MPAA Gets A Bit Of Their Own
The Motion Picture Association of America — one of the "Associations of America" notorious for single-minded focus on copyright enforcement — has gotten a bit of it's own poison, as it's been forced to remove software from it's website designed to detect and report file sharing by university students.
The MPAA's "University Toolkit" was touted in a series of letters sent to U.S. colleges in October, encouraging them to use the toolkit to help identify and punish students engaged in copyright-infringing file sharing. What the MPAA apparently forgot to check was it's own copyright-infringing file sharing, as the toolkit was built upon GPL-licensed code from Ubuntu Linux.
The MPAA's failure to publish the source code for the toolkit put it at odds with the GPL, and landed it's ISP with a DMCA take-down notice from Ubuntu developer Matthew Garrett. Garrett indicates that he made repeated efforts to remedy the issue directly with the MPAA, but was unsuccessful, prompting the escalation to the association's ISP.
Justin Ryan is a Contributing Editor for Linux Journal.
Fast/Flexible Linux OS Recovery
On Demand Now
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Qt Company's Qt Start-Up
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- Open-Source Project Secretly Funded by CIA
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- The Death of RoboVM
- The Humble Hacker?
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- BitTorrent Inc.'s Sync
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide