[EMAIL PROTECTED] wrote:
>
http://edition.cnn.com/2003/TECH/internet/08/28/downloading.music.ap/index.h
tm
>> 
>> basically they use md5 hashes and mp3 file tags - not so efficient
>> IMHO coz it's easy to have all those modified by a script :-D wonder
>> if they'll ever get to Uganda and our KaZAA community? Also,
>> obtaining the hashes means *_ILLEAGALLY_* downloading a copy of the
>> file doesn't it :-D? 
>> 
>> cheers,
> 
> from what i have been told,ie letter of email vis-a-vis word of mouth,
> the new cybercrimes task force of the FBI and Secret Service tags
> some files with some hashes, then releases them into the wild ie
> yega, kazaa, imesh etc. they then track the downloads of these files
> to the different computers around usa. this is all theoretical and
> its inplementaion is widely disputed by security professionals, so it
> possible that they want to scare us into stopping kazaa.

This has some truth.

About the US Fed's involvement, I am not sure, but I know record companies
now offer a looped version of a single song, and rename it to fit all the
songs on a single album. One person grabbing these songs means the Kazaa
community will be plagued with fony music for a long long time, forcing
irated members to go and buy the CD-ROM instead, and then upload the songs
to the Net.

The motive; at least sell one CD-ROM than sell none at all.

> 
> by the way, did anyone also find himself or herself blacklisted today
> by osirosoft.com?
> 
> 
> ---------------------------------------------
> This service is hosted on the Infocom network http://www.infocom.co.ug

Regards,

Mark Tinka - CCNP
Network Engineer, Africa Online Uganda



---------------------------------------------
This service is hosted on the Infocom network
http://www.infocom.co.ug

Reply via email to