Omidomi's Secrity Config

Windows Edition
Pro
User Access Control
Always notify
Real-time security
Kaspersky Internet Security 2016
Firewall security
Periodic malware scanners
Zemana anti malware, Malwarebytes anti malware,EEK
Malware sample testing
Browser(s) and extensions
Yandex,FireFox
Maintenance tools
Ccleaner,Glary utilities.
File and Photo backup
Norton Ghost

NullPointerException

Level 12
Verified
Aug 25, 2014
580
Really, how using a pirated version of it makes the user a "criminal" is beyond me. I am not a lawyer, but I know enough about laws and computers to know I am not the only one who pirates ,and it isn't grave as long as I don't host copyrighted material.

Tuneup :
download-25.jpg


But if he has already purchased TuneUp, he shouldn't change until the license expires, at least the money he spent on wouldn't be fully trashed.
 

Aura

Level 20
Verified
Jul 29, 2014
966
Really, how using a pirated version of it makes the user a "criminal" is beyond me. I am not a lawyer, but I know enough about laws and computers to know I am not the only one who pirates ,and it isn't grave as long as I don't host copyrighted material.

Tuneup :
download-25.jpg


But if he has already purchased TuneUp, he shouldn't change until the license expires, at least the money he spent on wouldn't be fully trashed.

It's like saying "Yeah I bought a McAfee product, I'll keep it until the licence expire." Even there, you wasted your money on a McAfee product right away. That you keep it or not, ain't going to give you your money back. Comon McAfee, become Intel Security already.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top