<font size=4 face=verdana,arial>BadBlue Report</font>

December 2003   VOLUME 3 ISSUE 11  
Are you being watched at the office?
File Sharing: War on Copying...
PHP Watch: PHP dominance...
New Features: OfficeSurfer...
How to Give Users their own Upload Folders
Customize your copy of BadBlue...
Use Windows XP/2000 User Accounts
BadBlue major feature list by version
Here's what users are saying about BadBlue:

"A truly great piece of software!", Mikael W.

"I think your programme is brilliant", Nick K.

"I love your product", Chad S.

"Not the first I tried but is the last I need to try", Phunn Y.

"Fantastic program... the more I look at it the more I like it", Ronald W.

"This is an awesomely easy to use and valuable product", Bruce L.

"BadBlue is way cool... just what I've been looking for", Gary E.

"Your program is awesome!", Andrew M.

"An outstanding program!", Derek O.

"The Only Thing I Can Say... Excellent", Marc F.

"Great! Superb!", Alfredo Y.

Download BadBlue now and see what everyone's talking about!
File Sharing: War on Copying...
...iTunes hack... Google's growing pains?

p> The War on Copying

"Digital-rights-management technology is the next step in providing real protection, but at what cost and to whom?...

...Most companies mistakenly believe that content protection is about protecting content. Consider that renting a new video release for a single night costs $4 to $5, but renting an old video for five days costs $5. Most content makes the majority of its revenue in the first few weeks of release. Thus, content protection is really about protecting the release window...

...It is in these real-world individual issues that DRM will meet the most resistance. Content owners want strict definitions of stealing and honesty. However, schemes that are too difficult to work with or appear insensitive to individual circumstances may drive 'honest' people to reconsider what honesty really means..."


Programmer points way to iTunes DRM Hack

"The Norwegian programmer who distributed the first widely used tool for cracking the copy protection technology found on DVDs has turned his attention to Apple Computer's iTunes... late last week, programmer Jon Johansen posted a small program called QTFairUse to his Web site, with little in the way of instruction and even less explanation. But during the next few days, it became clear that the program served as a demonstration of how to evade, if not exactly break, the anticopying technology wrapped around the songs sold by Apple in its iTunes store..."


The Economics of File Sharing

"Every major label is drooling over the money-making prospects of having its own iTunes or Musicmatch. But they are all, in the immortal words of Johnny Cash, 'born to lose, and destined to fail.' Why? The music industry's problem is fundamental: the implicit contract between music companies and listeners is no longer viable.

The music industry fails to understand that a primary reason that consumers illegally share music files is that they want insurance against the music industry itself. File sharing is as much about risk sharing as it is about the theft of value. Technology makes file swapping possible - but the music industry's business model, which is at odds with the implicit contract it signs with listeners, is what makes it probable..."


Can Google Grow Up?

"Google is one of the best things to happen to the Net. So will its IPO, expected this spring, be a must-buy? A look inside reveals a talented company facing trouble..."


SCO's 'Las Vegas code': All show?

"The examples shown by SCO chief executive Darl McBride in Las Vegas this summer amounted to nothing but fist-pounding, according to a professor of law in the latest debunking of SCO's case against Linux...

...Two examples showed code from Linux that was said to have been copied from SysV Unix. But Moglen contends that this code is not only the original work of Linux developer Jay Schulist, but that it was originally part of BSD Unix. Because it was copied, perfectly legally, into SCO's SysV Unix from BSD, says Moglen, the code in Linux and in SysV Unix have a common ancestry -- so SCO's 'pattern-matching' search of the two code bases turned up an apparent example of copying. 'SCO didn't do enough research to realise that the work they were claiming was infringed wasn't their own,' he says..."


SCO vs. Linux

"Here is the letter that IBM received from SCO as one of 'the notorious gang of 1500'..."


Mapping the Internet

Opte has released their latest maps of the Internet, after announcing they have successfully mapped the entire network...


Microsoft to Revamp Windows Security

"Microsoft Corp. is preparing a series of major changes to the security capabilities in the Windows client and server platforms, and they will further lock down the company's flagship operating systems... the biggest change will be in the server product, which will get a feature that can prevent unsecured machines from connecting to corporate networks..."


Next steps: Get the easiest personal web server for file sharing, free, or review a special offer on BadBlue Enterprise Edition.


Get Licensed!
BadBlue Enterprise Edition Special Offer
Published by BadBlue
Copyright © 2003 Working Resources, Inc.. All rights reserved.
Features subject to change. Use of software is subject to acceptance of terms and conditions of End User License Agreement (EULA).
Powered by IMN