Feeds

Metallica to shame – but not name – Napster ‘pirates’

We've got a little list...

  • alert
  • submit to reddit

Seven Steps to Software Security

Hard rock band Metallica will tomorrow demand Napster block 335,435 alleged music pirates from using the developer's MP3 'seek, locate, download' software. Since the band's lawyer, Howard King, sued Napster for copyright infringement just over two weeks ago, its agents have been tracking down users who, they claim, have illegally offered copies of Metallica songs to others. King is also representing rapper Dr Dre in his case against Napster. Unlike the original Metallica suit, Dre is targeting not only Napster but certain users of its software - or at least built in the opportunity to added named individuals to the suit later on. Metallica could now expand its own case to do the same, though King told US media that that will not be case. Dre hasn't yet sought out specific pirates, but will do so if Napster refuses to take action against the 335,435 alleged infringers named by Metallica, King says. And the fact that Metallica's techies have been able to build up the list at all is likely to play on many Net users' fears for their privacy while they surf the Web. Certainly, many Napster users will have assumed that their anonymity has been protected while using the software - legitimately or otherwise - and won't be too pleased to learn that it hasn't. The names were collected after Napster use was monitored over the weekend. ® Related Stories Chuck D benefits Napster with on-line rap contest Napster rapped by rapper More artists to sue Napster says Metallica lawyer Metallica sues Napster

Boost IT visibility and business value

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.