1 guy used a pirated piece of software and added it to a server which was then used to make an image for more servers so that pirated software was then proliferated out onto about half the servers in a Fortune 500 company.
Does the installation process not include activation of product? I never worked in infrastructure side of IT so not sure how enterprise softwares work. Surely someone must have noticed it early on right?
1 guy used a pirated piece of software and added it to a server which was then used to make an image for more servers so that pirated software was then proliferated out onto about half the servers in a Fortune 500 company.
Does the installation process not include activation of product? I never worked in infrastructure side of IT so not sure how enterprise softwares work. Surely someone must have noticed it early on right?
Not if you make an image. That’s just a copy of the state-as-is.