Saturday, February 28, 2015

Lenovo reduced pre-installed software – Engadget German


After Superfish fiasco Lenovo announced its intention to reconsider the use of pre-installed software on PCs. The Chinese company is now promising a new press release that its software bundle will be limited in the future on Windows, own apps and security software. In some countries, there should be exceptions when certain third-party apps are expected there by the customers. The listed here changes should be completed with the launch of Windows 10 products.


   0 COMMENTS
 
 
 

Please return only matching blog comments on the subject. Your email address is never displayed, but they are required to confirm your comments.

When you enter your name and email address, you will receive a URL via email, to confirm your comment, and a password. To submit other comments, use the same password again

To create a live URL, simply type the URL. (Including http: //) or email address and it will automatically Live URL created for you. You can add up to three URLs in your comments. Line breaks and paragraphs are not needed.

LikeTweet

GRASS GIS software released in version 7.0 – Heise News Ticker

(Image: grass.osgeo.org)

<- rspeak_start -> <- googleon:! all ->

Version 7.0 of the geographic information system GRASS brings a streamlined interface and new features. With the open source software

can be Windows, Linux and Mac OS X model spatial data and process aerial and satellite imagery. The new stable version 7.0 of the Geographic Resources Analysis Support System short GRASS wants to simplify with a revamped graphical user interface and new features complex GIS operations. Added in this version new modules for the analysis of raster and vector data, volume and time series. The existing modules have been improved and accelerated. “Many processes, which lasted hours so far, now running in a few minutes, even on my small laptop,” said Markus Neteler, coordinator of the development team, composed of scientists and GIS professionals from all over the world.

Working developers have also invested in the vector library, to make them faster and more efficient for large amounts of data. GRASS GIS 7.0 also provides a new system for the management and analysis of time series and a Python interface. All new features of GRASS GIS 7.0 can be found in the release announcement. The software is available for Windows, Linux and Mac OS via the project website for download. ( ! lmd)

LikeTweet

Innominate and WIBU-SYSTEMS: network security and software protection in … – elektroniknet.de


            In industry, more and more expertise containing data to be transmitted. It is therefore necessary to set both in protecting the network against cyber attacks as well as the software and know-how protection to also avoid interference of network communication, such as tampering and counterfeiting.
       

Intelligent factories contain today and even more so in the future industrial 4.0 more and more knowledge about the products formed in the form of digital data in the production process. The flexibility to produce down to the number 1 and produce different products without conversion, makes this necessary. Accordingly, the degree of crosslinking is constantly increasing. The use of intelligent sensors and actuators and their integration with control systems and MES systems to Big Data in the cloud are unstoppable. But they also bring new risks: piracy by copying the data and software reverse engineering and the risk of manipulation by altering the production data, or software in controllers and intelligent devices. The article describes threats and conservation objectives and mechanisms for communication over networks and the software used in the Appendices.

threats and protection objectives

Industrial products in a to produce complex, automated process with optimal productivity and reliable consistent quality is the core demanding task, the operator would like to focus exclusively. In view of over 200 published annually vulnerabilities alone in industrial control systems and reports of increasing cyber attacks and espionage they find themselves faced with the additional task of making their critical processes robust against such attacks. So headline in the Frankfurter Allgemeine Zeitung on 31.3.2014 »Cyber ​​criminals earn more than drug dealers” and showed how number and price performance of so-called Exploit kits increase, ready available software construction kits for attacks on known vulnerabilities.

In addition, manufacturers must ensure their competitive advantage, protect the know-how contained in their products and ensure that their products work as expected. Figures for the last VDMA study on piracy of April 2014 speak for themselves: hit 7.9 billion euros damage solely with German engineering, 9 of 10 manufacturers with more than 500 employees. In addition, with 72 percent of reverse engineering, that is the cutting of the products and analyzing the software algorithms, the primary source for the production of counterfeits. Here, Germany is to China as a source of plagiarism already at # 2, which shows the global nature of the challenge.

The threats and measures for their defense can be broken down as follows protection goals.

. 1 Availability: The availability of the production process is traditionally done by plant operators with the highest priority protection objective. Endangered, it is both unauthorized access and targeted attacks as well as untargeted faults such as the unchecked spread of malicious software, or other network “accidents” that can lead to denial-of-service situations.
. 2 Confidentiality: The protection of data in motion against unauthorized reading on the network and programs and data at rest against spying and reverse engineering is usually guaranteed by encrypted transmission and storage
3.. Integrity: measures for data integrity to prevent messages on the path from the sender to the receiver (unnoticed) can be modified; Measures to protect against software integrity that programs be manipulated and can reach unacceptable programs as malicious software to run.
. 4 Authenticity: The protection goal of a certificate of authenticity and identity data transmitters and receivers is pursued at different levels, at the network level (authenticity of network devices), the application level (authenticity of software applications, between which data are exchanged) and, where appropriate user level (authenticity of the people who run the applications and use). Common mechanisms for this purpose today are preferably based on the template or the exchange of digital certificates with trusted classified signatures.

The Authenticity is essential for that build schemas for authorization, ie defined and controlled authorization to perform certain functions or for reading and writing data depends on the proven identity and related role in the system.

             

  1. http://www.elektroniknet.de/anbieterkompass/?anbieter=8872995
  2.                  
                       

  3. http://www.elektroniknet.de/anbieterkompass/?anbieter=1033771
  4.                  
                 

LikeTweet

Apple is looking for hardware and software experts for Virtual Reality – Giga.de

Apple seems to stepping up research in the field of virtual reality. The company is looking for both hardware and software experts for the presentation and interaction with virtual environments.

9 to 5 Mac has discovered Apple classified ads, where Apple is looking for experts in Virtual Reality . On the one hand people themselves should apply to the post of Senior Systems Engineer display that will work on “Display system design and development with respect to VR environments”. This is about monitoring and projection technologies for “extremely high resolution VR environments.”

The future employees will work with suppliers to hardware implementation, but also involved in the development of software for virtual environments be. In a second ad Apple is looking specifically for a Senior Software Engineer display that will work on the graphics software implementation for VR environments. The developer will be responsible for the entire range between rendered images and display hardware

Also, the developer should be familiar with motion capture systems -. 9 to 5 Mac recalls in this respect that Apple’s acquisition of PrimeSense; The company, which originally stood behind Microsoft’s Xbox Kinect system.

It is not the first indication that Apple is interested in the field of virtual reality. By the end of last year, the company was looking for suitable new employees; just last week appeared a new Apple patent for a VR headset for iPhone. However, all this means is not that specific products are already in Apple’s pipeline; the company is experimenting internally with numerous technologies that often do not become finished products.

If you want to miss anything in the future, then like us on Facebook or follow us on Twitter. So you’re always up to date.

LikeTweet

Friday, February 27, 2015

Artificial Intelligence – Google software copes own “Space Invaders” – Süddeutsche.de

A Google team has developed a software that automatically learns to play video games perfectly – including Atari classics like “Space Invaders” or “Breakout”. The AI ​​system invented this long-term strategies.

By Christoph Behrens

If you want to be really good at “Space Invaders”, takes time and money. As the video game in 1978 conquered Japan, the 100-yen coins were scarce because they are now mainly flowed from vending machines in the battle against alien invaders. The record holder held 38 hours at a stretch by -. Before the highscore he had practiced course, thousands of hours

If a computer is leaving the thing, learning is much faster, researchers report the Google subsidiary “Deep Mind” , The team has created a special software to gamble 49 classic games console “Atari”. More than half of the games dominated the program soon on the level of a professional video game tester, including “Space Invaders”. In 14 games the high score of the computer was at least twice that of the human professionals, the researchers report in the journal Nature .

This is the “Deep-Q network” differently constructed entirely as classical systems with artificial intelligence. The developers have given him no information on possible strategies. Instead, learn Deep-Q independently by processing the image information of the console. Thus, the system gets the to see what a human player sees on the screen, and can react with the same commands on it. Only the number of points to the computer drive up -. As he reaches is up to him

“Long-term strategy”

In the game “Breakout” for example, had deep-Q with a ball destroy a series stones at the top of the playing field; the ball must not fall to the ground there. After a few hundred slot passages Deep Q began to hurl the ball in one corner, there to dig a tunnel through the series. Once at the top, the bullet destroyed the stones all by itself.

“In some games Deep-Q discovered a relatively long-term strategy,” write the developer. Your impressions compares the experiences of past software with high scores and GameOvers to calculate the next train. “Conventional artificial intelligence systems are written exclusively for the game,” said Stefan Höltgen, chief editor of Games magazine Retro

Deep-Q, however, can master a whole series of games. – the AI ​​can box, shoot, but also drive a car race. Difficulties resulted puzzle games such as “Montezuma’s Revenge”, in which the player is searching for keys and dodging traps. Result of the computer in this Jazzy: zero percent

.

LikeTweet

Software to predict declines in Cologne – koeln.de

Minority Report op Kölsch: Burglaries in the urban area are to be fought in the future, even before they happen. Is made possible by Commissioner Computer: A software to predict crime

. <- begin: img-assist-inline ->

You are getting bolder, beat in broad daylight and on the run, they tend to violence: burglar. This perpetrated over 500 Wohungseinbrüche alone in December 2014 in Cologne. To advance this finally put a stop driving, the police will now take a look into the future and predict intrusions. Precrime am Rhein so -. In principle similar to the movie “Minority Report” (Photo)

These wants the State Office of Criminal Investigation (LKA) in Cologne from mid-2015 have a software to be used, with the data of all burglaries is fed. From this data set, the computer then calculates where probably lies ahead for next burglary. And then what follows, now show before the colleagues in Munich

There migrate all the data of the police in a so-called “Precrime Observation System” (short.: “Precobs”). This software divides the map into color sectors of 250 by 250 meters. The color can read the official sector in which a high probability of a break-in will take place. Through increased patrols in the sector of the criminals should be possible even caught red-handed or even chilled. This method is in the US as “Predictive Policing” already common: They used to predict crimes such as car theft or shootings.

NRW would thus be to Bavaria, the next state, the aufspränge on the train of “predictive policing”. Apart from Cologne to Duisburg in 2015 to serve as a test laboratory. However, it is debatable whether the method is effective at all. Independent studies on the subject are not yet available. It is also still unclear how to proceed in the event of a successful test run. It is conceivable, as an extension of the scope to other offenses. (Photo: imago / United Archives)

LikeTweet

Trojan software: British complaint for Gamma International – Heise News Ticker

(photo: dpa, Jochen Luebke)

The Trojan software of gamma violates respect for human rights. Gamma is associated with this complaint the British OECD contact point plotted for the future to incorporate an effective protection of human rights in the Software.

The British Ministry of Economy has a complaint against the German-British company Gamma International pronounced. This was in breach with the software or FinFisher FinSpy to that specified in the OECD guidelines, respect for human rights. To gamma various civil rights organizations had initiated an OECD complaint procedure in June 2013, after IT experts were able to demonstrate gamma monitoring software on computers Bahraini opposition.



violation of the OECD Guidelines

In the detailed basis for imploring holds the Ministry established as a national OECD Contact Point (NCP) of Great Britain, that gamma infringed four OECD Guidelines. So there was some in the company no Uncommitted human rights rules, as required by the OECD. The reasoning of Gamma, was an attempt to develop this in partnership with the Electronic Frountier Foundation, evaluated the NCP to be incorrect, because similar rules to the website of Gamma could not be found. The further NCP edition, now incorporate a human rights protection in the software is more symbolic: Comparison of NCPs, the British Gammagroup claims to have given up the software business

On the question whether gamma. any software sold to Bahrain, with the then opposition were monitored, there was no assessment by the NCP. Gamma had denied a request by the NCP any access to its business records on the grounds of wanting to jeopardize any business partner. This is a practice that “according to information from British intelligence sources” – according to the NPS in its assessment – applies to all companies offering software for “lawful interception”. Since OECD contact points have no investigative powers, only an analysis of public sources was possible. The allegations of the gamma-manager Martin Munch, a Bahrain-chopped demo version is been used, which was also stolen at an exhibition for monitoring technique in Dubai, we have neither refute nor confirm it says in the NCP complaint.

civil complaint cost as a success

Despite this limitation evaluate both privacy International complainant as well as the civil rights complaint involved the decision taken as a success. Thus, Reporters Without Borders (RSF) provides confirmed in the assessment of the illegal practices of gamma. “At the same time, the use of an extensive restriction on the export of surveillance technology to authoritarian states must go on,” said Reporters Without Borders CEO Christian Mihr. By the European Center for Constitutional and Human Rights declared the lawyer Miriam Saage-Maass that the German gamma daughter FinFisher Labs in Munich must be based on the NCP complaint. This is a step forward in view of the fact that the German OECD NCP had rejected a similar complaint against Trovicor in December 2013 by the Federal Ministry of Economics. ( Detlef Borchers ) / (mho)

LikeTweet

4.5 G: 1 Gbit / s comes in LTE network as a software update – Golem.de




http://www.golem.de/news/4-5-g-1-gbit-s-im-lte-netzwerk- come-as-software-update-1502-112598.html Published: 02/25/2015 19:46




> The expansion of LTE to 4.5 G with 1 Gbit / s is loaded onto the base station of Huawei via software. As a revolution Huawei sees this new mobile technology not to.

The solid line increase for the LTE mobile network on 1 Gbit / s via a software update to the base station. That gave Ryan Ding, Huawei president of Products and Solutions, known in London. “hardware changes are only in the core network necessary” , he said.

Despite the growing importance of software, the Group continues to see as a manufacturer and developer of hardware and software.

With the expansion of LTE Advanced to 4.5 G has a capacity of over 1 Gbit / s in the mobile networks to be possible, while the end-to-end latency would be reduced by 80 percent, had the Chinese companies announced on February 24, 2015. This should be an important announcement for more mobile operators. For the users of mobile Internet, the leap in data transfer rate due to the pricing policy on cutbacks by the network operators will have little effect.

“4.5 G is an evolutionary step. In contrast, a revolution is 5G. The future 5G standard is a data transfer rate of 10 Gbit / s bring” , said Ding. Huawei had a first, large fridge “mobile phone” completed for the LTE standard to replace 5G in January 2015. The technical specifications are not yet determined. The leading suppliers are composed shortly.

In the press briefing Huawei has unveiled a new router with high throughput, the line loss is minimized during the data transmission rate by delays and packet loss – to “zero latency” when streaming 2K video mobile broadband and 4K content over the fixed network. (Asa)


Related items:
Huawei: “We make 1 Gbit / s 2016 mobile possible”
(02.24.2015 14:13 http://www.golem.de/news/huawei-wir-machen-1-gbit-s-im-mobilfunk-moeglich-1502-112563.html)
5G Ericsson is preparing mobile networks to 10 Gbit / s ago
(20.02.2015 18:59, http://www.golem.de/news/5g-ericsson-bereitet-mobilfunknetze-auf-10- Gbit s-before-1502-112514.html)
Gemalto: “Few 2G SIM cards were stolen”
(02.25.2015 11:04, http://www.golem.de /news/gemalto-nur-wenige-2g-sim-karten-wurden-geklaut-1502-112583.html)
LTE successor: Huawei shows its first 5G mobile
(01.20.2015 14: 19, http://www.golem.de/news/lte-nachfolger-huawei-zeigt-sein-erstes-5g-handy-1501-111819.html)
Mobile: Mobile Internet Telephony more sales than
(02.23.2015 14:02, http://www.golem.de/news/mobilfunk-mobiles-internet-bringt-mehr-umsatz-als-telefonie-1502-112541.html)




LikeTweet

Thursday, February 26, 2015

Final Cut Pro X: first Hollywood film with Apple’s video editing software edit – Giga.de

Final Cut Pro X is also often disparagingly called “iMovie Pro” – not suitable for real professionals. With Focus is now available for the first time a Hollywood film was edited with Final Cut Pro X – a sign that professional demands have been heard. A new generation offered by Apple for many years video editing software –

Nearly four years ago, the first version of Final Cut Pro X appeared. This is a completely redesigned version. The comprehensive update of its time but fell victim to many features, resulting in lack of understanding among many professional users.

By the time Apple has not introduced by further updates some important features again. The functionality of the software enough now seem again to meet the requirements for a Hollywood production. Focus, a new film starring Will Smith, which starts in the US on Friday, has been fully edited with Final Cut Pro X.

Apple has this milestone dedicated a page that describes how the film Team Apple hardware and software used for the project. As hardware Mac Pro, iMac and MacBook Pro were used, were added iPhones and iPads. In addition to Final Cut Pro X, the team also used Logic Pro X, Motion 5, and Xsan.

Across the USA Today Focus’ director Glenn Ficarra has commented on the decision for Final Cut Pro X. You have opted for the Apple product since the work was progressing faster with this. From other side, there was a lot of eye rolling and pitiful glances. However, the negative attitude to Final Cut Pro X is based on “old information” and lack of expertise.

If you in the future want to miss anything, then like us on Facebook or follow us on Twitter. So you’re always up to date.
LikeTweet

Parallels buys application server specialists 2X Software – ZDNet.de

Parallels has taken 2X Software, the developer of a remote application server called 2X RAS. Thus, it wants to improve its range of virtual desktop solutions for businesses. It sees “huge synergies” between two offers. A merger will facilitate in particular the development of cross-platform solutions.

 2X Remote been in use (2X)

2X Remote been in use (2X)

2X RAS is a platform-independent virtual desktop with support for Application Delivery including a Windows client administration. In addition 2X Software has a mobile device management program, called unsurprisingly 2X Mobile Device Management (MDM). Companies can thus a single dashboard proprietary as well as staff to monitor and manage brought mobile devices.

Parallels, in its press release, the completeness and simplicity of 2X RAS. It can be installed within 30 minutes and fully utilized after a few hours, they say. When competing solutions are likely to have several weeks training period.

Parallels itself is mainly known through virtualization of Windows desktop on Macs. It has solutions for both home users and enterprises in the program. To his further amenities include hosting and cloud solutions, remote access software Parallels Parallels Mac Access and Management for Microsoft System Center Configuration Manager (SCCM), a plug in for companies that use Mac systems in a Microsoft environment, but do not want to manage separately.

 Logo of Parallels (Photo: Parallels)

Parallels President Jack Zubarev commented: “The mission of Parallels is to provide the best technology and best experiences for companies, their employees and individuals when they access any applications and files you want to use, anytime, anywhere . “The 2X solutions are a great addition to the Parallels Desktop Access and product lines. “We also welcome the experienced and talented developers and employees of 2X, who join us to create the best cross-platform software solutions.”

A purchase price was not communicated. The acquisition has been completed, a new logo has 2X as “by Parallels” from

In December Parallels announced for its Cloud Server Containers virtualization with the support of Docker format -. And was on a recent Trend cracked. However, it stressed that it makes container technology over many years through its proprietary solution Virtuozzo and the open source project OpenVZ available. Now Docker support only be added.

When it comes to desktop virtualization Parallels could last 10 Report Support for Windows on Macs. Its remote desktop app is already available for Android and iPhone since mid-2014. Parallels Access costs 18 euro per year subscription fee

[With material from Charlie Osborne, ZDNet.com]

Tip . Do you know the history of computer viruses? Check your knowledge – with 15 questions on silicon.de

LikeTweet

Software: network connection cuts Samsung Smart TVs – Reuters

Smart TV from Samsung

Software Update accident: The connection to Smart TVs from Samsung is interrupted

(Photo: Reuters).

Schwalbach Samsung has apparently taken with a software update crashed his countless Internet TV from the mains. Appears on the devices when calling Apps by Smart TVs error message that no connection to the Internet. The error occurs not only with customers in Germany, but also in other European countries and in the United States.

Samsung said on Thursday the company was “customer complaints known that the on current difficulties in using Smart Hub interface on Samsung Smart TVs relate “. “We are investigating this issue and do everything that our customers can use the Samsung Smart Hub back in full as soon as possible,” the company said. According to the reports of affected SAMSUNG customer concerns of mistake Smart TVs from Samsung in the E and D Series

Topic:. Top News Company

LikeTweet

Wednesday, February 25, 2015

Privdog: Software levers HTTPS security from – Golem.de




http://www.golem.de/news/privdog-software-hebelt-https-sicherheit-aus-1502-112534.html Published: 23/02/2015 10:59




The software Privdog levers similar to Super Fish the protection of HTTPS entirely of , Savoury it: Privdog was advertised by Comodo, one of the largest certification bodies for TLS certificates

Comodo apparently has a software advertised that breaks like Superfish a huge security hole in the HTTPS encryption.. Privdog is the software used officially for the purpose of replacing Advertising on web pages by “trusted advertising”. This should serve to protect the privacy of the user.

Like the software Superfish, which made headlines in recent days and was pre-installed on Lenovo laptops, picks Privdog in the TLS data stream of a user in order to be able to manipulate encrypted HTTPS sites. For a root certificate is installed in the operating system. However, this is implemented differently than in Superfish.

Any certification body accepts

While Superfish the same certificate and the same private key used on all equipment used is Privdog here smarter: It is created each time you install a new certificate. However, the whole is not safe, because Privdog replaced certificates that are not valid. You can be signed by an x-any certification body, also of a generated itself. Who installed Privdog, so you can surf on any websites with fake certificates and remembers nothing about it.

A very strange behavior shows Privdog when surfing on websites whose certificate is self-signed. These certificates are then replaced by equally self-signed certificates that are automatically installed in the same root certificate store of the operating system. These certificates also have an RSA key with a key length of 512 bits, which is completely uncertain. The normal certificates that delivers Privdog containing RSA key with 1024 bits, which is also considered problematic. However: The key lengths are the least of the problems of Privdog because all the technology is completely insecure anyway

Comodo sold TLS certificates and undermines their safety

. Privdog was advertised on the website of Comodo. Between Comodo and Privdog there are apparently several staff overlaps. Comodo CEO Melih-Abdulhayoglu co-founded the company Privdog. An earlier version of Privdog was delivered with various products of Comodo, but this version works differently and is not affected by the problem

The Spicy it. Comodo is one of the largest certificate authorities on the Internet. About a third of certificates for HTTPS pages comes directly or indirectly from Comodo. A company that is supposed to provide for the security of HTTPS, that advertises a product that undermines this security.

Comodo is not the first time in the negative headlines. 2011, there have been several burglaries at partners of Comodo, a number of Comodo indirectly signed fake certificates appeared. Also Comodo was installed in the past unsolicited toolbars in its software.

Discovered were the security problems of Privdog last night, this writer was involved. In an IRC chat Various people had gathered, who were employed in the analysis of Superfish and similar products. One participant pointed to a thread on Hacker News, in which a user reported that the Super Fish-test by Filippo Valsorda indicating a warning. An analysis showed quickly that Privdog not used the technology of Komodia that was the problem with Superfish, but that it was a different mounted safety problem in Privdog. An English summary can be found in the blog of the article author.

Supplement dated 25 February 2015 14:14 Clock

In the original version of this article we wrote that Privdog was delivered by Comodo. While that was true, but delivered by Comodo version of the relevant security problem is not affected. We have changed the wording accordingly, to be clear. From Privdog there is now an advisory and an update. (Hab)


Related items:
Superfish: The adware empire of Komodia
(2.22 .2015 16:30, http://www.golem.de/news/superfish-das-adware-imperium-von-komodia-1502-112521.html)
HTTPS certificates: Key pinning protects against malicious certification bodies
(10.14.2014 10:26, http://www.golem.de/news/https-zertifikate-key-pinning-schuetzt-vor-boesartigen-zertifizierungsstellen-1410-109799.html)
Mozilla Firefox 36 may HTTP / 2
(02.24.2015 16:39, http://www.golem.de/news/mozilla-firefox-36-kann-http-2-1502- 112509.html)
Adware: Superfish chief denies security risk
(02.21.2015 09:13, http://www.golem.de/news/adware-superfish-chef-bestreitet-sicherheitsrisiko-1502 -112517.html)
Update: New Fritzbox firmware determines the best LTE network
(20.02.2015 15:06, http://www.golem.de/news/update-neue-fritzbox- firmware-determined-best-lte-network-1502-112508.html)




LikeTweet

Unbelievable: The DJs work with geklauter Software – virtualnights Magazine

Why pay good money for a software, when you can obtain for free a roundabout way? Illegal’s finally only when one is erwisch! And embarrassing only if you can catch a superstar in this case if you use pirate software, although it actually has enough coal to buy the complete software company. Which DJs work with geklauter software and spend their money on jets and luxury cars, we have found for you.

You travel in luxury jets around the world, drinking gallons of champagne and live in huge mansions. But when it comes to their DJ software, they are stingy. So strange, considering that star DJs earn their millions with music. And it’s true: Some DJs are still working with cracked software . Just stupid when that comes out in an interview. .

A big “ Shit Happens ” – actually experienced Martin Garrix early 2014. He just celebrated his chart breakthrough and told the Future Magazine of his music and all the money he deserves now. We reported. If he had not given the interview in front of the PC, it would be the embarrassment have been spared that now the whole world knows that he does not spend any money for music software:


Photo: Screenshot youredm.com

Just as it was with the Swedish shooting star Avicii. He wanted to purchase his $ 60 million villa not spend more money and therefore decided to just $ 139 to save for Sylenth1 . Tim Bergling was betrayed by an inscription in the program. How embarassing:

>
Photo: Screenshot youredm.com

Dim Mark record boss and DJ Steve Aoki seems the same program also to have been too expensive. About a year ago he gave an interview by talking about his work with Linkin Park for “A Light That Never Comes”. While Aoki wanted to demonstrate how he mixed the sound, he also was with cracked software gets . His explanation: his road crew have installed the program. And that’s only for the laptop and not on the studio computer. Is clear:


Photo: Screenshot youredm.com

Whether the DJs have now bought lisensierte software? We do not know, but would hope that the big pay quite normal for their products. Or what do you think

Photo: Screenshot Future Music magazine via Youtube

LikeTweet