Bandits Give Microsoft a Lesson on Copying, Stealing

Unarmed bandits stole a "Microsoft Security" sign from one of the company's security vehicles in Mountain View, California Tuesday night. In an interview, one of the bandits called the action a response to Microsoft's controversial plan to "close the PC" by getting manufacturers to modify hardware to restrict copying. reported last week that Brad Smith, deputy general counsel for the company, asked at a meeting, "How can you steal something if the original is still there after you've made the copy?"

The answer to Smith's question is that copying and stealing are different, the bandit argued. "Any corporate counsel who didn't get his law degree out of the back of a comic book should know the difference between copying, which is often legal, and stealing, which is a crime", the bandit said. Customers have the right to make some copies, such as quotations, backups and personal copies on portable devices, and Microsoft's so-called "Digital Rights Management" attacks legitimate copying along with copyright infringement, he added.

Although Microsoft is free to disable copying functionality in its own software products, the bandit said, even people who don't use Microsoft's software should be concerned by the company's "close the PC" plan, described at The plan "involves making minor modifications to the PC's hardware to allow Microsoft to make a secure version of the Windows Media Player", and, according to the site, some hardware vendors are already close to signing on.

Will Microsoft be able to use the "minor modifications" to lock out non-Microsoft software? Will Microsoft's hardware-based attack on free speech and fair use succeed where software alone has failed? Nobody knows. And will Microsoft ever learn the difference between copying and stealing? "I'll keep stealing until they do", the bandit said.


White Paper
Linux Management with Red Hat Satellite: Measuring Business Impact and ROI

Linux has become a key foundation for supporting today's rapidly growing IT environments. Linux is being used to deploy business applications and databases, trading on its reputation as a low-cost operating environment. For many IT organizations, Linux is a mainstay for deploying Web servers and has evolved from handling basic file, print, and utility workloads to running mission-critical applications and databases, physically, virtually, and in the cloud. As Linux grows in importance in terms of value to the business, managing Linux environments to high standards of service quality — availability, security, and performance — becomes an essential requirement for business success.

Learn More

Sponsored by Red Hat

White Paper
Private PaaS for the Agile Enterprise

If you already use virtualized infrastructure, you are well on your way to leveraging the power of the cloud. Virtualization offers the promise of limitless resources, but how do you manage that scalability when your DevOps team doesn’t scale? In today’s hypercompetitive markets, fast results can make a difference between leading the pack vs. obsolescence. Organizations need more benefits from cloud computing than just raw resources. They need agility, flexibility, convenience, ROI, and control.

Stackato private Platform-as-a-Service technology from ActiveState extends your private cloud infrastructure by creating a private PaaS to provide on-demand availability, flexibility, control, and ultimately, faster time-to-market for your enterprise.

Learn More

Sponsored by ActiveState