Warning: Some posts on this platform may contain adult material intended for mature audiences only. Viewer discretion is advised. By clicking ‘Continue’, you confirm that you are 18 years or older and consent to viewing explicit content.
1 guy used a pirated piece of software and added it to a server which was then used to make an image for more servers so that pirated software was then proliferated out onto about half the servers in a Fortune 500 company.
Does the installation process not include activation of product? I never worked in infrastructure side of IT so not sure how enterprise softwares work. Surely someone must have noticed it early on right?
1 guy used a pirated piece of software and added it to a server which was then used to make an image for more servers so that pirated software was then proliferated out onto about half the servers in a Fortune 500 company.
Does the installation process not include activation of product? I never worked in infrastructure side of IT so not sure how enterprise softwares work. Surely someone must have noticed it early on right?
Not if you make an image. That’s just a copy of the state-as-is.