Berkeley CSUA MOTD:Entry 10142
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/24 [General] UID:1000 Activity:popular
5/24    

2003/9/11 [Computer/SW/Apps/Media, Computer/Networking] UID:10142 Activity:moderate
9/10    Does anybody else see themselves telling their kids in 15 years,
        "Yeah, I shared files... but it was a different time back then."?
        \_ Dual Income, No Kids, Early Retirement, Happy Life.
           \_ Censor censor censor.  Join the army and mark things.
              \_ The motd censor struck, so I had to remark on it.
                 Apparently someone has decided that there is no such
                 thing as a fat sysadmin.  Probably they're a fat sysadmin
                 themselves.
                 \_ You can't censor a content-free statement.  Your fat
                    sysadmin silliness just adds noise.  If you had something
                    to say it would still be here.
                    \_ I also like the fat sysadmin posts
                       \_ It's funny the first time.  Now it's just noise.
                          Like other trolls and 100% noise posts, they'll be
                          purged instantly like all content-free posts.  I'm
                          one of the louder anti-censor people but I also
                          understand that adding noise is a form of censorship
                          which makes it harder for others to see real content
                          or discuss anything real.  By removing trash and
                          trolls, censorship is weakened.
                          \_ Your logic is flawed.  The motd is 100% white
                             noise.
        \_ http://www.gnu.org/philosophy/right-to-read.html
        \_ yes.  and I can tell my kids (when they are old enough) that
           I was part of underground resistance movement fighting against
           unfair copyright and intellectual property laws.  And no,
           I don't think 90 years of protection is fair.  RIAA is just
           pissed off because they can no longer make obscene profit,
           ignoring consumer's demand like the way they used to (force
           all the junk down his throat when all he wanted is one single
           hit song... just an example)
           \_ Not to mention the fact that the artists themselves see only
              a fraction of the profits unless they've already become wildly
              successful...and typically lose the rights to the music that
              they've created in the first place.
              \_ It's funny that computer programmers don't see the irony
                 here.  -tom
                 \_ Computer programmers are typically very well compensated
                    for the work that they do.  Last I checked, musicians
                    aren't guaranteed any sort of compensation at all.  I
                    see what you're getting at, but I think you're wrong.
                    \_ Neither are programmers.  Heard of the H1b program?
                       \_ Yes.  Two of my friends at Intel were H1B's (each with
                          MS degrees) and were paid according to their grade
                          level (which was the same as Americans with MS
                          degrees).  They were also some of the best engineers I
                          knew. --emarkp
                 \_ are you saying software engineers are like musicians?
                    please name one piece of software that was written in
                    less than a week by four guys, and which was then used
                    for decades with no modification whatsoever and made
                    millions of dollars.  and show me one job ad for
                    a musician to make 80k/year garrunteed with benefits,
                    regardless of wether their code directly makes money
                    or not.  there are similarities in the IP issues, but
                    the economics of the two industries are totally different.
                    maybe i'm reading too much into your post.
                    \_ you're reading too much into the post.
                 \_ I agree with tom on this.  The stars must be in some
                    weird alignment.
              \_ the funny thing is that in the small, non-RIAA labels where
                 the artists actually do see a significant portion of profits,
                 the CD's are actually cheaper.  http://www.misfits.com
                 And, they give away songs and videos free on the internet!
                 The Misfits may sing about evil, but unlike other segments
                 of the record industry they don't actually embody it.
                 amazingly they seem to understand that the same people who
                 download their video for free are likely to spend 30 bucks
                 to go see them in concert.  personally, i'm just going to
                 buy all my music from Misfits records.
              \_ This is all well and good, but it's clear you aren't
                 interested in fighting the (flawed) system but in getting
                 freebies, in other words, stealing.  If you actually wanted
                 to fight you would organize politically.  As it is you
                 are a twice dishonest thief.
                 \_ Failed your reading comprehesion, I see.  I don't support
                    stealing or theft -- either by institutions or
                    individuals.  You need to stop frothing at the mouth long
                    enough to really think.
                 \_ Easy on the assumptions, chief. What makes you think
                    the above poster doesn't contribute to defense funds
                    etc.?
        \_ The ethics of file sharing is intimately related to copyright and
        intellectual property law.  As perhaps some children and
        teenagers unconsciously appreciate, stealing a loaf of bread is an
        inherently different act than downloading a song.  Stealing bread
        denies another from eating it, while downloading a song denies nobody
        else from hearing it.

        Of course, the musicians who produce a song should be compensated if
        we as a society want to encourage the production of music.  The
        framers of the constitution recognized this by allowing congress to
        grant an exclusive right to distribute books, music, etc. for a
        LIMITED TIME.

        Essentially, the idea of copyright is a social contract between the
        consumers and producers of music.  Consumers agree to pay the
        producers for new works with the understanding that, after a
        reasonable time, these works will pass into the public domain.
        Limited copyright strikes a balance between the non-exclusive nature
        of music (i.e., my downloading a copy does not deprive you of the use
        of your version) and the need for musicians to be compensated.

        Unfortunately, the producers of music, movies, and other media have
        refused to hold up their end of the contract.  Large corporations have
        repeatedly lobbied congress to extend copyrights in order to prevent
        their works from passing into the public domain.  In addition, music
        companies in particular have violated various other laws by colluding
        to artificially prop up music prices.  Consequently, a strong case can
        be made that while file sharing may be illegal it is not unethical.
        \_ it's incredible that we live in a country where the intellectual
           property generated by a bunch of kids in a garage 50 years ago
           property generagted by a bunch of kids in a garage 50 years ago
           enjoys more protection than, say, a new drug that took years and
           hundreds of millions of dollars to develop.  It's even more
           incredible that most people don't seem to think this is odd.
           I'm not arguing for stronger patent law; I'm agreeing with you that
           copyright law as it stands in the US is crazy. under US law, my
           post is copyrighted, and technically i could sue all of you for
           "stealing" it by reading this.
           \_ technically, no you couldn't but I agree with the rest.
        \_ that looks like some giant cut n paste from some site. it's also
           based on the assumption that stealing a physical object is different
           than intellectual property.  i think Intel, Ford, and GE would
           disagree with you that the IP they've spent (B)illions of dollars
           to create is not yours for the taking if you find an empty work
           station and bring your own floppy disk on a factory tour.
           \_ Intel Ford and GE would be wrong then. Ideas are not the
              same as things, no matter how much lawyers would like to
              pretend otherwise.
              \_ So you think it's ok to bring your own floppys on a company
                 tour and copy shit off their computers and take it home with
                 you and share it on the net?  After all, it's only IP and not
                 something physical they're losing.  They still have *their*
                 copy of the plans for their next chip/car/appliance, right?
                 I hope you understand that's what you're saying.  The rest of
                 us, non-lawyers included, would call it theft.
           \_ It's a cut n paste from a letter to the editor that I wrote.
              Note that the point isn't that intellectual property should
              not exist or that you should be able to "take IP".  The point
              is that IP is a fiction designed to balance compensating the
              originators of IP and the benefit to society of making IP
              freely available.  In US law, IP is not a "right" like the
              right to life, liberty, and happiness; IP is specifically
              designed to promote science and the arts.
              \_ Was it actually published?  You made the point very well.
                 \_ Thanks for the compliment.  I sent it yesterday and
                    recevied an automated reply saying that letters over
                    150 words would not be published.
              \_ First off, *all* laws are fiction.  You don't _really_ have
                 the *right* to life, liberty, and the pursuit of happiness.
                 That's a fiction.  The concept of physical property not
                 currently in your personal physical possession is also a
                 fiction.  Only the law says your stuff is still your stuff
                 when you're not around.  The law has been extended for
                 creative expressions known as Intellectual Property.  Other
                 than people interested in free-as-in-beer music I think every
                 one should easily be able to see this.
                 \_ True, law is a fiction.  But the law of physical
                    property goes back to primitive times and is designed
                    to promote peace and progress to mankind-- ie,
                    well-defined propery ownership benefits mankind by
                    minimizing disputes and enables some other worthwhile
                    goals (e.g., capitalism, avoiding the tragedy of the
                    commons, etc.).  Intellectual property laws exist
                    because the Framers of the Constitutions recognized
                    that such laws could be of some similar benefit to
                    mankind-- encouraging a creative person to share his
                    invention/music/book/discovery by giving him a
                    temporary monopoly.  Current law, however, is a sad
                    bastardization of what IP was meant to be.
                    \_ I disagree with you and the post you replied to.
                       According to documents written by the forefathers
                       of our government, people have certain inalienable
                       rights.  These rights are not regarded as fiction.
                       You may disagree with this view, but certain rights
                       are viewed as fundamental parts of any legitimate
                       government and IP is not one of them.
                       \_ According to documents is the key phrase.  The rights
                          *are* fiction.  They are created by laws created by
                          men and didn't exist until this country was free from
                          Britain and even today must be guarded closely lest
                          we lose them.  IP is merely an extension of simple
           "stealing" it by reading this.
                          property rights.
2025/05/24 [General] UID:1000 Activity:popular
5/24    

You may also be interested in these entries...
2013/6/26-8/13 [Computer/Domains, Computer/Networking, Computer/SW/WWW/Browsers] UID:54697 Activity:nil
6/26    This ones for you psb -ausman
        http://25.media.tumblr.com/027fe67c84c2288cc16e9c85db690834/tumblr_mp0ag8DCQI1qzwozco1_1280.jpg
        \- that's pretty good. i wish someone had put the idea to be before i saw
           it on the internet, so see if i'd have put the 9 justices in the same
           boxes. JOHN PAUL STEVENS >> All the sitting justices. --psb
        \- that's pretty good. i wish someone had put the idea to be before i
	...
2013/3/21-5/18 [Computer/SW/Apps/Media, Computer/SW/WWW/Browsers] UID:54632 Activity:nil
3/21    Browser Plug-In you must get: Ghostery. It gets rid of a bunch of
        ad trackers on a web site, resulting in really fast load times.
        For example, a typical media site will require 10-15 trackers
        (you know, those URLs that track your activities so they can
        target you better). Ghostery kills them.
        \_ This has been working well for me, and breaks fewer things
	...
2012/11/18-12/18 [Recreation/Celebrity, Politics/Domestic/911, Computer/SW/Apps/Media] UID:54537 Activity:nil
11/16   Anonymous responds to be labeled a "terrorist" by Isreali media:
        http://t.co/0lIgC166
	...
2008/8/5-10 [Computer/Networking] UID:50788 Activity:nil
8/5     It looks like my company has started blocking HTTPS tunneling.
        I used to do this by tunneling SSH through the HTTP/HTTPS proxy
        server, but this seems to have stopped working. Does anyone know
        how the implementation of tunneling detection works, and whether
        there are widely available implementations? We run a bunch of MS
        stuff, so I imagine we're running an MS proxy server or something.
	...
2007/6/28-7/2 [Computer/Networking] UID:47104 Activity:nil
6/28    what?
        We are deeply, deeply sorry to say that due to licensing constraints,
        we can no longer allow access to Pandora for most listeners located
        outside of the U.S. We will continue to work diligently to realize
        the vision of a truly global Pandora, but for the time being we are
        required to restrict its use. We are very sad to have to do this, but
	...
2007/6/28-7/2 [Computer/SW/SpamAssassin] UID:47111 Activity:nil
6/28    Q: What are folks using these days for anti-spam measures?  I'm
        looking for something that integrates with my MTA (postfix) or my
        delivery agent (sieve).  Currently I'm using a crufty version of
        spamassassin wired into postfix via amavisd-new.  It's decent, but I
        don't want to be bothered with manually upgrading spamassassin or
        updating rulesets on a regular basis.  Anyone have any experience
	...
2006/2/18-23 [Computer/Networking] UID:41923 Activity:low
2/18    My DSL modem's ip address is 192.168.0.1, my internal network
        behind my router is 10.0.0.x. Is there a way I can configure
        the router so I can access the DSL modem from my 10.0.0.x
        network directly without re-wiring? Static routes? I tried it
        but no much luck. I also tried changing my internal network to
        192.168.0.x, but still does not work. Thanks.
	...
2006/1/28-31 [Computer/Networking] UID:41585 Activity:low
1/28    Just switched to Comcast from SBC and generally happy with it.  But
        can someone please explain to me why they are constantly pumping
        ARP traffic through the network?  It seems harmless, but I'm curious
        as I didn't see it with DSL.  It's a little disconcerting to see
        constant traffic on your router, even if ARPs are harmless from
        a bandwidth perspective, and it makes the WAN send/receive light
	...
2006/1/22-24 [Computer/Networking] UID:41477 Activity:nil
1/21    I am trying to setup a small network for my girlfriend's
        mom's company.  They just bought an accounting package
        which requires windows 2003 server.  And they want internet
        access from each computer.  How should the network be setuped?
        Would it be dumb to use static IP for each computer and a
        computer as internet gateway?
	...
2005/8/29-30 [Computer/Networking] UID:39329 Activity:moderate 54%like:37400
8/29    What's the difference between a hub, a switch and a router?  Thx.
        \_ AFAIK, probably be corrected by someone:
           hub: Allows communication on a LAN with bandwith shared amongs all
                the nodes on the hub and maxing out at the max line speed.
           switch: Allows communication on a LAN with bandwith greater than
                the max line speed (point to point)
	...
2005/6/2-3 [Computer/Networking] UID:37941 Activity:moderate
6/2     I've been to many places and almost every place I go to have
        802.11b/g. However, almost all of them have protected access,
        which I presume they use because they don't want people stealing
        their bandwidth. So here is one idea I think will really
        revolutionize 802.11X... an option in the router that allows you to
        specify the percentage of unprotected bandwidth you are willing to
	...
2005/5/23-25 [Computer/Networking] UID:37799 Activity:nil
5/23    Has anyone played with carp/pfsync on OpenBSD? I have a simple
        two firewall setup, one fw running 3.6, the other running 3.7.
        Right now the 3.6 system is the "master" and everything seems
        to work properly except that I can't ping the virtual ip from
        the master system. Any ideas?
        \_ I've seen this with a lot of virtual IP/failover/load balancers.
	...
2005/2/25-27 [Computer/Networking] UID:36421 Activity:moderate
2/25    What is the smallest (physical and price) cisco router that can
        handle BGP?  It should be able to have more than 256 ram.
        \_ When you say ``handle BGP'', do you mean supports the bgp
           protocol or supports enough ram to keep a reasonable (what do you
           consider to be reasonable) number of routes in memory?  Do you want
           to be peering at PAIX, or do you just need a router to run the T1
	...
2005/1/13-14 [Computer/Networking] UID:35697 Activity:high
1/13    I need help fixing someone's Win2K box.  Setup:  Win2K box -> D-Link
        router -> DSL modem.  The Win2K box cannot obtain a DHCP address
        (other computers can).  So, I assign a static IP, and set the default
        gateway and DNS server to be the D-Link router.  After this, the Win2K
        box can access web pages on the Internet as long as you specify the
        web site IP address directly -- but DNS doesn't work.  Computer used
	...
Cache (7490 bytes)
www.gnu.org/philosophy/right-to-read.html
Hers had broken down, and unless she could borrow another, she would fail her midterm project. He had to help her-but if he lent her his computer, she might read his books. Aside from the fact that you could go to prison for many years for letting someone else read your books, the very idea shocked him at first. Like everyone, he had been taught since elementary school that sharing books was nasty and wrong-something that only pirates would do. And there wasnt much chance that the SPA-the Software Protection Authority-would fail to catch him. In his software class, Dan had learned that each book had a copyright monitor that reported when and where it was read, and by whom, to Central Licensing. They used this information to catch reading pirates, but also to sell personal interest profiles to retailers. The next time his computer was networked, Central Licensing would find out. He, as computer owner, would receive the harshest punishment-for not taking pains to prevent the crime. But Dan knew she came from a middle-class family and could hardly afford the tuition, let alone her reading fees. Later on, Dan would learn there was a time when anyone could go to the library and read journal articles, and even books, without having to pay. There were independent scholars who read thousands of pages without government library grants. But in the 1990s, both commercial and nonprofit journal publishers had begun charging fees for access. By 2047, libraries offering free public access to scholarly literature were a dim memory. There were ways, of course, to get around the SPA and Central Licensing. Dan had had a classmate in software, Frank Martucci, who had obtained an illicit debugging tool, and used it to skip over the copyright monitor code when reading books. But he had told too many friends about it, and one of them turned him in to the SPA for a reward students deep in debt were easily tempted into betrayal. In 2047, Frank was in prison, not for pirate reading, but for possessing a debugger. Dan would later learn that there was a time when anyone could have debugging tools. There were even free debugging tools available on CD or downloadable over the net. But ordinary users started using them to bypass copyright monitors, and eventually a judge ruled that this had become their principal use in actual practice. Programmers still needed debugging tools, of course, but debugger vendors in 2047 distributed numbered copies only, and only to officially licensed and bonded programmers. The debugger Dan used in software class was kept behind a special firewall so that it could be used only for class exercises. It was also possible to bypass the copyright monitors by installing a modified system kernel. Dan would eventually find out about the free kernels, even entire free operating systems, that had existed around the turn of the century. But not only were they illegal, like debuggers-you could not install one if you had one, without knowing your computers root password. And that she chose him to ask for help, that could mean she loved him too. Dan resolved the dilemma by doing something even more unthinkable-he lent her the computer, and told her his password. This way, if Lissa read his books, Central Licensing would think he was reading them. It was still a crime, but the SPA would not automatically find out about it. Of course, if the school ever found out that he had given Lissa his own password, it would be curtains for both of them as students, regardless of what she had used it for. School policy was that any interference with their means of monitoring students computer use was grounds for disciplinary action. It didnt matter whether you did anything harmful-the offense was making it hard for the administrators to check on you. They assumed this meant you were doing something else forbidden, and they did not need to know what it was. Instead they were banned from the school computer systems, and would inevitably fail all their classes. Later, Dan would learn that this kind of university policy started only in the 1980s, when university students in large numbers began using computers. Previously, universities maintained a different approach to student discipline; In the US, the 1998 Digital Millenium Copyright Act established the legal basis to restrict the reading and lending of computerized books and other data too. The European Union imposed similar restrictions in a 2001 copyright directive. Until recently, there was one exception: the idea that the FBI and Microsoft will keep the root passwords for personal computers, and not let you have them, was not proposed until 2002. In 2001, Disney-funded Senator Hollings proposed a bill called the SSSCA that would require every new computer to have mandatory copy-restriction facilities that the user cannot bypass. Following the Clipper chip and similar US government key-escrow proposals, this shows a long-term trend: computer systems are increasingly set up to give absentees with clout control over the people actually using the computer system. The SSSCA has since been renamed to the CBDTPA think of it as the Consume But Dont Try Programming Act. In 2001 the US began attempting to use the proposed Free Trade Area of the Americas treaty to impose the same rules on all the countries in the Western Hemisphere. The FTAA is one of the so-called free trade treaties, actually designed to give business increased power over democratic governments; Using methods reminiscent of the erstwhile Soviet Union, it invites people to inform on their coworkers and friends. A BSA terror campaign in Argentina in 2001 made veiled threats that people sharing software would be raped in prison. When this story was written, the SPA was threatening small Internet service providers, demanding they permit the SPA to monitor all users. Most ISPs surrender when threatened, because they cannot afford to fight back in court. At least one ISP, Community ConneXion in Oakland CA, refused the demand and was actually sued. The SPA later dropped the suit, but obtained the DMCA which gave them the power they sought. The university security policies described above are not imaginary. For example, a computer at one Chicago-area university prints this message when you log in quotation marks are in the original: This system is for the use of authorized users only. Individuals using this computer system without authority or in the excess of their authority are subject to having all their activities on this system monitored and recorded by system personnel. In the course of monitoring individuals improperly using this system or in the course of system maintenance, the activities of authorized user may also be monitored. Anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of illegal activity or violation of University regulations system personnel may provide the evidence of such monitoring to University authorities and/or law enforcement officials. This is an interesting approach to the Fourth Amendment: pressure most everyone to agree, in advance, to waive their rights under it. References The administrations White Paper: Information Infrastructure Task Force, Intellectual Property and the National Information Infrastructure: The Report of the Working Group on Intellectual Property Rights 1995. An explanation of the White Paper: The Copyright Grab , Pamela Samuelson, Wired, Jan.
Cache (81 bytes)
www.misfits.com -> www.misfits.com/
Misfits logos & TM Cyclopian Music Inc. All rights reserved. All rights reserved.