|
PATH: BS | Technology | Computers
MPAA Caught Pirating Software
Posted by Pile
(24437 views) [E-Mail link]
|
|
The Chairman of the MPAA (Motion Picture Association of America). You remember the MPAA right? This is the high-and-mighty organization that is in charge of convincing and threatening people with legal action if they violate copyright or licensing terms of movies and music.
It turns out the MPAA blog is run by a piece of software called "Forest Blog" - a Freeware blog, and one of the few things the author asks is that if you use the software in a commercial environment, pay about $40 for the registration, and don't remove the links to the author's original site.
Of course, the MPAA apparently installed the software, didn't register and removed the links and credits from it before they let their executives use the blog software to rant and rave about the evils of piracy.
To make matters worse, the MPAA ignored the author's initial requests to legitimize the software, until it became public, then they pulled the site and sent him a letter saying the blog they installed was a "proof of concept" and didn't have its own domain, so therefore it wasn't an issue. Even though then, they didn't pay for the software! |
READ MORE | No comments | Comment on this Article |
New "Hearse" Worm May Be Worst Yet
Posted by Pile
(9816 views) [E-Mail link]
|
|
As a data security specialist, Jeremy Pickett sees all kinds of digital tricks. So on Mar. 20, when he was tracing the origins of a computer worm that had been blocked the night before from entering a client's computer network, Pickett wasn't too surprised that it tried to connect with four sleazy Web sites, most of them, he believes, in Russia. Or that it then tried to load victims' PCs with as many as 30 new pieces of "malware," ranging from spam programs to those that automatically dial in to expensive phone-sex services.
But the real shock came when Pickett decided to test another bug by infecting his own PC with it. Out slithered a program that promptly installed itself deep inside his computer. There it became virtually immune to detection from the basic antivirus software that scans for dangerous code. The bug -- known as a "Trojan," which in turn was hidden inside a "rootkit" -- was designed to activate whenever a Web surfer typed in a user name or password for bank accounts or Web sites for dating, social networking, or e-mail. Pickett went to a bank site and entered fictitious log-in information. Right before his eyes, those data were sent streaming back to Russia, joining the IDs of thousands of real victims. His reaction: "absolute horror." |
READ MORE | 1 comment since 2008-08-17 18:25:33 | Comment on this Article |
|