Button Up

Blog

Email tracking and protection against leakage

27 Sep 2017
Natalia Yashenkova
Natalia Yashenkova

I mostly use Outlook to work with emails and from time to time I feel a necessity to track the opening of my emails by the addressees. There are a lot of email trackers for Gmail but only a few are capable to work with the Windows client correctly. The idea of email trackers is old enough to invent tools to block email trackers. For example the Ugly email service detects components of some trackers and on the site you can see what trackers can be blocked.

And sometimes cruel monetization comes, as it happened with Signals when a CRM absorbed the tracker and now it is available only as a part of a big system on chargeable basis. So search of a good tracker never stops.

Monitoring of eBooks sharing on the Internet. How to track leakage and react to the piracy

29 Aug 2017
Pavel Korobov
Pavel Korobov
Many business areas have found analogues on the Internet. This also applies to the book selling. In the physical world, only the fact of sale is important and further pirated reproduction is a laborious and thankless task. We cannot say the same about electronic books, since there is a risk of copying and leakage due to the digital form, which significantly reduces sales. Authors and publishers must ask themselves - how can I can track the fact that my electronic book has leaked into free access and what should I do in this case?

How to promote your book: 21 great ideas

14 Jul 2017
Natalia Yashenkova
Natalia Yashenkova
Suppose, you have written a wonderful book and ready to present it to your potential readers. Unless you are Joanne Rowling, you have to struggle through competition and information noise to reach your  reader. Follow our advice and your book will be successful!

Cybersecurity of ATMs: how to prevent direct dispense?

28 Jun 2017
Svetozar Yakhontov
Svetozar Yakhontov
On the assumption of our practice more than 40 percent of the implemented by our company projects on the software security of automatic teller machines (ATMs) and self-service terminals is post incident. In years 2014-2016 within the Russian Federation's territory more than 30 incidents occurred, generally the “direct dispense” attacks to ATMs in two scores of banks. A range of banks suffered from repeated series of attacks, the resources for implementing on-line counter measures on the territory-distributed area network were not enough.

Running old games on new operating systems

23 May 2017
Natalia Yashenkova
Natalia Yashenkova
We ourselves are a part of the fan army who likes to play old computer games and it does not matter what it is: nostalgia for the past or appealing to the ageless classics. The main thing is that we send the owners of games without patches to the technical support of publishers, and they return them to us by boomerang, incorrectly stating that only we can solve this technical problem.

How to Sell Information Products Through Your Own Website

19 May 2017
Pavel Korobov
Pavel Korobov

Developers and creators of information products, as a rule, are interested in selling content through their own websites; however, the development of websites is not an easy task even for experienced users. This is a how-to article for those, who are not familiar with the technologies of website building.

New Binding Parameters for Better Tamper Resistance

18 Apr 2017
Pavel Korobov
Pavel Korobov
As you may know, StarForce protection system uses a tool called "binding" to provide a tamper resistant protection along with many other features.

USB Flash Drives copy protection: StarForce version

31 Mar 2017
Natalia Yashenkova
Natalia Yashenkova

We live in a world full of threats. And our mission is to reduce the threat level for publishers: people and companies that create unique content for sale. Using our products, they get the confidence that their applications, courses, books will be sold, instead of being downloaded for free from pirate sites.

In March 2017 StarForce Technologies presented copy protection with a binding to USB Flash Drives. In this post I am going to tell why we have selected a binding method for copy protection and how it works for USB Flash Drives.

The Server of Hitachi Payment Systems Infected ATMs of India and compromised millions of cards

21 Feb 2017
Svetozar Yakhontov
Svetozar Yakhontov
In mid-2016 one of the servers of Hitachi Payment Systems was attacked by malicious software, by which the criminals got data from the ATMs of State Bank of India, HDFC Bank, ICICI Bank, Yes Bank and Axis Bank. Currently, 19 banks and 641 customers noticed fraudulent activities with the cards. To reduce risks the banks have blocked compromised cards and advised its customers to change the PIN.

Periodic License Confirmation. Why You Need It

9 Feb 2017
Pavel Korobov
Pavel Korobov
If you create unique software products or documents, it is natural to have a wish to control their distribution. There are many tools to protect information from unauthorized actions of unscrupulous users. One of them is the periodic license confirmation.

Pages: 1 2 3 4 Next All