SlideShare una empresa de Scribd logo
1 de 18
Republic of the Philippines Laguna State Polytechnic University Siniloan, Laguna First Periodical Examination Presented by: ● Olaivar, Gionna Marie L. ● Dizon, Jevilyn B. ● Castro, Eloisa Frances V.
IT Related News 1
Windows XP Piracy Badgering Set To Begin
Microsoft this week plans to update the Windows Genuine Advantage anti-piracy mechanism for Windows XP Professional, which the software giant claims is the most oft-pirated version of Windows. After the update, WGA notifications for XP will be the same as they are for Windows Vista service pack 1, said Alex Kochis, senior product manager in the Windows Genuine Advantage group, in a Tuesday blog post.
That means users whose copies of XP fail validation will see a black background the next time they log in. Although users will be free to switch to their background of choice, the black screen will return every 60 minutes until they validate their copy, and they'll also see a watermark with a logo that reads "Ask For Genuine Microsoft Software."
According to Kochis, this will make it easier for XP users to install and stay up to date with the latest release of WGA notifications. "Our research has clearly shown that customers value the ability of Windows to alert them when they may have software that is not genuine, but they also want the ability to stay up to date with the least effort required on their part," he wrote.
WGA is designed to combat piracy by installing software on users' PCs that periodically checks to see if their version of Windows is authentic before allowing them to download updates. However, WGA has been a source of frustration for many users since it was launched in 2005, due to several incidents in which genuine users have been mistakenly identified as pirates.
Prior to the release of Vista service pack 1, Vista copies that failed WGA validation would enter a reduced functionality mode in which certain features were disabled, but Microsoft changed to the black screen nagging approach when it released Vista SP1.  SOURCE: http://www.crn.in/Software-002Sept008-Windows-XP-Piracy-Badgering-Set-To-Begin.aspx
IT Related News 2
Adobe Embarks on Antipiracy Drive
Adobe India has decided an aggressive campaign to curb piracy. The campaign, which targets both end users and businesses in India that are using and profiting from pirated Adobe software, began in New Delhi with a number of enforcement activities whereby hundreds of unlicensed copies of Adobe products were siezed.  
"The campaign will be a combination of education and enforcement measures. We will educate customers about the risks associated with using pirated software as it is often corrupt, can breach personal and business information security, and even interrupt business continuity as businesses recover from the damages. We will work alongside local governments and agencies to identify resellers, businesses and end-users who produce, distribute and sell unauthorized copies of Adobe software," said Sandeep Mehrotra, director of sales at Adobe India.
According to the recent survey released by piracy watchdog, Business Software Alliance (BSA), 69 percent of PC software was obtained illegally in 2007. Additionally, an IDC economic impact study  released in January of this year found that reducing PC software piracy in India by ten percentage over a period of four years could generate an additional 44,000 new jobs, $3.1 billion in economic growth, and $200 million in tax revenues.  Source: http://www.crn.in/Security-007Aug008-Adobe-Embarks-on-Antipiracy-Drive.aspx
IT Related News 3
Imation Launches  Memorex Mice
Imation India has launched the Memorex range of uni-retractable laser mouse. Priced at Rs 600, the mouse is available in green, blue and white and features a patented retractable mechanism that pulls or hides cables ensuring less clutter. It also features optical laser technology that ensures precise cursor control with no mouse ball to clean. The three button mice are ergonomically designed so that both left-handed and right-handed find it easy to use and also has a scroll wheel for better navigation.  The peripheral has 1,600 dpi resolution, and have both USB and PS/2 connectors.  Source: http://www.crn.in/Hardware-001Sept008-Imation-Launches-Memorex-Mice.aspx
End of Presentation
Thank you!

Más contenido relacionado

La actualidad más candente

Creating the Internet of YOUR Things. Global Azure Bootcamp 2018
Creating the Internet of YOUR Things. Global Azure Bootcamp 2018Creating the Internet of YOUR Things. Global Azure Bootcamp 2018
Creating the Internet of YOUR Things. Global Azure Bootcamp 2018"Darren "Doc"" Robinson
 
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentFundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentMark Szewczul, CISSP
 
Microsoft Handheld Strategy with Windows 10
Microsoft Handheld Strategy with Windows 10Microsoft Handheld Strategy with Windows 10
Microsoft Handheld Strategy with Windows 10Barcoding, Inc.
 
Strategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyStrategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyMobile Labs
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
 
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung at Work
 
Malware detection techniques for mobile devices
Malware detection techniques for mobile devicesMalware detection techniques for mobile devices
Malware detection techniques for mobile devicesijmnct
 
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESMALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESijmnct
 
Samsung KNOX: The Game Changer for Enterprise Mobility
Samsung KNOX: The Game Changer for Enterprise MobilitySamsung KNOX: The Game Changer for Enterprise Mobility
Samsung KNOX: The Game Changer for Enterprise MobilitySamsung at Work
 
Internet of Everything: Retail’s Future
Internet of Everything: Retail’s FutureInternet of Everything: Retail’s Future
Internet of Everything: Retail’s FutureCisco Services
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyserTim Youm
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersKaseya
 
Getting your iOS Device Managed by WSO2 EMM
Getting your iOS Device Managed by WSO2 EMMGetting your iOS Device Managed by WSO2 EMM
Getting your iOS Device Managed by WSO2 EMMWSO2
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016 Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016 IDG Connect
 
IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014Felipe Lamus
 
2014 information technology threat predictions
2014 information technology threat predictions2014 information technology threat predictions
2014 information technology threat predictionsPrayukth K V
 

La actualidad más candente (18)

Creating the Internet of YOUR Things. Global Azure Bootcamp 2018
Creating the Internet of YOUR Things. Global Azure Bootcamp 2018Creating the Internet of YOUR Things. Global Azure Bootcamp 2018
Creating the Internet of YOUR Things. Global Azure Bootcamp 2018
 
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentFundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product Development
 
Microsoft Handheld Strategy with Windows 10
Microsoft Handheld Strategy with Windows 10Microsoft Handheld Strategy with Windows 10
Microsoft Handheld Strategy with Windows 10
 
Strategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyStrategic Private Cloud - When and Why
Strategic Private Cloud - When and Why
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
 
Malware detection techniques for mobile devices
Malware detection techniques for mobile devicesMalware detection techniques for mobile devices
Malware detection techniques for mobile devices
 
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESMALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES
 
Samsung KNOX: The Game Changer for Enterprise Mobility
Samsung KNOX: The Game Changer for Enterprise MobilitySamsung KNOX: The Game Changer for Enterprise Mobility
Samsung KNOX: The Game Changer for Enterprise Mobility
 
Internet of Everything: Retail’s Future
Internet of Everything: Retail’s FutureInternet of Everything: Retail’s Future
Internet of Everything: Retail’s Future
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyser
 
Protect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and HackersProtect Yourself Against Today's Cybercriminals and Hackers
Protect Yourself Against Today's Cybercriminals and Hackers
 
Using the Cloud
Using the CloudUsing the Cloud
Using the Cloud
 
Getting your iOS Device Managed by WSO2 EMM
Getting your iOS Device Managed by WSO2 EMMGetting your iOS Device Managed by WSO2 EMM
Getting your iOS Device Managed by WSO2 EMM
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016 Security in the Hybrid Cloud Now and in 2016
Security in the Hybrid Cloud Now and in 2016
 
IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014IDC, the third platform and a security perspective Latam, Cisco Live 2014
IDC, the third platform and a security perspective Latam, Cisco Live 2014
 
2014 information technology threat predictions
2014 information technology threat predictions2014 information technology threat predictions
2014 information technology threat predictions
 

Similar a Group1 First Periodical Exam

INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37Felipe Prado
 
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...Black Duck by Synopsys
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35Felipe Prado
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
 
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
Open Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk ManagementOpen Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk Management
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk ManagementBlack Duck by Synopsys
 
Antipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 engAntipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 engFitira
 
The History of Bug Bounty Programs
The History of Bug Bounty ProgramsThe History of Bug Bounty Programs
The History of Bug Bounty ProgramsCobalt
 
Tech series: Windows Azure Media Services
Tech series: Windows Azure Media ServicesTech series: Windows Azure Media Services
Tech series: Windows Azure Media ServicesJuan Pablo
 
Session 12-newsbytes
Session 12-newsbytesSession 12-newsbytes
Session 12-newsbytesTechnocratz
 
GFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business DatasheetGFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business DatasheetAndre Muscat
 
Fingrene væk fra F12
Fingrene væk fra F12Fingrene væk fra F12
Fingrene væk fra F12Microsoft
 
Build 2017 - B8101 - Windows 10 identity overview
Build 2017 - B8101 - Windows 10 identity overviewBuild 2017 - B8101 - Windows 10 identity overview
Build 2017 - B8101 - Windows 10 identity overviewWindows Developer
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Black Duck by Synopsys
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCase IQ
 
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing Scam
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing ScamOpen Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing Scam
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing ScamBlack Duck by Synopsys
 
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdfLogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdfaradhana9856
 

Similar a Group1 First Periodical Exam (20)

INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
 
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
Open Source Insight: Paraskevidekatriaphobia, Web APIs, Jeep Hacking, More ...
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
Open Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk ManagementOpen Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk Management
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
 
Antipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 engAntipiracy telesales training part 1, 2 and 3 eng
Antipiracy telesales training part 1, 2 and 3 eng
 
Windows7sins
Windows7sinsWindows7sins
Windows7sins
 
The History of Bug Bounty Programs
The History of Bug Bounty ProgramsThe History of Bug Bounty Programs
The History of Bug Bounty Programs
 
Tech series: Windows Azure Media Services
Tech series: Windows Azure Media ServicesTech series: Windows Azure Media Services
Tech series: Windows Azure Media Services
 
Adware
AdwareAdware
Adware
 
Adware
AdwareAdware
Adware
 
Session 12-newsbytes
Session 12-newsbytesSession 12-newsbytes
Session 12-newsbytes
 
GFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business DatasheetGFI LanGuard SDK - Business Datasheet
GFI LanGuard SDK - Business Datasheet
 
Fingrene væk fra F12
Fingrene væk fra F12Fingrene væk fra F12
Fingrene væk fra F12
 
Build 2017 - B8101 - Windows 10 identity overview
Build 2017 - B8101 - Windows 10 identity overviewBuild 2017 - B8101 - Windows 10 identity overview
Build 2017 - B8101 - Windows 10 identity overview
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing Scam
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing ScamOpen Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing Scam
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing Scam
 
Security News bytes October 2013
Security News bytes  October 2013Security News bytes  October 2013
Security News bytes October 2013
 
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdfLogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
LogMeInLogMeIn found in 2003 and base in Boston, Massachusetts, is.pdf
 

Último

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Group1 First Periodical Exam

  • 1. Republic of the Philippines Laguna State Polytechnic University Siniloan, Laguna First Periodical Examination Presented by: ● Olaivar, Gionna Marie L. ● Dizon, Jevilyn B. ● Castro, Eloisa Frances V.
  • 3. Windows XP Piracy Badgering Set To Begin
  • 4. Microsoft this week plans to update the Windows Genuine Advantage anti-piracy mechanism for Windows XP Professional, which the software giant claims is the most oft-pirated version of Windows. After the update, WGA notifications for XP will be the same as they are for Windows Vista service pack 1, said Alex Kochis, senior product manager in the Windows Genuine Advantage group, in a Tuesday blog post.
  • 5. That means users whose copies of XP fail validation will see a black background the next time they log in. Although users will be free to switch to their background of choice, the black screen will return every 60 minutes until they validate their copy, and they'll also see a watermark with a logo that reads "Ask For Genuine Microsoft Software."
  • 6. According to Kochis, this will make it easier for XP users to install and stay up to date with the latest release of WGA notifications. "Our research has clearly shown that customers value the ability of Windows to alert them when they may have software that is not genuine, but they also want the ability to stay up to date with the least effort required on their part," he wrote.
  • 7. WGA is designed to combat piracy by installing software on users' PCs that periodically checks to see if their version of Windows is authentic before allowing them to download updates. However, WGA has been a source of frustration for many users since it was launched in 2005, due to several incidents in which genuine users have been mistakenly identified as pirates.
  • 8. Prior to the release of Vista service pack 1, Vista copies that failed WGA validation would enter a reduced functionality mode in which certain features were disabled, but Microsoft changed to the black screen nagging approach when it released Vista SP1. SOURCE: http://www.crn.in/Software-002Sept008-Windows-XP-Piracy-Badgering-Set-To-Begin.aspx
  • 10. Adobe Embarks on Antipiracy Drive
  • 11. Adobe India has decided an aggressive campaign to curb piracy. The campaign, which targets both end users and businesses in India that are using and profiting from pirated Adobe software, began in New Delhi with a number of enforcement activities whereby hundreds of unlicensed copies of Adobe products were siezed.  
  • 12. "The campaign will be a combination of education and enforcement measures. We will educate customers about the risks associated with using pirated software as it is often corrupt, can breach personal and business information security, and even interrupt business continuity as businesses recover from the damages. We will work alongside local governments and agencies to identify resellers, businesses and end-users who produce, distribute and sell unauthorized copies of Adobe software," said Sandeep Mehrotra, director of sales at Adobe India.
  • 13. According to the recent survey released by piracy watchdog, Business Software Alliance (BSA), 69 percent of PC software was obtained illegally in 2007. Additionally, an IDC economic impact study  released in January of this year found that reducing PC software piracy in India by ten percentage over a period of four years could generate an additional 44,000 new jobs, $3.1 billion in economic growth, and $200 million in tax revenues. Source: http://www.crn.in/Security-007Aug008-Adobe-Embarks-on-Antipiracy-Drive.aspx
  • 15. Imation Launches Memorex Mice
  • 16. Imation India has launched the Memorex range of uni-retractable laser mouse. Priced at Rs 600, the mouse is available in green, blue and white and features a patented retractable mechanism that pulls or hides cables ensuring less clutter. It also features optical laser technology that ensures precise cursor control with no mouse ball to clean. The three button mice are ergonomically designed so that both left-handed and right-handed find it easy to use and also has a scroll wheel for better navigation. The peripheral has 1,600 dpi resolution, and have both USB and PS/2 connectors. Source: http://www.crn.in/Hardware-001Sept008-Imation-Launches-Memorex-Mice.aspx