil 1 von 2:

Der Handel mit angeblichen Lizenzen zu Windows, Office und Windows Server boomt. Tatsächlich steckt oft keine Lizenz hinter dem Angebot, sondern lediglich ein Key zu verführerisch guten Konditionen. Das schädigt nicht nur die Partnerlandschaft, welche von Handel mit legalen Lizenzen lebt, sondern auch den Endkunden, denn der macht sich strafbar.

Teil 2 von 2:

Legale Lizenzen erhalten Sie bei uns:

Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net
DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net
DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net

By Talos Group Soon after a launch of a new cryptocurrency, Bitvote, in January, Talos discovered a new mining campaign affecting systems in India, Indonesia, Vietnam and several other countries that was tied

Source:: Cisco Security Notice

By Talos Group Soon after a launch of a new cryptocurrency, Bitvote, in January, Talos discovered a new mining campaign affecting systems in India, Indonesia, Vietnam and several other countries that was tied

Source:: Cisco Security Notice

By Panos Kampanakis We have blogged about post-quantum cryptography before. Quantum computers would pose a threat to PKI algorithms and systems that we know today. Cisco, with our academic collaborators, has been

Source:: Cisco Security Notice

By Panos Kampanakis We have blogged about post-quantum cryptography before. Quantum computers would pose a threat to PKI algorithms and systems that we know today. Cisco, with our academic collaborators, has been

Source:: Cisco Security Notice

By Talos Group Overview Talos is disclosing five vulnerabilities in Foxit PDF Reader. Foxit PDF Reader is a popular free program for viewing, creating,

Source:: Cisco Security Notice

By Talos Group Overview Talos is disclosing five vulnerabilities in Foxit PDF Reader. Foxit PDF Reader is a popular free program for viewing, creating,

Source:: Cisco Security Notice

By Talos Group This blog post was authored by Jonas Zaddach and Mariano Graziano. Cisco Talos has rolled out a series of improvements to the BASS open-source framework aimed at speeding

Source:: Cisco Security Notice

By Talos Group This blog post was authored by Jonas Zaddach and Mariano Graziano. Cisco Talos has rolled out a series of improvements to the BASS open-source framework aimed at speeding

Source:: Cisco Security Notice