Button Up

Blog

IT market: reality and perspective

9 Jul 2019
Michael Kalinichenko
Michael Kalinichenko
Nowadays, there are two revealing trends on the IT market. First, any solution should work on mobile devices. Therefore, any area of mobile development becomes obligatory for any company specializing in all sorts of fields from game development to protection of corporative information. Specializing in mobile development is compulsory for each company regardless of its size and specialization on the market.

How Russian and Western societies look upon failures in business

20 Mar 2019
Michael Kalinichenko
Michael Kalinichenko
Rudyard Kipling said, ‘East is East, and West is West, and never the twain shall meet’. The commonplace phrase often justifies any difference in mentalities extending it to Russia.

Features of financial planning in development of commercial software

14 Feb 2019
Michael Kalinichenko
Michael Kalinichenko
At the beginning of this century, there was a surge in investment in companies that were engaged in software development. Unfortunately, however, there were few of the companies investment in which turned out to be successful. StarForce CEO Michael Kalinichenko tells us about this situation, as well as what should be taken into account when analyzing financial activities of software companies.

How to hide a weak spot in an application

5 Dec 2018
Michael Kalinichenko
Michael Kalinichenko
It is hard to image modern society without gadgets. Many mobile applications have become an integral part of our life. Apps are used everywhere. People order everything from a taxi to food in mobile apps. They also actively use communication and navigation apps and make online payments. Generally, mobile applications are always with us on tablets and smartphones.

How StarForce modifies the player, and how it further reduces a number of hacks

15 Nov 2018
Michael Kalinichenko
Michael Kalinichenko
StarForce CEO Michael Kalinichenko tells a story about how StarForce has been protecting educational courses, as well as about the video player customization.

What encourages StarForce to protect XML files

12 Oct 2018
Artur Khodjaev
Artur Khodjaev
Despite the fact that we have been protecting audio/video files and text information in various formats for many years, we have never experienced the protection of XML files until one customer requested us.

How to protect biometric authentication systems

24 Aug 2018
Michael Kalinichenko
Michael Kalinichenko
In a world where sensitive information can be easily stolen, it is crucially important to protect it with the help of strong security systems. One of the latest methods of protecting information is biometric authentication that is gaining popularity worldwide. Besides, it seems to be reliable and hard to be forged by attackers. So let us see how the system can become a target for hackers and what steps should be taken to prevent that.

How to protect video files from copying

23 Jul 2018
Tatiana Davydova
Tatiana Davydova
One of the most frequent requests that our company receives is how to protect video from copying. Our clients (creators of video and audio content that represents intellectual property) want to control how their files are distributed, to manage access to the files, to protect them from copying and to prevent screen recording.


To solve these problems, StarForce offers two options for protecting video from copying. In both cases, you can protect audio and video files of most of the common formats.

Editing the playlist after video protection

4 Jul 2018
Pavel Korobov
Pavel Korobov
If you used the SFContent.com service to protect audio and video files, you might have noticed the ‘Creating a playlist’ step in the protection process.

Such playlist is provided as an SFM3U file and can be opened from StarForce Player, the multimedia player.

This is highly convenient if you protect several files that should play back in a certain order.

How to digitally sign a program

6 Jun 2018
Tatiana Davydova
Tatiana Davydova
The users perceive an application or a driver that do not have a digital signature as a potential malware, because the users constantly encounter problems when they run the software.

Third-party antivirus software and information protection tools in the operating system will do their best to prevent the start of such software. If this is not what you aim at, make sure that your application or driver has a digital signature.  

Pages: 1 2 3 4 5 6 Next All