Feeds

BSA stomps Warez.at

Looking for more pirate scalps

  • alert
  • submit to reddit

Remote control for virtualized desktops

The Business Software Alliance shut down 118 UK warez (pirate software) sites between January and September 2001.

It also issued a further 584 with takedown notices.

The BSA is most proud of claiming the scalp of www.warez.at, "a major illegal software site, which crossed at least nine international boundaries". The system warez.at used was one of just setting up new redirects as soon as one of the sites in the network was closed down.

The BSA discovered redirection services to sites in Australia, Austria, France, Germany, Hong Kong, Israel, Italy, the UK and the USA.

Mike Newton, programme manager for BSA in the UK, said, "Warez.at was a major illegal hub, and its take-down has significantly impacted the European pirate community. To have received a signed cease and desist declaration from the owner of the site sends a strong message to other pirates that they are not out of the law's reach."

The BSA took down 1,800 warez sites in 2000. It is currently investigating 6,061 leads from the first nine months of 2001 alone.

Warez.at has been closed down, and the previous owner of the site has forfeited the warez.at domain to the BSA. The site now hosts the multi-lingual message: "This Web site has been closed at the request of the Business Software Alliance. Advertising, selling or distributing unlicensed software on the Internet is illegal."

In a similar case BSA's local counsel in Finland recently persuaded the Finnish registration body for domain names, the Telecommunications Administration Centre, to reject an application for the registration of the domain name "warez.fi". The TAC said the registration would be contrary to good practice. ®

Beginner's guide to SSL certificates

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.