Feeds

Newzbin code leak could lead to return of Usenet indexer

'Hardy fu*kin' har', says Mr White

High performance access to file storage

A clone site of Newzbin could be winging its way onto the interwebs soon, after its source code was stolen.

Just last week the Usenet indexer went titsup due to legal action from the Motion Picture Association of America.

Not long after that Newzbin admins confirmed in a blog post that the code had unsurprisingly been leaked into the wild, but they didn’t take direct credit for it.

“Newzbin have not gone out of their way to ask the thief not to use their code; so we can only assume that it's use to create clone sites would be [sic] go unopposed," the post said.

“We're waiting on tenterhooks for some news of a public release of the code, we'll keep you updated on the matter if and when it actually happens. Added bonus points to Mr Code Theif [sic] if it gets released on Usenet.”

However, Newzbin hasn’t been resurrected yet. On Friday the mystery group behind the code grab sent out an email to all of the Usenet curator’s members.

Hi ex-Newzbin user.

Lamenting the departed site? Dreading doing Usenet the old skool way? Think the clone NZB sites suck?

Good news: we are Newzbin Two, and we have glad tidings: NEWZBIN IS BACK! and we are the new management. The crew got most of the original Newzbin source code and the main databases. We loved it too much to let it die.

The catch? We wont be up for a very short while cos things need to be done. For starters we need a cool domain name; also we need to hack on the code some more to make it run. We are nearly there but it is very complicated. We reckon we'll up very soon.

So don't drift off to those lame-ass wannabe NZB sites. Hang on for a little longer and the Big Dog will be back…

Mr White Team R Dogs/Newzbin2

Newzbin turned over £1m in 2009 but was found liable for copyright infringement in the UK High Court at the end of March this year.

As we reported last week, it's understood that the outfit owes the MPA £230,000 in interim costs - a full costs and damages hearing is still to be heard.

Newzbin also allegedly owes a software development house £500,000. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.