Feeds

N64 emulator vanishes after lawsuit threat

Nintendo may follow Sony and sue developers for encouraging software piracy

  • alert
  • submit to reddit

Mobile application security vulnerability report

Nintendo N64 emulator UltraHLE (Ultra High Level Emulator) finally made its appearance last Thursday, only to be removed from the developers' Web site hours, Emulators Unlimited, after its release. The site claimed the software had been pulled because of the huge level of demand, but it's noteworthy that on the same day, Sony announced its decision to take legal action against Connectix over the latter's Mac-based PlayStation emulator, Virtual GameStation (VGS). Indeed, a Nintendo spokeswoman said this week the company was considering filing a lawsuit against UltraHLE's developers. The Sony action was prompted as much over concern about the extent to which VGS might encourage piracy, as over alleged patent and copyright infringement (see Sony to sue Connectix over PlayStation emulator and PlayStation emulator developer to fight Sony lawsuit). Connectix denies both charges, and claims to have equipped its emulator with code to help prevent illegal copies of PlayStation game CDs from running. With UltraHLE, however, there is no such excuse: the only way to use it is exclusively with pirated titles since N64 titles ship on ROM cartridge, not CDs. At least Connectix can argue it's encouraging the sale of legitimate PlayStation software. Most emulators available on the Internet allow PCs and Macs to act as long defunct consoles and home computers, such as the Sinclair Spectrum, Dragon 32, Commodore 64 and Nintendo Entertainment System. While all the games played on these emulators are still under copyright protection, few of the copyright owners have made a fuss about emulators because their titles are no longer on sale. With modern systems, the case is far less clear cut because the boundary between the emulator world and those users who are simply interested in pirating software is very hazy indeed. Nintendo sees no distinction: emulators are "illegal" since they can only operate with illegitimate software. The company has been closing down Web sites trading in data and programs downloaded from ROM cartridges for some time. Such sites can be used by gamers to transfer games to a PC and then to a CD-R -- many games magazines contain ads for devices that hook a CD player up to an N64, said one console owner who did not wish to be named. ®

The Power of One Brief: Top reasons to choose HP BladeSystem

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
Chips are down at Broadcom: Thousands of workers laid off
Cellphone baseband device biz shuttered
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.