FairUse4WM – a WM/DRM removal program

FairUse4WM is a GUI version of drmdbg that supports individualization version .3930 and some WM11 versions.

Basic requirements
1. Only works on individualized DRM file
2. Requires WM10 or WM11. Won't work on WM9.

The program's functioning can be verified with “Demo” DRM files from
ezdrm.com, as well as those from other Microsoft Solution partners.

This program is ONLY designed and intended to enable fair-use rights to PURCHASED media.
– While I haven't been able to support license expiration/rental detection, please don't use this to abuse rental license
– This code does NOT allow import of KID/SID pairs to preclude its use for piracy

Note that some WM installations will have multiple ECC key-pairs, so
you will likely have to “Extract Keys” using multiple licensed files.
If you find a file that doesn't convert, try extracting keys wth it.
Once your whole set of keys is extracted, you will no longer need to
run WM per file.

Found on the Doom9.org forums. [via]

Advertisements

Fugitive exec nabbed after Skype call

Kobi Alexander, the founder of Comverse, was nabbed
in Negombo, Sri Lanka yesterday by a private investigator. He is wanted
by the US government in connection with financial fraud charges. He is
accused of profiting from some very shady stock-option deals, to the
detriment of Comverse shareholders. Once the deals became public and he
was indicted, he resigned as CEO and fled the US.

Alexander
was traced to the Sri Lankan capital of Colombo after he placed a
one-minute call using Skype. That was enough to alert authorities to
his presence and hunt him down.

The fugitive former CEO
may have been convinced that using Skype made him safe from tracking,
but he—and everyone else that believes VoIP is inherently more secure
than a landline—was wrong. Tracking anonymous peer-to-peer VoIP traffic
over the Internet is possible (PDF). In fact, it can be done even if the parties have taken some steps to disguise the traffic.

VoIP and law enforcement have been in the news lately,
due primarily to the Communications Assistance for Law Enforcement Act.
CALEA, passed in 1994, gives the FBI the ability to easily tap landline
and cell phone calls. As written, CALEA had originally included some
exemptions for Internet-based systems, but the FBI convinced the
Federal Communications Commission that they should not apply to VoIP
traffic. As a result, VoIP operators in the US will need to make their
systems wiretap friendly.

If nothing else, Alexander's
capture reinforces the message that despite appearances, nothing we do
on the Internet is truly anonymous.

From ArsTechnica

DSAmp – Control Winamp from your DS

Img413 1080
The DS is a wonderful machine, capable of interacting with a PC in imaginative ways. Now, the clever homebrew community, has come up with a way for the DS to control Winamp. Should any of you DIY-ers out there wish to film yourself giving this a go, send us a link and like Doc Holliday, we'll make you famous.

Now how about someone coming up with a way to stream music or video from Winamp onto the DS?

From DS Fanboy.

HOPE 2006 Audio Available

We now have available for your listening enjoyment all of the HOPE Number Six talks and panels. To listen, simply go to http://www.hopenumbersix.net/speakers.html.

We want to thank everyone
who helped to make HOPE Number Six the most successful HOPE conference
yet, judging from the comments we've been getting. If you'd like us to
include your comments, experiences, and feedback concerning this year's
HOPE in our post-HOPE section, send an email to feedback@2600.com.
If you have pictures or videos, send them along as well. We'd also like
to hear your suggestions on how we can make things even better in 2008.

From 2600 News.

In 2006, China has issued 15 national security standards

In China, network and information security have been getting rising
attention in these years, not only from the government and those large
enterprises, but also from whole society. More and more relevant
standards are issued, and internal control manuals are made and
executed in FSI (Financing, Securities and Insurance) and telecom
enterprises as well to strengthen their compliance management.

Since the beginning of 2006, 15 standards have been published in
security domain by the technical committee TC260, which is responsible for the information
security related standards under the government standardization
organization
, the counterpart of NIST, USA.
Some of them cover the detailed management and technical requirements
for classify security protection, while some of them are updates of the
previous GB/T18336, which is the localized version of ISO15408 (CC).
Additionally, ISO17799:2000 has been adopted as GB/T19716-2005 in 2005.

From Telecom, Security and P2P blog.

IBM Official Press about ISS Acquisition

IBM (NYSE: IBM) and Internet Security Systems, Inc. (NASDAQ: ISSX)
today announced the two companies have entered into a definitive
agreement for IBM to acquire Internet Security Systems, Inc., a
publicly held company based in Atlanta, Ga., in an all-cash transaction
at a price of approximately $1.3 billion, or $28 per share. The
acquisition is subject to Internet Security Systems, Inc. shareholder
and regulatory approvals and other customary closing conditions. The
transaction is expected to close in the fourth quarter of 2006.

Following completion of the acquisition, IBM intends to:

  • Establish ISS' operations as a business unit within IBM's
    Infrastructure Management Services unit, part of IBM Global Technology
    Services
  • Integrate ISS' software technology with Tivoli's IT
    service management portfolio, which includes software for Identity
    Management, Access Management, Service Oriented Architecture (SOA)
    security and Security Information Management
  • Market and sell ISS' Managed Security Services and
    portfolio of Network, Application, Server and Endpoint Protection
    products through IBM's and ISS' worldwide sales channels and Business
    Partners
  • Further expand the scope and capabilities of IBM's
    business and IT asset management consulting practices, and deliver
    services for ISS-based solutions through IBM Global Services
  • Build upon the companies' existing business relationship, which began in 1999

More information is available in the IBM Press Release.