TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Bootleg Compromised Network Gear in Our Corporate Environment

5 点作者 joshbaptiste超过 2 年前

1 comment

josephcsible超过 2 年前
Why is there such a trend lately of companies punishing victims of counterfeiting instead of punishing the counterfeiters?<p>&gt; While the device lost its primary function as a network switch when the software upgrade was installed, it could still be accessed via the console. The following message was then displayed on the console during boot:<p>&gt; [Date Time]: %ILET-1-AUTHENTICATION_FAIL: This Switch may not have been manufactured by Cisco or with Cisco&#x27;s authorization. This product may contain software that was copied in violation of Cisco&#x27;s license terms. If your use of this product is the cause of a support issue, Cisco may deny operation of the product, support under your warranty or under a Cisco technical support program such as Smartnet. Please contact Cisco&#x27;s Technical Assistance Center for more information.<p>&gt; Reverting the software version did not fix the problem, likely pointing to evidence of data being overwritten during the update process.<p>If you unwittingly buy a fake Louis Vuitton handbag, would it be okay for their goons to break into your house and cut it up? If not, then why is Cisco allowed to do what they did?