Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:hackerz (Score 1) 86

You are exactly correct Sir. Any hacker worth his or her salt would use ANOTHER PERSONS NETWORK, on a CLEAN COMPUTER. But we all know that of course, and this isn't any surpise to any of us that some non-anonymous hacker is now under investigation...

Comment Re:Would fruit of the poisonous tree play into thi (Score 1) 262

Yeah. That's not a problem. The law isn't to prevent the infringer from gaining, but to prevent the copyright/trademark holder from losing. They still owe the copyright holder for damages done (assuming they're found to be infringing).

Right, and the current number of users they have are using their program, instead of something made by the original copyright holder, because they (may have) violated copyright. It could be argued that all past, and future, income was derived because of their copyright violation... Also, in civil court, you only need to prove the possibility that this is the case.

Slashdot Top Deals

A budget is just a method of worrying before you spend money, as well as afterward.

Working...