Skip to main content

$18,048,000 Bill for China

Apparently Microsoft is being accused of abuse in China because it is cracking down on illegal copies of its software. [1]

One excerpt from the article sums up the mentality in China:

More than 80% of the 60,000 Internet users participating in an online survey conducted by Tencent, one of the largest Internet service portals in China, protested the campaign. They complained that it was the high price of a legitimate copy of XP that had forced them to turn to counterfeits. A genuine copy of XP Pro is priced at $376 (2,578 yuan) in the Chinese market.

So if you don't like the price of candy at the local grocery store, you should just steal it. Why should you pay their fair market price when you could just take it and then claim that they forced you to steal it.

China is the single largest offender of global information espionage and currency manipulation. On all of the computer systems that I monitor daily, the vast majority of elicit hacker activity originates from IP addresses in China. Never once have I ever received any response from any complaint that I have filed at a Chinese ISP.

Since China is a communist regime, Microsoft has a legitimate complaint against the government. China has allowed its people to illegally acquire Microsoft's products without any reprocussions, therefore China is subsidizing the cost of said software for its citizens. In short, China owes Microsoft the $376 per copy of illegally installed software, which comes out to $18,048,000 (48,000 users x $376).

A Chinese attorney is quoted in the article asking for $1 Billion in fines for Microsoft. To that, I say, okay. After China pays Microsoft $105,280,000,000 for lost revenue to software piracy. That's assuming 20% of the country are using computers that are running Windows illegally. Even if only 80% of those 20% are illegal, then the fine owed to Microsoft would be $84,224,000,000. I'd be happy to pay $1 Billion to make $84 Billion.

[1] http://scitech.blogs.cnn.com/ "Microsoft Hacking Computer in China"

Popular posts from this blog

DNS Custom Logs and selinux

If you google "named custom logs selinux" you will find quite a bit of chatter about setting up custom logs outside of /var/log for DNS (named). These posts are interesting, but they tend to be run on posts about learning selinux and becoming an expert on named. What you need to know? If you have setup custom logging locations in your /etc/named.conf file, such as:     channel default_file {         file "/var/log/named/default.log" versions 3 size 5m;         severity dynamic;         print-time yes;     }; Then you will likely see errors like this in /var/log/messages: Oct 26 11:41:13 namedsvr setroubleshoot: SELinux is preventing /usr/sbin/named from write access on the directory /var/named/chroot/var/log/named. For complete SELinux messages. run sealert -l 6eab4aaf-e615-4ade-9e88-4efdc789eaf2 Then you run the sealert command as suggested by the very friendly selinux audit log and you are told: #============= named_t ============== #!

THE RISE OF FASCIST SOCIAL MEDIA

The Merriam-Webster dictionary defines fascism as: a tendency toward or actual exercise of strong autocratic or dictatorial control .  The phrase "dictatorial control" is important for the case that I am going to make about fascism in social media. The word "dictatorial" means "of or relating to a dictator," and a dictator is "one ruling in an absolute and often oppressive way." In 2020, social media has seen a rise in the number of autocratic events of censorship. The two social media outlets that I am going to focus on are Facebook and Twitter.  Background Facebook is a semi-private curated blogging platform where you, the user, share information at your leisure. The public part of Facebook is in Facebook Groups. With a group, outside people who are not privy to your "Facebook Wall" will join your group and establish a communal discourse. This can be private, by invitation only, or public. The Facebook is auth-walled so that you must

Outlook Configuration

To read all email in text and be able to extract the mail using mail headers: > regedit HCU/Software/Microsoft/Office/16.0/Outlook/Options/Mail   MinimalHeaderOn = 0 (dword)   ReadAsPlain = 1 (dword)   SaveAllMIMENotJustHeaders = 1 (dword) restart Outlook afterwards, maybe even reboot just for good measure. Now you get to see all of those phishy urls in the emails and you can get all of those embedded image attachments as raw encoded binary when you get the header details on the message. Put the Message Options button in the hot button task bar so you can quickly get this info. No more phishy phish from the numbskulls. I take payment in coffee. It's been a long time since I've had Jamaica Blue Mountain. Just saying. If you know how to disable the jpeg thumbnail render of attachments, please share on twitter. That's an obvious vector.