Feeds

Catnap fills Aimster's anti-Napster filter shoes

You don't have to mess with your MP3 files any longer

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Aimster may have knocked its Napster filter bypass software, Pig Encoder, on the head, but the void it has left behind it is rapidly being filled. The latest is Catnap, an open source scrambler/descrambler that's almost completely transparent to the user.

Pig Encoder and similar systems work by changing MP3 filenames in order to confuse Napster's filter into thinking they're not on the blacklist of banned tracks. The encoding scheme removes the first letter from each word in the song title and drops it at the end of the word.

Most filter busters operate on the MP3 files on the user's hard drive. Catnap uses the same encoding scheme but does the scrambling on the fly. It acts as a proxy between the Napster server and the client software, scrambling and unscrambling song titles as they pass through it.

Says the Catnap Web site: "The Napster server only receives a set of nonsensical words. Any other catnap user can find your files and download them (without having to understand anything about the scrambling system). The proxy allows you to use Napster as you normally would."

The snag, the programmers admit, is that while Catnap is running, users will only be able to see files shared by other Catnap users. To see files hosted by other Napster fans, Catnap users can flip the software into passive mode - Catnap leaves filenames untouched.

Catnap currently runs on Windows systems and can be easily compiled for Linux, apparently. And, as it's fully open source, all the C++ code is there for anyone who wants to port it to other OS'. ®

Related Link

Catnap's Windows installer and source code can be found here

Related Stories

Napster gags Aimster anti-filter app
Canadians target filtered Napster fans for profit
Aimster tells Napster file filter to 'pig off'

Boost IT visibility and business value

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.