Feeds

Eight charged over Star Wars leak

Dark Side of the net

Security for virtualized datacentres

Eight US residents suspected of involvement in leaking the final Star Wars film onto the net prior to its official release have been charged with copyright infringement offences.

According to court documents, a copy of Star Wars: Revenge of the Sith was taken from Californian post-production firm and leaked onto the net in the days up to the film's world wide theatrical debut in May.

Albert Valente, 28, of Lakewood, California, has pleaded guilty to copyright infringement charges over allegations that he unlawfully took a screener copy of the film (intended for review purposes only) from the unnamed post-production house where he worked, the BBC reports.

Marc Hoaglin, 36, of Huntington Beach, California, has been charged with uploading the film onto the net, an offences punishable by up to three years imprisonment. Six other defendants have been charged with misdemeanor copyright infringement offences that could, upon convicted, land them in jail for up to 12 months.

All eight face an appearance in court next month. ®

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.