{"id":29,"date":"2005-12-02T01:32:27","date_gmt":"2005-12-01T22:32:27","guid":{"rendered":"http:\/\/neosmart.net\/blog\/?p=29"},"modified":"2006-08-12T08:46:09","modified_gmt":"2006-08-12T08:46:09","slug":"leaky-faucets-leaky-builds-ii","status":"publish","type":"post","link":"https:\/\/neosmart.net\/blog\/leaky-faucets-leaky-builds-ii\/","title":{"rendered":"Leaky Faucets, Leaky Builds II"},"content":{"rendered":"<p>OK, besides feeling embarrassed as hell at the last post that turned out to be nothing more than a rant, I also feel guilty that this did not go up as soon as I had promised earlier; but that&#8217;s that, and here is the post ;)<\/p>\n<p>Basically this can be summed up in one sentence, or even, a fragment of a sentece: <strong>Where do those builds come from?<\/strong><br \/>I&#8217;d really like to know. Its not just 5259 here; I mean every single build out there that gets reported as &#8220;Stolen&#8221; then &#8220;Released;&#8221; how do they <em>steal<\/em> a program that has not been released? At the risk of stating the obvious: <em>Doesn&#8217;t it seem as if the builds are leaked from <strong>within<\/strong> the company???<\/em> Its not just Microsoft either. When you have leaked versions of internal builds for Symantec, McAfee, WindowsBlinds, and all the rest, it makes you wonder: from where?<\/p>\n<p><!--more--><\/p>\n<p>Funny how this turns out to be such a short post, eh?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>OK, besides feeling embarrassed as hell at the last post that turned out to be nothing more than a rant, I also feel guilty that this did not go up as soon as I had promised earlier; but that&#8217;s that, &hellip; <a href=\"https:\/\/neosmart.net\/blog\/leaky-faucets-leaky-builds-ii\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[53],"class_list":["post-29","post","type-post","status-publish","format-standard","hentry","category-software","tag-vista"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p4xDa-t","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/neosmart.net\/blog\/wp-json\/wp\/v2\/posts\/29","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/neosmart.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/neosmart.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/neosmart.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/neosmart.net\/blog\/wp-json\/wp\/v2\/comments?post=29"}],"version-history":[{"count":0,"href":"https:\/\/neosmart.net\/blog\/wp-json\/wp\/v2\/posts\/29\/revisions"}],"wp:attachment":[{"href":"https:\/\/neosmart.net\/blog\/wp-json\/wp\/v2\/media?parent=29"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/neosmart.net\/blog\/wp-json\/wp\/v2\/categories?post=29"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/neosmart.net\/blog\/wp-json\/wp\/v2\/tags?post=29"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}