Usage-based services includes pricing information for Microsoft Azure and Visual Studio. You can also use the Azure Services in CSP Pricing Calculator. The usage-based download includes both the CSP price lists for all supported currencies and the Shared Services pricing files in ERP. These files are updated on the first day of every month.
Price lists include basic information about pricing (how much it costs). The offer matrix includes purchase information about the products (how to buy it). Much of the information included in these download files is also accessible through the various Partner Center APIs (catalog APIs and price sheet APIs). Price lists require the partner to select the market for the pricing they request while the Offer-list matrix is agnostic of market.
Price list and offer-list matrix files default to the current month. To retrieve the previous month's price list, select the month and then download the pricing file for the desired market. Price changes should occur only on a monthly cadence. Partners can use the price list preview to know of price changes coming in the next month. Price changes mid-month rarely occur, usually to correct an error in the data. Any mid-month price changes will be broadly announced and be reflected in the price sheet with a new EffectiveStartDate.
As you can see at the top left of the image, the root folder is called \"Collection #1\" hence the name I've given this breach. The expanded folders and file listing give you a bit of a sense of the nature of the data (I'll come back to the word \"combo\" later), and as you can see, it's (allegedly) from many different sources. The post on the forum referenced \"a collection of 2000+ dehashed databases and Combos stored by topic\" and provided a directory listing of 2,890 of the files which I've reproduced here. This gives you a sense of the origins of the data but again, I need to stress \"allegedly\". I've written before about what's involved in verifying data breaches and it's often a non-trivial exercise. Whilst there are many legitimate breaches that I recognise in that list, that's the extent of my verification efforts and it's entirely possible that some of them refer to services that haven't actually been involved in a data breach at all. 59ce067264