[Not exactly linux related...] ---<snip>---
http://edition.cnn.com/2003/TECH/internet/08/28/downloading.music.ap/index.html WASHINGTON (AP) -- The recording industry is providing its most detailed glimpse into some of the detective-style techniques it has employed as part of its secretive campaign against online music swappers. ---<snap>--- basically they use md5 hashes and mp3 file tags - not so efficient IMHO coz it's easy to have all those modified by a script :-D wonder if they'll ever get to Uganda and our KaZAA community? Also, obtaining the hashes means *_ILLEAGALLY_* downloading a copy of the file doesn't it :-D? cheers, Patrick -- Patrick Okui <[EMAIL PROTECTED]> Systems Administrator One2Net (U) Ltd --------------------------------------------- This service is hosted on the Infocom network http://www.infocom.co.ug
