Online PC Support

OPS Technical Solutions : +1 833-522-1003

Welcome

The Fist Mass Indictment of P2P Users Takes Place

In another twist of fate a group of Virginia lawyers who are known as the US copyrights group decided to file a case of suing 5000 defendants in one go. These people who frequently use the popular peer to peer (P2P) application Bit torrent can be in a messy fix the trial gets underway. The charge against them is using copyrighted material without properly buying them and thereby infringing the already stringent copyright laws.

The biggest hitch in the lawyer’s theory of prosecuting so many people at a time is that so many unrelated people cannot be prosecuted together until and unless their crimes are related in some manner. While the 5000 that have been named are completely oblivious of the other’s existence and no have relation what so ever hence their crimes cannot be considered common.

The lawyer’s viewpoint however illuminates an interesting point. They state that Bit torrent is different from the P2P applications. While the other like Lime Wire or Kaaza only connect two users one who is downloading the file and while the other who has already downloaded the file. Hence the connection is direct and once the download is complete the relation terminates permanently.

But in the case Bit Torrent, all the peers that are in relation with the respective file are connected and each one gets a downloaded piece that is different from others. As a result the download of all the connected users is simultaneous. Since everybody is downloading the copyrighted material together hence they are committing the crime in a group without ever disclosing their identities to others.

US copyrights group has hired a UK based company Guardaley that has been keeping tabs of all the IP addresses that were downloading the one file which had been surfaced by them. After collecting ton of data and some very tough mathematical calculations by decrypting the data they have indeed been able to prove the truth about Bit torrent. As a result the case now hangs in the balance with two parties having strong points for arguments.

There have been numerous cases in the past related to the controversial downloads using P2P links but seldom they have made this much noise. Maybe it is because this the first time so many people are in jeopardy of being executed.

In the end all it can be said is that these Virginia lawyers have found a ingenious way to indict so many people and also saving the individual fees that need to be submitted so as to the case to be registered.

The court has given a June 30 as a date for hearing and reviewing the finer point of case. As of now all it can be done is to wait and watch.

A Tale of P2P Lawyering: Straightforward Legal Blackmail?

Well, legal actions against illegal P2P stuff have been very much evident since a whooping 10 million lawsuit was filed against IsoHunt.com, and cost of defending such cases in UK is easily £10,000, but it has become pretty common t o get away with small infringement cases merely by paying off under £10,00.

While such cases are pretty common nowadays in UK, entrepreneurial copyright lawyers in US haven’t been known to exist in large number; at least those who believe in sending out blackmail letters threatening prosecutions in case the alleged P2P users don’t settle to pay a decent amount.

Now, P2P lawyers have grown, just the way content plagiarism, and copyright violation lawyers have grown to significant numbers. And, now the day has come that P2P lawyers send out straightforward legal blackmails threatening to sue, and ask them to pay money to avoid being established to be guilty.

In legal terms you may call it blackmailing, but since the lawyers are not asking for something wrong, it may not be considered a crime, though not very ethical either. However, things in UK are a bit different from the US, as they’ve several lawyers, and small law firms operating within the country to monetize on P2P. ACS is one of the renowned law firms in UK, operated by Mr Andrew Crossley. They’re experts in tracking IP addresses on BitTorrent swarms, and then reveal the identities of those who’re involved in the process, and send out straightforward threats in form of letters and emails, asking them to pay money to settle the matter.

Just to give you an idea of the amount of money such lawyers make with these claims, one of the lawfirms run by Crossley claimed to have grabbed well over a million pounds this way. Keeping this trend in mind, even the US lawyers have adopted the same strategy; however, it would be interesting to see the kind of response from the Americans, and how well this strategy bodes on US shores.

Coming to the million dollar question whether someone really gets sued in this process – well, things aren’t as transparent as you’d expect them to be. The way they identify such infringements apparently comes from Swiss firm, and hence remains to be pretty much a secret.

But, when you take a look at the records, there have been thousands of letters sent out with legal warnings, but still no traces of any legal lawsuit filed against any of the infringers, and ACS law doesn’t really look too keen on filing lawsuits and taking any legal actions.

Most of the major music labels don’t favor the way ACS tackles illegal file-sharing, nevertheless, it looks like a nice effort to control copyright infringements. But, who’s really getting benefited from all this?

Well, not the music makers, and movie producers to say the least; but, there are many lawyers and lawfirms who’re presenting minting money sending out such legal blackmail letters, pretending to support the law, and doing nothing much in the end,

Beware P2P users – Straightforward Legal Blackmails are just a great way to make money!

So, will P2P lawyering emerge out as one of the newest ways of generating revenues? Well, only time can tell how American users are going to respond to such warnings. As of now, UK P2P lawyers are more than happy with the situations prevailing in the country.

How to Optimize Soulseek for Downloading Music

Soulseek is a peer to peer (P2P) file sharing network and application. It is mostly used to exchange music, although the users are able to share a variety of other files. Its idea was implemented by Nir Arbel, a former Napster programmer. As peer to peer file sharing program, the accessible content is determined by the users of the Soulseek client.

There are certain tips and tricks through which one can reduce the number of errors and increase the number of search results. However, we can change the options to configure a Soulseek client for optimized music downloading, to do this simply follow the instructions given below:

  1. If you have not installed Soulseek, goto the website by searching the name of “soulseek” on any search engine such as google, msn etc., download the program and install the program.
  2. Open the Soulseek application, Goto Options menu and therein select General Options.
  3. Now a dialog box appears which asks for the “listening port”, while selecting a random port, one can change the port upon their wish.
  4. Now click on the “Test Firewall and router settings”.
  5. A webpage will appeal showing “Your router and Soulseek client is configured correctly”, which means the settings are correctly established.

The performance of the application while downloading the files purely depends upon the speed of the internet connection and the way you are using it. It is recommended that if you are using a router in place of a modem then make sure the input is on the “Ethernet Port” of the computer system. If it is not so or if you are using two or more computers on the network and want to use soulseek on all the computers make sure the IP Address of the computer on which the Soulseek client is installed is a Static IP Address and the listening port on every computer is different from each other.

Now open up the router administration control panel and assign the value of the listening port to be forwarded to the IP Address of the computer which has to receive the router.

Now restart the Soulseek client after setting up the values accordingly.

TIPS

If you are using Soulseek on more than one computer, you will have to assign a different listening port for each computer. If your computer is behind a firewall, than there is proper permission for the listening port of the computer which is assigned the Soulseek priviledge.

If you are connected to the switch and all the other computers along with the internet connection are directly connected to the switch, please do not options on your router administration panel.

Soulseek is peer to peer software and thus you should understand the risk of sharing your hard disk contents on the internet. If you are sharing any unauthorized or copyrighted material on the peer2peer software, you could land in dire trouble.

While using soulseek or any other peer2peer software you should also understand that you are using a high bandwidth internet connection because of the demand by such applications.

Blackmail Made Legal?

It was only on the twenty sixth of January of the year 2010 that Lord Lucas of Crudwell and Dingwall of the United Kingdom stood up for himself and announced to his fellow title holders within the House of Lords, that the new products of anti-P2P brainstorming were primarily serving as a travesty of justice.

When attended to in a civil standpoint, the situation seems a bit closer to blackmail. The cost of the required defense is considered to be around ten thousand pounds. You can easily get away with demanding five hundred to a thousand pounds and be actually paid on majority of the times that you do get to muster the confidence to ask. Basically, you get the money you demand for without any effort at all at establishing any guilt or whatsoever. Thus, it seems to be straightforward blackmail that is made legal.

In the United States of America, there is only a minimal amount of such lawyers who tend to look at the more entrepreneurial side of their lawyer jobs. Such copyright lawyers tend to send out hundreds upon thousands of letters just to be able to threaten expensive prosecutions if the alleged users of the P2P do not decide to settle for a huge amount of money. “Settle or we’ll sue your pants off”, is definitely a corrupted thought in the legal world, or in any world at that.

Most of the threats they send out through the mail come from certain trade groups, such as the RIAA. This group is much more interested on focusing on deterrence as well as education, as compared to profits. Furthermore, their record indicates that they have brought quite a lot of cases to the table when people did not decide to settle.

That is in the USA. In UK, however, the people are much more accustomed to such relatively unconventional lawyering acts. In fact, in the United Kingdom, there are quite a lot of law firms that go into the entrepreneurial side of their job by monetizing P2P, and earn a lot of money for themselves. The firm that is most known for such ventures is ACS Law, as it is run by a man under the name of Andrew Crossley.

The modus operandi sounds like this. They hire representatives for tracking the IP addresses through BitTorrent swarms. When they do finally find the addresses, they try to figure out the identities that are put beside the name of the ownership of those addresses. Afterwards, they start to send extremely rude letters that demand immediate payouts or else firm prosecutions will ensue. This is something that is presently being perfected by one of the known US firms, namely, Dunlap, Grubb &Weaver.

Crossley, the big man in question, actually boasts of being able to pull in more than a million pounds only in April through the aforementioned scheme. Despite the fact that the firms involved remain highly controversial for a certain list of reasons, many of the defendants still strongly claim, or feign, innocence, even if they are consistently bombarded with constituent complaints regarding the associated firms.

Notably, despite the fact that these firms have sent out thousands of letters in a week, sometimes even in one day, alone, they still have yet to sue anyone.

How Trojan Horses Work

You must have encountered the word Trojan many a times when your anti virus or your Anti Spam ware runs a scan through your system. These Trojan are high lighted as critical danger, but you have no clue of how they entered your computer. Here a comprehensive view about Trojan horses:

  • Trojans are basically viruses which make a back door entry, which is allowed by the user unknowingly. They are usually hidden under emails, attachments which lure users stating it as gifts, then messages and links on Social Networking sites, which when visited trigger the attack of Trojans. A Trojan is made of two programs. One program is called Client and the other is called Server. The Client is not stored on the user’s computer, while server is stored on the user’s computer.
  • The client is used by the hacker to control the victim’s computer, and is installed on the hacker’s side. Once the Server program is executed it will provide information to the client program upon request. This server program once installed hides itself on your computer and will run automatically every time you start the computer. It does not replicate within the system, and so it is easy to catch it using many sophisticated anti virus soft wares also.
  • It opens up the ports, which allows the hacker to get into your system. They are named after the Greek myth, where in the Greek used a Trojan Wooden horse to get into Troy and then destroyed the city, with the help of soldiers hidden in the horse. Similarly these Trojans seem to be desirable at first site, but contain unwanted and harmful malwares to affect your system. These Trojans cannot get into your system by way of pop ups as the ad wares do. They are to be activated by the users by downloading files on its systems. As in when you download files using P2P software and Torrent Soft ware. These files contains executable .EXE files, which when played are unresponsive, but in the back ground they have started their work.
  • They are not designed to harm the system, but still vital information such as Website passwords, credit card details, which are then sold by the hacker at a price in the black market over internet. Firstly the creator writes a code, and disguises it as something other than a damaging program. Then it is uploaded on websites for download. They might arrive as an email attachment and masquerade as a screen saver, a program update, or a graphics file. When a user receives the email message, he believes the attachment is a nice “gift” and double-clicks it, “inviting” the Trojan horse onto his computer system. This software then opens the system to a backdoor attack. The installed software allows the Trojan horses to be installed. Then the hacker can access the user’s files and programs. For instance, the hacker might steal the user’s financial data. The cracker also might use the system as a zombie, launching DoS (denial of service) attacks on a large server or Web site.

Great are the implications of a Trojan Horse attack, so be vigil and download only secured items for the internet after going through a security scan.

Call Now: +1 833-522-1003
Call Now: +1 833-522-1003
Call Now: +1 833-522-1003