Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Comment Re:hackerz (Score 1) 86

You are exactly correct Sir. Any hacker worth his or her salt would use ANOTHER PERSONS NETWORK, on a CLEAN COMPUTER. But we all know that of course, and this isn't any surpise to any of us that some non-anonymous hacker is now under investigation...

Comment Re:Would fruit of the poisonous tree play into thi (Score 1) 262

Yeah. That's not a problem. The law isn't to prevent the infringer from gaining, but to prevent the copyright/trademark holder from losing. They still owe the copyright holder for damages done (assuming they're found to be infringing).

Right, and the current number of users they have are using their program, instead of something made by the original copyright holder, because they (may have) violated copyright. It could be argued that all past, and future, income was derived because of their copyright violation... Also, in civil court, you only need to prove the possibility that this is the case.

Slashdot Top Deals

"One day I woke up and discovered that I was in love with tripe." -- Tom Anderson