I think some of you misunderstood me. Yes, in the U.S. a computer was not needed in the past. Today a computer is. Using a library computer does not always work. Would you really want to pay a bill or apply for assistance or print out your medical info from a library. Access forums, read news or watch free web videos if allowed. Other stuff, no. Another thing, schools are also requiring kids to use some computer devices and parents are required to purchase them.
I guess most people here are from the US. Even if you know what does it mean to be poor, poor in the US is not the same as in the third world. The difference is in opportunities. In the third world you basically need to win the lottery to get out of the $100/month life. There is just no other way. And yes, if you're trying to sell them something at a typical US price - than you're a jerk. Not that this justifies stealing.
If you can't afford it, get Ubuntu, I dual booted for years, using it as my primary OS up to Windows 7 inclusive.
Then Windows 8.1 & 8.1 Update came out, that became my primary.
I used Windows 10 Technical Preview(on my Windows 7/Ubuntu) laptop before I got my Windows 8 desktop
Now both are Windows 10 thanks to the free Upgrade, both PCs are Windows 10 primaries, with Ubuntu in a Hyper-V virtual machine.
If I hadn't been able to save up for my desktop, I would still be using FREE of charge Ubuntu as primary.
And Ubuntu still rocks, you do not need any knowledge of command line these days to do anything on it contrary to what most people believe, unless you want to do something advanced, but for most, the OOBE is perfect.
I did say this is not a justification of stealing though. And I'm not talking about me personally, I'm somewhat privileged to be able to get Windows for free from the University I work at.
By the way if anyone is interested I just spotted this, while following some links: Anti-piracy overview
Protect Yourself from PiracySo what happens when you report software piracy?
Your lead is received by a team of individuals who take action.
A letter may be sent to the company stating that they have been reported for allegedly distributing Microsoft software in an unauthorized manner.
A secret shopper may make a purchase from the company that was reported.
The individual who submitted the lead may be contacted for further information/evidence (invoice, software).
If evidence regarding the company is gathered, a cease and desist letter may be sent.
The evidence developed may be used in a legal proceeding against the reported company.
Example of how your tips are used.
F.B.I. and Chinese Seize $500 Million of Counterfeit Software
A multi-year investigation by Chinese police investigators and the U.S. Federal Bureau of Investigation led to the dismantling of a piracy ring responsible for pirating and distributing up to $2 billion of software. The two-year investigation led to the demise of two criminal organizations - located in Shanghai and Shenzhen - and included up to 25 arrests according to officials from both nations. Microsoft, in gathering evidence it later handed over to the F.B.I. and to Chinese authorities, said more than 1,000 people had notified the company and sent in counterfeit discs. The consumers who sent in the pirated discs were apparently unaware they had purchased illegal software until a notification popped up on their screens. The F.B.I. said that a joint effort with the Chinese authorities had led to the seizing of more than $500 million worth of counterfeit Microsoft and Symantec software that was being made in China and distributed worldwide.
The arrests, according to industry executives, represented the most significant crackdown on software piracy. In the last couple of weeks, the operation led to the seizing by the Chinese government of 290,000 counterfeit discs and certificates of authenticity. The F.B.I. said that Chinese officials had seized more than 47,000 counterfeit Microsoft discs.
How to Tell â€“ Report Piracy
Counterfeit Software Report
Microsoft is committed to helping customers who were inadvertently sold counterfeit Microsoft software, or suspect counterfeit. Please tell us about your experience.
What information is collected?
Within this report, you will be asked for information about the suspect counterfeit software you are reporting, including details about where it was purchased or offered and some optional personal information.
What does Microsoft do with the information collected?
We will use the information you provide to investigate and may take appropriate action against businesses who sell counterfeit software. We may contact you about your submission to follow up on specific details; however, we will not contact you for general marketing purposes.
Microsoft is committed to helping our customers and to protecting your privacy. You may read the Microsoft Privacy Statement if you would like more information on how we protect customer information.
Product Category and Title
* Indicates a required field.
Select a product category from the list below *
Select a product categoryWindows operating systemOfficeWindows serverOther serverXbox gameOther (please specify in counterfeit report description)