FairUse4WM is a GUI version of drmdbg that supports individualization version .3930 and some WM11 versions.
1. Only works on individualized DRM file
2. Requires WM10 or WM11. Won't work on WM9.
The program's functioning can be verified with “Demo” DRM files from
ezdrm.com, as well as those from other Microsoft Solution partners.
This program is ONLY designed and intended to enable fair-use rights to PURCHASED media.
– While I haven't been able to support license expiration/rental detection, please don't use this to abuse rental license
– This code does NOT allow import of KID/SID pairs to preclude its use for piracy
Note that some WM installations will have multiple ECC key-pairs, so
you will likely have to “Extract Keys” using multiple licensed files.
If you find a file that doesn't convert, try extracting keys wth it.
Once your whole set of keys is extracted, you will no longer need to
run WM per file.
Found on the Doom9.org forums. [via]
In China, network and information security have been getting rising
attention in these years, not only from the government and those large
enterprises, but also from whole society. More and more relevant
standards are issued, and internal control manuals are made and
executed in FSI (Financing, Securities and Insurance) and telecom
enterprises as well to strengthen their compliance management.
Since the beginning of 2006, 15 standards have been published in
security domain by the technical committee TC260, which is responsible for the information
security related standards under the government standardization
organization, the counterpart of NIST, USA.
Some of them cover the detailed management and technical requirements
for classify security protection, while some of them are updates of the
previous GB/T18336, which is the localized version of ISO15408 (CC).
Additionally, ISO17799:2000 has been adopted as GB/T19716-2005 in 2005.
From Telecom, Security and P2P blog.
IBM (NYSE: IBM) and Internet Security Systems, Inc. (NASDAQ: ISSX)
today announced the two companies have entered into a definitive
agreement for IBM to acquire Internet Security Systems, Inc., a
publicly held company based in Atlanta, Ga., in an all-cash transaction
at a price of approximately $1.3 billion, or $28 per share. The
acquisition is subject to Internet Security Systems, Inc. shareholder
and regulatory approvals and other customary closing conditions. The
transaction is expected to close in the fourth quarter of 2006.
Following completion of the acquisition, IBM intends to:
- Establish ISS' operations as a business unit within IBM's
Infrastructure Management Services unit, part of IBM Global Technology
- Integrate ISS' software technology with Tivoli's IT
service management portfolio, which includes software for Identity
Management, Access Management, Service Oriented Architecture (SOA)
security and Security Information Management
- Market and sell ISS' Managed Security Services and
portfolio of Network, Application, Server and Endpoint Protection
products through IBM's and ISS' worldwide sales channels and Business
- Further expand the scope and capabilities of IBM's
business and IT asset management consulting practices, and deliver
services for ISS-based solutions through IBM Global Services
- Build upon the companies' existing business relationship, which began in 1999
More information is available in the IBM Press Release.