Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Privacy

Sony DRM Installs a Rootkit? 801

An anonymous read writes "SysInternals.com guru Mark Russinovich has a detailed investigation of a rootkit from Sony Music. It's installed with a DRM-encumbered music CD, Van Zant's "Get Right with the Man". (Mmmm, delicious irony!) The rootkit introduces several security holes into the system that could be exploited by others, such as hiding any executable file that starts with '$sys$'. Russinovich also identifies several programming bugs in the method it uses to hook system calls, and chronicles the painful steps he had to take to 'exorcise the daemon' from his system." This house is clear.
This discussion has been archived. No new comments can be posted.

Sony DRM Installs a Rootkit?

Comments Filter:
  • by redshadow01 ( 113325 ) * on Monday October 31, 2005 @07:11PM (#13919128)
    RTFA, the EULA does not mention this at all...the writer of the article made a specific point with respect to this.
  • Re:My question: (Score:5, Informative)

    by interiot ( 50685 ) on Monday October 31, 2005 @07:16PM (#13919167) Homepage
    The rootkit is by First 4 Internet [first4internet.co.uk]. It's possible that Sony simply purchased this DRM from this outside company, not realizing that the DRM contained a rootkit.

    Still, one would hope that Sony would only choose reputable suppliers, ones who wouldn't allow a virus/trojan to be distributed intentially or even through neglect.

  • Re:But... (Score:3, Informative)

    by kuzb ( 724081 ) on Monday October 31, 2005 @07:16PM (#13919169)
    Often times you're not presented with a choice. The first time you insert a CD, it will autoplay - this is when this crap makes it in. I know you can shut that feature off, but most people either don't knwo how, or won't.
  • Re:OS's fault (Score:3, Informative)

    by LLuthor ( 909583 ) <lexington.luthor@gmail.com> on Monday October 31, 2005 @07:19PM (#13919187)
    These kind of changes can only be made with changes to the driver model.

    They can't make it impossible to do this kind of thing on 32-bit versions of Windows (without breaking A LOT of drivers and programs), but on all 64-bit Windows versions this is already impossible.
  • TIme to... (Score:4, Informative)

    by heinousjay ( 683506 ) on Monday October 31, 2005 @07:19PM (#13919194) Journal
    Turn off autorun [annoyances.org].
  • by RingDev ( 879105 ) on Monday October 31, 2005 @07:21PM (#13919206) Homepage Journal
    Being a root kit just means that the program works at the OS level, USUALLY in such a way that the end user will not notice it, nor will virus detectors flag it. It changes something about "Windows" as opposed to adding something to it. (over simplified)

    The arbitrary code in this case is installed when you hit 'OK'.

    -Rick
  • by abscondment ( 672321 ) on Monday October 31, 2005 @07:23PM (#13919218) Homepage

    You're confusing the terms "rootkit" and "trojan"/"backdoor".

    A trojan in its strictest sense tricks a user into executing one set of code when they think they're executing another. A backdoor simply allows remote execution of arbitrary code.

    A rootkit is usually the set of tools that an attacker deploys on a compromised system. "rootkits" in the terms of this article are programs that trick your kernel into doing things it shouldn't do. This could include a trojan or a backdoor, but not necessarily.

    Sony's program is a rootkit because it runs without authorization from the CD and alters the Windows API in order to disguise itself. As far as the article indicates, it doesn't include the ability for Sony to execute code on your machine. It's still dirty and sinister, if you ask me. It also allows any other malicious attackers to conceal anything they plant on your machine - simply by prefixing any file name with $sys$ - that's not cool!

  • Re:OS's fault (Score:5, Informative)

    by speeDDemon (nw) ( 643987 ) on Monday October 31, 2005 @07:28PM (#13919262) Homepage

    Trusted Computing...

    I think this lil video on Trusted Computing [lafkon.net] is perfect at explaining trusted computing.

    I leave it running on the computers on display in my store. Hopeing that I can educate enough people in my small section of the world about the follies they are about to embark on.

  • by LM741N ( 258038 ) on Monday October 31, 2005 @07:30PM (#13919278)
    You can't enter into a contract which violates the law. Thus a "contract killing" is not a valid contract.
  • Re:OS's fault (Score:4, Informative)

    by dtfinch ( 661405 ) * on Monday October 31, 2005 @07:31PM (#13919288) Journal
    They at least ought to turn off the seriously insecure by design autorun feature by default.
  • Re:But... (Score:4, Informative)

    by WWWWolf ( 2428 ) <wwwwolf@iki.fi> on Monday October 31, 2005 @07:32PM (#13919296) Homepage
    Yes, some people DO install the stuff that comes with their CD's, because sometimes that "crap" gives them the ability to rip so many licensed copies of the song to share with friends.

    After being presented with a sell-your-babies-to-the-almighty-record-label EULA, and before shoving awfully encoded WMA format files down their throats.

    Hint #1: There's no "copy protection" on CDs. For most parts, it's misshapen multi-session CDs. cdrdao read-cd --session 1 ... Hint #2: If you're encoding the files to MP3, Vorbis or, good heavens, WMA, digital rips are wayyyy overrated and plain old CD player, analog RCA-to-RCA cable and an audio recorder app can do really wonders. =)

  • by burnsy ( 563104 ) on Monday October 31, 2005 @07:36PM (#13919330)
    "What is next? Drm that will rewrite your bios and turn your pc into an expensive doorstop for copyright violation?"

    Yes, look for it in your next Blu-Ray Disc Player.

    http://www.engadget.com/entry/1234000737057152/ [engadget.com]

    "On top of that, consumers should expect punishment for tinkering with their Blu-ray players, as many have done with current DVD players, for instance to remove regional coding. The new, Internet-connected and secure players will report any "hack" and the device can be disabled remotely."

  • by Anonymous Coward on Monday October 31, 2005 @07:36PM (#13919336)
    Article 7. DAMAGES ARISING OUT OF YOUR ACTIONS

    You shall defend and hold the SONY BMG PARTIES harmless from and against any and all liabilities, damages, costs, expenses or losses arising out of your use of the LICENSED MATERIALS, your negligent or wrongful acts, your violation of any applicable laws or regulations, and/or your breach of any provision of this EULA.
  • Re:Could be . . . (Score:3, Informative)

    by crimethinker ( 721591 ) on Monday October 31, 2005 @07:41PM (#13919369)
    Actually, I think the guy violated the DMCA by circumventing the copyright protection technology.

    Because I think the DMCA is a ridiculously bad piece of law, I would like to see Mark prosecuted for violating it, so that people can see just how bad it is.

    -paul

  • by WWWWolf ( 2428 ) <wwwwolf@iki.fi> on Monday October 31, 2005 @07:41PM (#13919370) Homepage

    I think the article provided enough evidence as is. Yes, it is "DRM shovelware", which is an offense in itself. Yes, it's hard to uninstall, which is bad. But it's also trying to hide itself, which is really nasty, and it hides stuff indiscriminately, which is worse.

    It is a rootkit, because it messes with the OS to hide specific files. It is a dangerous rootkit, because it hides all files that start with some prefix, not just the specific files used by the DRM mechanism - this could be potentially used to hide more mischief from the same source.

  • by sakusha ( 441986 ) on Monday October 31, 2005 @07:41PM (#13919371)
    You obviously didn't read the article very closely. Sony patched the CD/DVD drivers, Sony's code runs every time you access the drive. He didn't disassemble the entire driver so there is no clear indication that it doesn't contain security problems (whether by incompetence like a buffer overflow, or a deliberate backdoor) that would allow arbitrary code to run. There is no way to audit the code for security, it is probably illegal under the DMCA to disassemble and fully analyze DRM code in sufficient detail for a full code audit
    THAT is the biggest problem with these windoze DRM hacks. You can secure your system with all the technology at your disposal, but it means nothing when you are tricked into running a rootkit disguised as DRM. Then you have to trust the DRM vendor did not make any mistakes that expose you to further security risks.

    People like to gripe about Apple's DRM, but at least they know better than to pull crap like this.
  • Not very good DRM (Score:2, Informative)

    by oboreruhito ( 925965 ) on Monday October 31, 2005 @07:44PM (#13919397)
    It's worth noting that the DRM in question, which prevents a CD from being ripped into an iPod-compatible format, can be circumvented by the following step:

    1.) Insert CD into a Macintosh

    (And yes, little Timmy, Linux/BSD/FreeDOS/whatever)
  • Re:Didn't Notice? (Score:3, Informative)

    by HTH NE1 ( 675604 ) on Monday October 31, 2005 @07:46PM (#13919418)
    Amazon has been known to alter the titles of products in their catalog. However, in my experience the copy of the title in one's order history does not get revised (I make many preorders).

    Mark Russinovich should check his order history for the presence of that text there to determine if it was present at the time he ordered.
  • The problem with rootkits is that once you've been infected, there's no way to clean the infection without booting to another OS.

    For a great movie showing the author of hacker defender defeating most all of the current rootkit-defeating programs see the following link:
    http://www.hxdef.org/download/brilliant.php [hxdef.org]

  • by nmb3000 ( 741169 ) on Monday October 31, 2005 @07:50PM (#13919456) Journal
    corporations exploit YOU!

    Insightful indeed.

    The thing is that there is more than a corporation here. The artist that chose to sign with Sony is now going to feel the repercussions of this dirty little trick Sony tried to play. Do you think that Sony really cares if they loose a few sales of this one CD because they got caught red-handed? Of course not.

    These record labels are not only exploiting the consumer, but they are screwing over the artists that depend on them for advertising and distribution. Here is contact information [thevanzants.com] for Van Zant [thevanzants.com]. Let them know that you're pissed. Let them know you won't be buying their CD. Let them know that they were screwed by Sony. While you're at it, why not let First4Internet [first4internet.com] know that you hate them and hope they burn in Hell for writing malware like this. A few thousand emails will do wonders for these jerks.

    If enough artists move away from these corporate labels it can only mean good things for the consumers. It's not impossible for this to happen, just extremely difficult.
  • Re:FTA (Score:3, Informative)

    by ScytheBlade1 ( 772156 ) <scytheblade1@NOsPam.averageurl.com> on Monday October 31, 2005 @07:51PM (#13919468) Homepage Journal
    This guy is without a doubt, one of the most knowledgable about the internals of ANY Microsoft OS. He (and his company) have written more top-notch, high grade software than any other company out there (for purposes of exploring just what is on your computer, remote administration, and "peeking under the hood").

    On top of that, a majority of their tools are completly free, light, and do the job WELL.

    They have tools made to defragment your registry hives, to actually execute a process as another user (don't mention "runas", their stuff takes it to another level), monitor the registry hives for changes, and this disturbingly well-done root kit revealer.

    Sysinternals is god when it comes to actually looking at what is wrong with a MS OS, and there's no way around it.
  • This house is... (Score:2, Informative)

    by m0nstr42 ( 914269 ) on Monday October 31, 2005 @08:01PM (#13919551) Homepage Journal
    ... CLEAN [imdb.com].
  • by FidelCatsro ( 861135 ) * <.fidelcatsro. .at. .gmail.com.> on Monday October 31, 2005 @08:02PM (#13919556) Journal
    Even if the EULA were to be a valid contract (which it isn't in many places , and probably isn't in many others)
    A contract can not exempt any party from an act which contravenes any current laws.
      To quote the UK Sale of goods act 2002
    48A Introductory
     
        (1) This section applies if -
     
    (a) the buyer deals as consumer or, in Scotland, there is a consumer contract in which the buyer is a consumer, and
     
    (b) the goods do not conform to the contract of sale at the time of delivery.
     
        (2) If this section applies, the buyer has the right -
     
    (a) under and in accordance with section 48B below, to require the seller to repair or replace the goods, or
     
    (b) under and in accordance with section 48C below -
     
    (i) to require the seller to reduce the purchase price of the goods to the buyer by an appropriate amount, or
     
    (ii) to rescind the contract with regard to the goods in question.
     
        (3) For the purposes of subsection (1)(b) above goods which do not conform to the contract of sale at any time within the period of six months starting with the date on which the goods were delivered to the buyer must be taken not to have so conformed at that date.
     
        (4) Subsection (3) above does not apply if -
     
    (a) it is established that the goods did so conform at that date;
     
    (b) its application is incompatible with the nature of the goods or the nature of the lack of conformity.
     
        48B Repair or replacement of the goods
     
        (1) If section 48A above applies, the buyer may require the seller -
     
    (a) to repair the goods, or
     
    (b) to replace the goods.
     
        (2) If the buyer requires the seller to repair or replace the goods, the seller must -
     
    (a) repair or, as the case may be, replace the goods within a reasonable time but without causing significant inconvenience to the buyer;
     
    (b) bear any necessary costs incurred in doing so (including in particular the cost of any labour, materials or postage).
     
        (3) The buyer must not require the seller to repair or, as the case may be, replace the goods if that remedy is -
     
    (a) impossible, or
     
    (b) disproportionate in comparison to the other of those remedies, or
     
    (c) disproportionate in comparison to an appropriate reduction in the purchase price under paragraph (a), or rescission under paragraph (b), of section 48C(1) below.
     
        (4) One remedy is disproportionate in comparison to the other if the one imposes costs on the seller which, in comparison to those imposed on him by the other, are unreasonable, taking into account -
     
    (a) the value which the goods would have if they conformed to the contract of sale,
     
    (b) the significance of the lack of conformity, and
     
    (c) whether the other remedy could be effected without significant inconvenience to the buyer.
     
        (5) Any question as to what is a reasonable time or significant inconvenience is to be determined by reference to -
     
    (a) the nature of the goods, and
     
    (b) the purpose for which the goods were acquired.
    Sony did not mention this at the point of sale and therefor would be liable for repair of the problem .. IANAL but this is my interpretation of this part of the act

  • by MikkoApo ( 854304 ) on Monday October 31, 2005 @08:15PM (#13919646)
    Autorunning executables from cds' autorun.inf is the default action in some of Microsoft's OSes.
  • Re:My question: (Score:2, Informative)

    by Anonymous Coward on Monday October 31, 2005 @08:18PM (#13919655)
    From the Cnet article about First4Internet, http://news.cnet.co.uk/digitalmusic/0,39029666,391 89658,00.htm>
    First4Internet's XCP has been used previously on prerelease CDs only. Sony BMG is the first to commercially deploy XCP. First4Internet's other clients -- who include Universal Music Group, Warner Music Group and EMI -- are using XCP for prerelease material. Sony BMG expects that by the end of the year a substantial number of its US releases will employ either MediaMax or XCP.
    The particular steps taken to conceal this and make it impossible for a non-professional to remove qualify clearly as a rootkit, although not perhaps as malware. The exposure of Sony customers' computers is also a concern - here's a ready-made shield for malware from whatever antivirus they might be running.
  • by frogstar_robot ( 926792 ) <frogstar_robot@yahoo.com> on Monday October 31, 2005 @08:21PM (#13919682)
    Remember recently one of our esteemed elected officials (in the USA that is) who wanted the ability to physically remotely destroy the pc of someone infringing on copywrighted material? I don't want to name the name because I'm not sure which one it was. The whackjob in question is Orrin Hatch.
  • by rpdillon ( 715137 ) * on Monday October 31, 2005 @08:24PM (#13919698) Homepage
    As I said above, any software that patches the kernel's system service table to redirect system calls to trojan software without permission while hiding (and making itself impossible for your average user to remove) is a rootkit. It only makes it worse that it *never stops running* and *starts up even in safe mode*. These are all hallmarks of a rootkit. Just because it doesn't send spam and all your passwords/credit card numbers to a server in Russia doesn't mean it isn't a rootkit.
  • by Anonymous Coward on Monday October 31, 2005 @08:41PM (#13919803)
    I think the parent's point is that Windows is pretty much crippled unless you run as a local admin, thus forcing you to be 'root', thus exposing you to system level compromise.
  • by ezzzD55J ( 697465 ) <slashdot5@scum.org> on Monday October 31, 2005 @08:42PM (#13919810) Homepage
    So should I sell all of my Sony stock, or buy more?

    Offtopic, but..
    If you think a stock will move but don't know in which direction, buy get and put options at the current price. They'll be in the money after any significant stock movement. Called a Long Straddle [riskglossary.com].

  • by sakusha ( 441986 ) on Monday October 31, 2005 @08:46PM (#13919829)
    Yes, I've read the DMCA. The specific clause about security testing is rather vague. It allows security testing, but only up to a point of "infringement" (whatever that means). This hasn't been tested in court AFAIK but even prominent security researchers are afraid of it. The way I read it (IANAL) is that you can security test it up to the point where you disassemble it enough to discover how to break the DRM, and ANY code audit that could find security holes would cross that line.
  • by Anonymous Coward on Monday October 31, 2005 @08:46PM (#13919831)
    At least as far as Phillips are concerned, anyway.
  • by shibashaba ( 683026 ) <<gro.abahsabihs> <ta> <erehtih>> on Monday October 31, 2005 @09:01PM (#13919944)
    Consumer puts a cd into their computer with the intention of playing the cd. The cd takes advantage of a feature in Windows and installs software in the background without your knowledge. No court would find Sony not liable for damagaes caused because the user didn't disable autorun. It's the same as an email viruses, just because the user never turned off macros doesn't let the person who runs the virus off the hook.

    This isn't the first time Sony's had this idea. Years ago they asked someone to write a virus to subliminally provide marketing to people. This motivated the person they asked to write a book called Coercion.
  • by qeveren ( 318805 ) on Monday October 31, 2005 @09:05PM (#13919967)
    It indescriminately hides any file beginning with "$sys$". Not just its own files. Any file. Now tell me this isn't a rootkit.
  • by Braedley ( 887013 ) on Monday October 31, 2005 @09:19PM (#13920044)
    It's an autorun. If you aren't fully forewarned (like I was for another of Sony's CDs), you have no choice but to install the software. Also, although it's hear-say, there are some specifics about the software that isn't mentioned in the EULA (which, for once, I did read (well, at least some of it)). And if I'm not mistaken, there is some DRM software installed before you even agree to the EULA, just so that if you don't agree, you can't go back and do it properly.
  • Re:OS's fault (Score:4, Informative)

    by Antique Geekmeister ( 740220 ) on Monday October 31, 2005 @09:28PM (#13920093)
    No, "Trusted Computing" is not designed to prevent this. It is designed to *enforce* it. By having an appropriately signed application, required to access appropriately signed and controlled hardware such as your CD or DVD drive or appropriately encrypted files found on your CD, DVD, or downloaded files, it's designed to prevent you from accessing content in your files or on your systems without the signed license keys from the vendor.
  • Re:OS's fault (Score:3, Informative)

    by slashknott ( 927394 ) on Monday October 31, 2005 @09:53PM (#13920225)

    Run as a regular user. Users group.

    Then, if (when) you need to install something, or run a program that needs administrative privileges, right click it and "Run as" Administrator (or user with administrative privileges).

    This is the same kind of thing as 'sudo' in linux.

    You'll get a lot less shit on your system this way, still not perfect but better.

  • Copiable? (Score:3, Informative)

    by mattr ( 78516 ) <mattr&telebody,com> on Monday October 31, 2005 @11:09PM (#13920656) Homepage Journal
    This seems to be the copy protection mentioned here [engadget.com] where they say Sony BMG will email you instructions on how to defeat the protection if you complain. Also in a comment on that page:
    I wrote BMG and asked for the instructions, here's what they said: To get around the DRM you have to install their software so you can access the pre-ripped WMA files they've "generously" provided on the disc. Then you hafta burn the WMA files to yet another CD in order to re-rip them into iTunes.
    TFA says drm software required for playing, someone else suggests it can be played through iTunes.

    Is this CD playable without the drm software after using cdparanoia or some other tool? SonyBMG is now added to my list of labels not to buy due to copy protection, which previously included ToshibaEMI and Avex Trax for their (cdparanoia breakable) copy protection. In fact I don't buy CDs any more, I just keep a copy of cdparanoia around because sometimes people give me CDs as presents and often they seem to have some kind of copy garbling, erm protection.

  • by laughingcoyote ( 762272 ) <(moc.eticxe) (ta) (lwohtsehgrab)> on Tuesday November 01, 2005 @12:03AM (#13920904) Journal

    I'm not sure what jurisdiction -you're- in, but the last I checked anywhere, those general "not our fault" clauses don't mean a thing against something done intentionally. If you are with full awareness doing something malicious, that is a totally different animal then accidentally releasing bugged software, and "not our fault" won't even begin to protect them.

  • by plilja ( 91030 ) on Tuesday November 01, 2005 @12:27AM (#13920992)
    Actually, many folks misread this section of the DMCA. The DMCA allows an individual to circumvent copy protection for thier own use through the "fair use" provision.

    What it prohibits is the disemination of knowlege and tools on how to circumvent copy protection.

    Anyone is free to do anything they want to rid themselves of any copy protection on media they own...as long as they keep the knowlege of it entirely to themselves. (There are some exceptions for encryption research and, to a lesser extent security research, as well)
  • by gstoddart ( 321705 ) on Tuesday November 01, 2005 @12:47AM (#13921093) Homepage
    They don't put it there. You do. They just packaged it for you. If you didn't want to give them permission to run arbitrary executables on your computer, then WHY DID YOU RUN THEIR EXECUTABLE??

    See, the problem with this is you did not give them permission. You didn't even run their executable. It happened without your expectation, knowledge, or consent.

    You popped in what you thought was a nice little audio CD. Because Microsoft has been configured to run the software on these CDs by default, you end up running it -- that's not permission. When you put in an audio CD, you expect to hear, well, music. Not to have something installed on your computer which compromises its security.

    You can't say that someone accepted terms of use when Microsoft, acting in conjunction with these companies, decided that what needs to happen is that any CD with executable code on it needs to be executed blindly and without user confirmation.

    For the vast majority of users, playing a CD in their computer is shockingly like playing a CD in their CD player. It is neither a tacit nor an explicit agreement to run any and all software they may have installed on it.

    It is a complete mis-representation to claim that you gave permission for them to do anything they wanted to do with it. If I open my door to a solicitor, that doesn't give them the right to enter my home and do anything they damned well please.

    This absurbd notion that what is, in effect, trojan software has been accepted by the user simply because they decided to play an audio CD in their computer is complete and utter tripe. And saying that you "should have known better" is a complete cop-out -- we already know that the vast majority of computer users simply lack the knowledge to prevent this sort of thing. Especially when the OS manufacturer has decided a priori for you that is what will happen.

    Now, if they put in big honking letters on the CD case that if you play this CD on a Windows machine, software will be installed on your machine, your argument might have merit. But the simple fact that it is NOT spelled out in big font, means that, for all intents and purposes, this is a trojan.

    Imagine extending this totally absurd argument to credit cards -- 'by handing your credit card to the waiter to pay your bill, you tacitly agree to paying for the staff trip to Aruba'; Oh, didn't know? How dare you? It's a bullshit argument in either case, because you imply consent where, clearly, none was given.

    In either case, you show me where the user has actually agreed to anything, and your point might be valid. Otherwise, it's after-the-fact rationalization based on the absurd notion that the user knew what would happen.

    Now, I realize as I'm writing this that your ID lists you as Andrew Tanenbaum -- so I'm forced to conclude one of two things -- 1) It's a popular, but misleading name on Slashdot, or 2) the Great Andrew Tanenbaum has absolutely no clue about what is reasonable for a company to do to the end-users machines. In either case, I'm not impressed. If 2), then you're just a standard Slashdot schmoe, and I expect nothing more, but you're still misinformed. If it truly is 1), then I've lost a great deal of respect for you -- because a professor of this stuff should know better, because you bloody well get paid to be informed about this stuff. Asserting that you somehow gave permission somewhere in that process is utter crap! An agreement I was never shown is null-and-void.

    Cheers

  • by lavaface ( 685630 ) on Tuesday November 01, 2005 @01:39AM (#13921338) Homepage
    I hope you are just talking about RIAA discs, because there's a ton of stuff being produced by small, independent artists that could use your support.
  • by Technician ( 215283 ) on Tuesday November 01, 2005 @03:49AM (#13921761)
    return this CD by mail to SONY BMG in a thousand tiny pieces, but not before I copy it and distribute out of sheer spite.

    Never admit that publicly. DMCA, RIAA, Evidence, I hope you weren't serious. These are not nice guys to deal with.

    If you admit it, do it from a public terminal as an AC.
  • by irw ( 204684 ) on Tuesday November 01, 2005 @05:41AM (#13922086)
    the Computer Misuse Act 1990 [opsi.gov.uk] has three charges:

    1. unauthorised access
    2. unauthorised access with intent to commit or facilitate commission of further offences [my emphasis]
    3. unauthorised modification

    therefore, if the rootkit opens back doors, or makes it possible to hide programs, charge #2 applies.

  • by Alsee ( 515537 ) on Tuesday November 01, 2005 @06:44AM (#13922236) Homepage
    I don't know why this idea keeps cropping up, and particularly why it got modded to 5. The DMCA most certainly does NOT permit circumvention for Fair Use purposes.

    US Law Title 17 section 1201: [cornell.edu]
    Circumvention of copyright protection systems
    (a) Violations Regarding Circumvention of Technological Measures.--
    (1) (A) No person shall circumvent a technological measure that effectively controls access to a work protected under this title.


    The act of circumvention itself is indeed criminalized by the DMCA.

    Note that the DMCA also says:
    (c) Other Rights, Etc., Not Affected.--(1) Nothing in this section shall affect rights, remedies, limitations, or defenses to copyright infringement, including fair use, under this title.

    That sounds pretty good, right? Except it's pure bullshit, law literally written by lawyers employed by the publishing industry. It means absolutely ZERO. It says it protects/preserves Fair Use defenses to Copyright Infringment. However CIRCUMVENTION CRIME is not copyright infringment. Circumvention crime has absolutely nothing to do with copyright infringment. There is no Fair Use defence to cricumvention crime. So what that section really says is that a NONEXISTANT defence is not affected. It sure sounded nice though, didn't it?

    -
  • Not on Amazon UK (Score:3, Informative)

    by Martin Spamer ( 244245 ) on Tuesday November 01, 2005 @07:01AM (#13922279) Homepage Journal
    There is no warning on the Amazon UK site [amazon.co.uk] for this CD.

    Any rootkit would be clear violation of sections 2 and 3 of the Computer Missuse Act [opsi.gov.uk]. This Act comes from EU treaty obligations so substantially similar legislation exists throughout Europe. The territorial scope of this Act only requires one of the parties to the offense to be in the UK. So buying this from Amazon UK should cover you even if you dont live in the UK.
  • by Decker-Mage ( 782424 ) <brian.bartlett@gmail.com> on Tuesday November 01, 2005 @08:00AM (#13922390)
    For reference, Mark posted the full EULA [sysinternals.com]. Yep, it does have the exclusion but what is even more interesting is the line much earlier. "Once installed, the SOFTWARE will reside on YOUR COMPUTER until removed or deleted." Which is interesting since they went out of their way to insure that you can't uninstall or delete it unless you are a fellow practioner in the Mark Russinovich school of black-belt system administration.
  • Re:Thanks (Score:3, Informative)

    by xtracto ( 837672 ) on Tuesday November 01, 2005 @08:51AM (#13922539) Journal
    If you know about other CD's, feel free to help [slashdot.org].

    The list of CD's so far are:

    Note: I would had preffered to make a nice looking list, but Slashdot was spitting me " Your comment has too few characters per line (currently 36.7)." so I had to remove all the CRLF from my post. Sorry

    Nothing Is Sound. Switchfoot [amazon.com] Unwritten [ENHANCED] Natasha Bedingfield [amazon.com] Ride Shelly Fairchild [amazon.com] 12 Songs Neil Diamond [amazon.com] Touch Amerie [amazon.com] Bloom Remix Album [ENHANCED] Sarah McLachlan [amazon.com] Kasabian Kasabian [amazon.com] The Essential Pete Seeger [ORIGINAL RECORDING REMASTERED] Pete Seeger [amazon.com] Jeru [ENHANCED] [ORIGINAL RECORDING REMASTERED] Gerry Mulligan [amazon.com] imes Like These Buddy Jewell, [amazon.com] Bob Brookmeyer & Friends [ORIGINAL RECORDING REMASTERED] Bob Brookmeyer [amazon.com] Healthy In Paranoid Times [ENHANCED] Our Lady Peace [amazon.com] Cautivo [DUALDISC] Chayanne [amazon.com] The Invisible Invasion Coral, The Coral [amazon.com] Defined Amici Forever [amazon.com] Suspicious Activity [ENHANCED] The Bad Plus [amazon.com] Manhattan Symphonie [ORIGINAL RECORDING REMASTERED] Dexter Gordon [amazon.com] Phantoms Acceptance [amazon.com] On Ne Change Pas Celine Dion [amazon.com] Get Right with the Man Van Zant [amazon.com] To Love Again [ENHANCED] Chris Botti [amazon.com] Life [DUALDISC] Ricky Martin [amazon.com] The Essential Dion [ENHANCED] [ORIGINAL RECORDING REMASTERED] Dion [amazon.com] Faso Latido A Static Lullaby [amazon.com] Change It All Goapele [amazon.com] Susie Suh Susie Suh [amazon.com] My Very Special Guests [ORIGINAL RECORDING REMASTERED] George Jones [amazon.com] Broken Valley Life of Agony [amazon.com] Silver's Blue [ENHANCED] [ORIGINAL RECORDING REMASTERED] Horace Silver [amazon.com] Z [ENHANCED] My Morning Jacket [amazon.com]
  • by Decker-Mage ( 782424 ) <brian.bartlett@gmail.com> on Tuesday November 01, 2005 @09:32AM (#13922725)
    This is one time it pays to RTFA as Russ provides you with the details you need to kill the sucker dead without killing your system. Also read the comments as there is some advice their about how to take ownership of the keys that are registered to LOCAL SYSTEM.

UNIX is hot. It's more than hot. It's steaming. It's quicksilver lightning with a laserbeam kicker. -- Michael Jay Tucker

Working...