Solved

liscence breach

Posted on 2007-11-15
4
128 Views
Last Modified: 2013-12-04
I have noticed the potential for software liscences being "leaked" within my organisation?There is a standard build document that has the liscence key for a product that has been published ONLINE. I have done google searches for the key which thankfully it doesnt return... yet! As well as ensuring the document is removed offline.. WHat else can I do to ensure this key doesnt get into the wrong hands....

Get a new key for the product incase malicious users have got an access.
There nothing I can do about the document itself as anyone could of saved a copy.

Any thoughts welcome..
0
Comment
Question by:pma111
  • 2
  • 2
4 Comments
 
LVL 32

Expert Comment

by:r-k
Comment Utility
It's very unlikely that a key that is not on a web page will leak out, unless someone deliberately leaks it.
Your only other option would be to search the contents of all files on your networked computers looking for the key, to remove all traces of it. If you know the document name you could search by filename, which might be simpler.
0
 
LVL 3

Author Comment

by:pma111
Comment Utility
I suppose we could contact the software company and ask for a new liscence key. A major reconcilliation project as all the clients with it installed with the valid serial would need to be changed, but I suppose its the only safe method now this has potentially leaked.
0
 
LVL 32

Accepted Solution

by:
r-k earned 250 total points
Comment Utility
Are you saying that the license key has been leaked, or are you saying it _may_ have been leaked?
If the latter, I would just wait because it's not a sure thing, and you can always change keys later if the leak is confirmed.
I am saying this without knowing all details, of course, such as what are the consequences of a key being leaked, which depends a lot on what software, what is your responsibility/liability etc. for the specific case. For most routine software it just seems like a hassle based on just the possibility. Just my .02, and I not a lawyer. In the end you have to decide based on your comfort level, because you know more about this.
0
 
LVL 3

Author Comment

by:pma111
Comment Utility
It is online so theres a high chance its been leaked. the software is remote support but details default gateways on the network, port numbers and gateway keys. quite alarming really
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Join & Write a Comment

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now