.comment-link {margin-left:.6em;}

Metamorphosis

This is for discussions and for whenever I get on my soapbox about our personal freedoms being under attack here in the US.

Name:
Location: a pretty how town, (with up so floating many bells down)

Thursday, April 28, 2005

Is Filesharing Legal

I was websurfing today and came across a webpage with a simple question at the top..."Is Limewire Legal". That's all it said. No explanation of what they were wanting to do on it, just wondering if it is legal in and of itself.

The answers ranged from No. to Yes. to everything in between. Many people thought if you bought the pro version that it was legal. Others thought everything about it was illegal. A few offered reports on how filesharing helps sell albums. But, the basic question wasn't ever really completely answered...at least not in a way that I'd have felt comfortable believing if I was the person asking the question.

The simple answer is "Yes, the courts have ruled that filesharing is legal." Why this is confusing is because the media companies have used all their might to try to bully people into believing that it's illegal. This isn't the first time they've done this. When VCR's were first released, there was another Supreme Court battle... Sony vs Universal (otherwise known as the Betamax case) . Universal was complaining because people were copying TV shows to watch later. Not to sell, not to broadcast on another television channel, but to watch them at a different time from when they were scheduled to come on. The argument was that this violated the copyright of the specific shows. Now, I'm going to share part of that finding with you so that as I continue, you can see for yourself that this is what the court has said. Note that VTR stands for Video Tape Recorder.

Held:

The sale of the VTR's to the general public does not constitute contributory infringement of respondents' copyrights. Pp. 428-456.

(a) The protection given to copyrights is wholly statutory, and, in a case like this, in which Congress has not plainly marked the course to be followed by the judiciary, this Court must be circumspect in construing the scope of rights created by a statute that never contemplated such a calculus of interests. Any individual may reproduce a copyrighted work for a "fair use"; the copyright owner does not possess the exclusive right to such a use. Pp. 428-434.

(b) Kalem Co. v. Harper Brothers, 222 U.S. 55 , does not support respondents' novel theory that supplying the "means" to accomplish an infringing activity and encouraging that activity through advertisement are sufficient to establish liability for copyright infringement. This case does not fall in the category of those in which it is manifestly just to [464 U.S. 417, 418] impose vicarious liability because the "contributory" infringer was in a position to control the use of copyrighted works by others and had authorized the use without permission from the copyright owner. Here, the only contact between petitioners and the users of the VTR's occurred at the moment of sale. And there is no precedent for imposing vicarious liability on the theory that petitioners sold the VTR's with constructive knowledge that their customers might use the equipment to make unauthorized copies of copyrighted material. The sale of copying equipment, like the sale of other articles of commerce, does not constitute contributory infringement if the product is widely used for legitimate, unobjectionable purposes, or, indeed, is merely capable of substantial noninfringing uses. Pp. 434-442.

(c) The record and the District Court's findings show (1) that there is a significant likelihood that substantial numbers of copyright holders who license their works for broadcast on free television would not object to having their broadcast time-shifted by private viewers (i. e., recorded at a time when the VTR owner cannot view the broadcast so that it can be watched at a later time); and (2) that there is no likelihood that time-shifting would cause nonminimal harm to the potential market for, or the value of, respondents' copyrighted works. The VTR's are therefore capable of substantial noninfringing uses. Private, noncommercial time-shifting in the home satisfies this standard of noninfringing uses both because respondents have no right to prevent other copyright holders from authorizing such time-shifting for their programs, and because the District Court's findings reveal that even the unauthorized home time-shifting of respondents' programs is legitimate fair use. Pp. 442-456.

Things of importance: Paragraph a) Any individual may reproduce a copyrighted work for a "fair use"; the copyright owner does not possess the exclusive right to such a use.
No matter what anyone (media company, parent, next-door neighbor, or even father-in-law) tells you, we have the right to reproduce a copyrighted work that we own for our own use. If you need to show proof of this, here is a link to the Regents Guide to Understanding Copyright & Educational Fair Use.

A couple quick points from that site:

Fair use applies to all copyrighted works regardless of the media in which they are fixed: print, electronic, or multimedia.

Fair use normally entails copying and is of three kinds:
  1. Creative fair use by authors who copy from other works to create their own work.
  2. Personal fair use by individuals who copy from works for their own learning or entertainment.
  3. Educational fair use by teachers, scholars, and students who copy for teaching, scholarship, or learning.
Paragraph c) has a couple important statements: there is a significant likelihood that substantial numbers of copyright holders who license their works for broadcast on free television would not object to having their broadcast time-shifted by private viewers.

This applies today also. There are a significant number of musicians who have spoken out in support of having their music shared over P2P networks. For examples, see http://www.downhillbattle.org/interviews, George Michael, and Janis Ian.

there is no likelihood that time-shifting would cause nonminimal harm to the potential market for, or the value of, respondents' copyrighted works.

This is one of the most important and controversial points of this discussion. The media companies argue that their market has been harmed. The musicians themselves, the actual copyright holders, say that the market has actually been helped. I'll broach this in another post.
The VTR's are therefore capable of substantial noninfringing uses. Private, noncommercial time-shifting in the home satisfies this standard of noninfringing uses both because respondents have no right to prevent other copyright holders from authorizing such time-shifting for their programs, and because the District Court's findings reveal that even the unauthorized home time-shifting of respondents' programs is legitimate fair use.

This is the crux of the matter. If any P2P program is capable of substantial noninfringing uses, and doesn'thave constructural knowledge of copyright infringement then it is legal. Limewire, Kazaa, and nearly all other programs still out meet that requirement. The reason Napster and the other programs similar to it were closed down years ago is not because they were P2P programs but because they were storing the downloads in a central location, therefore negating any claims that they didn't have knowledge of copyright infringement.

So, to answer the main question, Yes Virginia, Filesharing, P2P, Limewire, Kazaa, Morpheus, Torrents, and anything else that uses these guidelines is 100% legal.

Wednesday, April 27, 2005

Essential programs, part 2

Okay, yesterday's post was my first ever blog and there was one thing I definately learned from it. Never, ever move your post to your e-mail's html editor in order to find and repair an error. In case you were wondering, that's where those strange linebreaks came from.

Continuing in yesterday's vein, here are several more programs that I use often. I keep all of these in a folder on my desktop so it's easy access to run any of them if I am concerned that something has gotten on my computer.

Your Uninstaller
www.ursoftware.com

When I first tried Your Uninstaller, I downloaded the trial from Cnet or Tucows or one of the many download sites that let you try out a program before you purchase it. I hated the trial! It was awful, you could only remove 2 programs at a time and then you had to restart it. And you could only try it for a few days (I think it was 10). When I went to remove it, I got a popup box asking me my opinion about it, and unusual for me, I wrote back and told them how disappointed I was with their trial. The program's creator responded, offering a discount on the product if I wanted to purchase it. I decided to take a chance and do it, and I've never been disappointed.

This program will remove all the junk that Windows uninstaller and even the program uninstallers leave behind. It will even fix removals that have messed up for some reason or other, and it's all very intuitive. Plus, you can even remove hidden files with it, see and edit your startup list, tell what programs have been added since you last ran it, edit your IE right click menu, and clean up your temp files. If I sound like I'm raving about this program, I am. It's become a necessary item on any computer I'm using.

KL Detector
http://dewasoft.com/privacy/kldetector.htm

From the site:

Top 10 Reasons Why You Need KL-Detector
(Why Keyloggers Threaten Your Privacy)

1. Surveillance software is very common nowadays. A Google search on keyloggers yields 39,000+ results.
2. Software mentioned in (1) has a bunch of features to record your activity in every possible way.
3. Due to their "good purpose", keyloggers and other types of surveillance software are not detected by AntiVirus programs.
4. Most keyloggers are more threatening than the so-called spyware. Keyloggers can record your passwords, emails, credit card number, etc.
5. Some keyloggers can even be installed remotely.
6. Most (if not all) keyloggers are invisible. This means you will not know if a keylogger is running on your system.
7. More and more people are using keyloggers or surveillance software. These include your friends, spouse, employer, etc.
8. The recorded keystrokes can be sent to an email address. So physical access to your computer is not necessary.
9. Public computers (e.g. public library's) might have keyloggers installed. It is just a possibility.
10. You value your privacy, don't you?

There are a couple things you might want to know about this program. 1) It doesn't fix what it finds and 2) it doesn't have a setting to run it continuiously. Neither of these are serious issues as you can always go to a free computer help site (I'll list some of my favorites later) and ask for help, plus the author of KL says that you can send him an e-mail if you have problems removing something. And for 2) you can always just rerun the program.

Microsoft Anti-Spyware
http://www.microsoft.com/athome/security/spyware/software/default.mspx

Serious computer users often laugh at this one, but even with all the antispyware I run on my machine, MS found a couple adware programs installed when I ran it. When trying to get rid of spyware, more is usually better, since all of them are a little bit different. And, on top of that, it's totally free.

If you'd like to learn more about spyware removal, the latest issue of 2600 has a great article on it. You can usually find the magazine at Barnes & Nobles or at www.2600.com. This article gives instructions on how to remove spyware in Safe mode on your computer or if you have some that can't be removed that way. how to disable the startup items to remove it. Just remember to always make a backup copy of your registry before making any changes to it.

HiJack This
www.spywareinfo.com/~merijn

This is the most powerful program out there in your search to get rid of spyware...or anything else that is causing problems with your computer. This program comes with a warning though. If you don't know much about computers, don't try to interpret this on your own. Run the program and select the option to also save it in Notepad. Copy the notepad selection and go to one of the many sites that will interpret your HJT files for you and ask them very nicely if they will tell you what you need to fix. Then paste the information into your post. Usually someone will get back to you rather quickly.

Because this program removes items straight from the registry, it's always a good idea to back up your registry first. Here are instructions on how to do it in Windows XP (there are also links there for other versions of Windows): support.microsoft.com/kb/322756.

On the site there is this warning:
Just a short note on the domain HIJACK-THIS.NET: this is not mine! It has been registered by XoftSpy (who are also on the Rogue Antispyware List on SpywareWarrior.com) and they are luring people into downloading their software believing it is HijackThis. Also, they have registered a few AdWords at Google leading to the same result. I have contacted them about this and received no reply (how surprising). Google can't do much about it since there is no copyright being breached. We'll see where this goes.
In the meantime, if you want to download any of my programs, the official domain is and always will be www.merijn.org.

CWShredder
http://www.intermute.com/products/cwshredder.html

By the same person who created HiJackThis. Uh, well, it was by him. He's sold it to Intermute, but it's still a free download. You can also still download it on the HiJack This site, but I don't know if it's up to date on here.

From the website:
CWShredder™ finds and destroys traces of CoolWebSearch. CoolWebSearch is a name given to a wide range of different browser hijackers. Though the code is very different between variants, they are all used to redirect users to coolwebsearch.com and other sites affiliated with its operators.

If you suspect you have a trojan on your computer, try running this. In most cases, I've found that it removes whatever I can't get rid of by other methods.

Tuesday, April 26, 2005

Programs that I find absolutely essential

This list is continually growing, as I learn more ways to protect my computer from every sort of attacker.

Sygate Personal Firewall Pro
http://smb.sygate.com/products/spf_pro.htm

I've tried many, many firewalls. Most either didn't work well, or didn't want to combine with some of the other items I had installed on my computer. Sygate is very intuitive to use, and blocks everything you want blocked while allowing the things you want. It's easy enough to use that I even recommended it to Mom.

WashAndGo
http://www.abelssoft.de/engl/washandgo.htm

From the site:
WashAndGo allows you to reclaim drive space quickly, by getting rid of space-wasting "garbage". WashAndGo can remove *.bak,*.tmp files, zero-byte files and wrong-uninstall entries. It can delete defective links, empty the tmp. directory, erase old browser-cache files, and clean your Start folders. There is a variety of security options: it will give you a prompt so you can choose which files to delete; it can store all marked files in a special backup directory before deleting them - after 14 days the files can still be
found in the Windows trashcan. The program is fast, secure, and reliable. Let WashAndGo reclaim your wasted disk space."

CounterSpy
http://www.sunbelt-software.com/CounterSpy.cfm

From the website:
Spyware and adware does more than just steal information about your computing habits. It slows down your PC and may break it so badly you can't even get on the Internet. The answer is CounterSpy . It has
Active Protection™, (you could call that a "spy-wall").

And from PC World:
"CounterSpy had the highest detection rate in our tests. The most effective scanner--CounterSpy--was also the fastest, taking only a minute to perform a complete scan of a system with 2.7GB of data. Sunbelt Software's CounterSpy proved the most capable of the bunch, finding and stopping 93 percent
of all the running processes created by our 45 test programs."

Diskeeper
http://www.executive.com/defrag/defrag.asp

From the site:
Diskeeper 9 features a high-speed defragmentation engine that runs in the background, eliminating fragmentation-related slowdowns and crashes. With Diskeeper, you never need to worry about fragmentation because Diskeeper handles it for you—automatically and undetectably!

From my own experience, Diskeeper will defragment drives that other programs say are
unfixable. In addition, their help staff responds quickly and will work with you to solve any problems.

Spybot - Search & Destroy
http://www.safer-networking.org/en/index.html

It would be easy to spend a fortune on good programs to protect your computer. But thankfully, some of the best are still free. I'd definately buy Spybot if they charged for it, but it's one of the wonderful free ones that
works as well or better than many you could pay for.

From the site:
"the home of Spybot-S&D, the best (according to PC World, PC Mag, Download.com...) privacy software available!"

Make sure that you run Tea-timer also (it's included with the download) and you'll not only have a great program to remove spyware, but one to help keep stuff from getting on your computer in the first place.

SpywareBlaster
http://www.javacoolsoftware.com/spywareblaster.html

Makes a great one, two punch when combined with Spybot.

From the site:
"Spyware, adware, browser hijackers, and dialers are some of the fastest-growing threats on the Internet today.
By simply browsing to a web page, you could find your computer to be the brand-new host of one of these
unwanted fiends!

The most important step you can take is to secure your system. And SpywareBlaster is the most powerful protection program available.

# Prevent the installation of ActiveX-based spyware, adware, browser hijackers, dialers, and other potentially unwanted software.
# Block spyware/tracking cookies in Internet Explorer and Mozilla/Firefox.
# Restrict the actions of potentially unwanted sites in Internet Explorer."

Adaware SE
http://www.lavasoftusa.com/software/adaware/

From the site:
Ad-Aware is designed to provide advanced protection from known Data-mining, aggressive advertising, Parasites, Scumware, selected traditional Trojans, Dialers, Malware, Browser hijackers, and tracking components. With the release of Ad-Aware SE Personal edition, Lavasoft takes the fight against Spyware to the next level.

Peer Guardian 2
http://methlabs.org/

Probably my favorite program on this list. It blocks incoming attacks and is constantly updating the list so your computer will be safe and secure and yours! It will amaze and astound you who is trying to get onto your computer, and the worst part is that the government is doing nothing to stop them...in fact, they are
trying their darnest to help them. Makes you want to give up on the democrats and the republicans both. But back to PG2. It's free and very needed. In fact, if you're like me, after using it a bit, you'll wonder why you ever went on-line without it.