Feeds

Kazaa shuts down Kazaa Lite

Legal threats

  • alert
  • submit to reddit

Security for virtualized datacentres

This weekend users of Kazaa Lite K++ learned that almost every download site of the popular peer-to-peer file-sharing application had disappeared, including the links on its own home page.

Sharman Networks, the company behind the original Kazaa, approached the ISP of every website that hosted the program and ordered its removal on grounds of copyright infringement.

Kazaa Lite K++ is one of many light versions of the popular file-sharing program, but it wasn't developed by Sharman Networks. K++ was set up to offer a version free of the growing amount of spy and adware within the original Kazaa Media Desktop Program. In exchange for installing Kazaa Media Desktop without charge, the GAIN Network and Cydoor spyware will show you online ads. Remove these add-ins and Kazaa simply won’t work. Kazaa does offer an ad-free Plus version for $29.95, but naturally, most Kazaa users preferred the free versions widely available on the Web.

Although there are still plenty of sites where Kazaa Lite can be downloaded, the program may no longer function properly, according to Slyck.com. Kazaa Lite is based on a Kazaa version prior to 2.5. Therefore a current supernode (a computer that contains a list of some of the files made available by other Kazaa users) in the Kazaa Network will not accept its shares. "The speed of the application will pummel to the ground and (drive Kazaa Lite) out of existence," a user notes.

As expected, most Kazaa Lite fans are gnashing their teeth. Here is an attack from Slyck.com: "This latest act from Sharman punctuates a long history of hypocrisy that involves the protection of their own intellectual property rights, yet blatantly ignoring the copyrights of others."

Many Kazaa Lite users will probably divert to other Kazaa clones, such as GIFT, which connects to the Fasttrack, Openfasttrack, Opennapster (old Napster) and Gnutella networks. Still alive and kicking is also the Diet K add-in, which removes all spyware from the original KaZaA Desktop without crippling it. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
'Cowardly, venomous trolls' threatened with TWO-YEAR sentences for menacing posts
UK government: 'Taking a stand against a baying cyber-mob'
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.