Μετάβαση στο κύριο περιεχόμενο

It's Now Legal to Crack Your PC Games

New DMCA rules make it legal to rip your DVDs, jailbreak and unlock your phones too.

The Digital Millennium Copyright Act (DMCA) got a big revision today that will likely change the way that users may lawfully use and enjoy the products and media that they own.
Today the Librarian of Congress announced DMCA Section 1201, which adds six provisions whereby "persons who circumvent access controls in order to engage in noninfringing uses of works in these six classes will not be subject to the statutory prohibition against circumvention."
Essentially, it comes down to this:
  1. People may now rip DVDs to show clips for educational purposes, criticism, commentary and noncommercial videos.
  2. People may now legally jailbreak their iPhones and root their Android phones without fear that a corporation will rain down upon them.
  3. People may now legally unlock their cell phones.
    (These first three are mostly the result of lobbying from the Electronic Frontier Foundation.)
  4. People may now circumvent the copy protection of PC and video games for investigative reasons. This should be a great thing for PC gamers sick of dealing with the DRM of the games they legally purchased.
  5. People may now get past software that's protected by an outdated hardware dongle.
  6. People may now break past ebooks that don't allow the text to be read aloud.
The official listing of the six classes of works are:


(1) Motion pictures on DVDs that are lawfully made and acquired and that are protected by the Content Scrambling System when circumvention is accomplished solely in order to accomplish the incorporation of short portions of motion pictures into new works for the purpose of criticism or comment, and where the person engaging in circumvention believes and has reasonable grounds for believing that circumvention is necessary to fulfill the purpose of the use in the following instances:
(i) Educational uses by college and university professors and by college and university film and media studies students;
(ii) Documentary filmmaking;
(iii) Noncommercial videos

(2) Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset.
(3) Computer programs, in the form of firmware or software, that enable used wireless telephone handsets to connect to a wireless telecommunications network, when circumvention is initiated by the owner of the copy of the computer program solely in order to connect to a wireless telecommunications network and access to the network is authorized by the operator of the network.
(4) Video games accessible on personal computers and protected by technological protection measures that control access to lawfully obtained works, when circumvention is accomplished solely for the purpose of good faith testing for, investigating, or correcting security flaws or vulnerabilities, if:
(i) The information derived from the security testing is used primarily to promote the security of the owner or operator of a computer, computer system, or computer network; and
(ii) The information derived from the security testing is used or maintained in a manner that does not facilitate copyright infringement or a violation of applicable law.

(5) Computer programs protected by dongles that prevent access due to malfunction or damage and which are obsolete. A dongle shall be considered obsolete if it is no longer manufactured or if a replacement or repair is no longer reasonably available in the commercial marketplace; and
(6) Literary works distributed in ebook format when all existing ebook editions of the work (including digital text editions made available by authorized entities) contain access controls that prevent the enabling either of the book’s read-aloud function or of screen readers that render the text into a specialized format.

Πηγή

Σχόλια

Δημοφιλείς αναρτήσεις από αυτό το ιστολόγιο

Mafia 2 Locations Of Wanted Posters

Wanted Poster # 1 – Lubomir Dekan Location: Kingston You will find this Wanted Poster on a wooden privacy fence in a dead-end alley adjacent to a large parking lot. Wanted Poster # 2 – Lubos Kresta Location: Kingston You will find this Wanted Poster on a wall in a narrow dead-end alley with an entry gate. It is to the right of a large dumpster. Wanted Poster # 3 – Lubor Cerny Location: Kingston You will find this Wanted Poster on a brick wall in a small nook in a parking lot. This small nook is adjacent to a large dumpster. Wanted Poster # 4 – Lukas Berka Location: Kingston You will find this Wanted Poster on a wooden fence behind a dumpster. This is across the street from the Pub Tara in an alley beside a Swift Cola billboard on a garage. Wanted Poster # 5 – Matous Jezek Location: Dipton You will find this Wanted Poster on the back of a building in a gated alley and near a large dumpster. Wanted Poster # 6 – Martin Zavrel Location: Dipton You will ...

Mafia 2 Playboy Magazines locations guide

Chapter 1 has 0 Playboy Magazines. Chapter 2 has 2 Playboy Magazines: Playmate 1 – You will find this magazine on the edge of Joe’s coffee table. Playmate 3 – You will find this magazine on top of a shelf inside the three-car garage adjacent to Mike’s main shop. Chapter 3 has 5 Playboy Magazines: Playmate 18 – You will find this magazine on the floor just outside of Derek Papalardo’s Office. You will spot this as you follow Steve down to the first floor to start your manual labor job. Playmate 4 – You will find this magazine behind the entry doorway of Maria Angello’s apartment. It is to the left of a small shelf. Playmate 5 – You will find this magazine on the windowsill closest to the doorway in the Industrial Specialist Office. This is just across the hallway from the Director’s Office where you get the key from. Playmate 40 – You will find this magazine on the edge of the security guard desk in the main hall on the first floor. Playmate 6 – You will find this magazine on...

Copyright enforcement firm ACS:Law hit by embarrassing email leak

It's the weekend and Broadband Genie is enjoying a well-deserved break, but this story was too good to wait until Monday. ACS:Law, the infamous law firm which has been sending out dubious letters threatening to take people to court for file sharing, has had a massive database of its emails leaked onto the web. The ACS:Law web site was taken down by a denial of service (DDoS) attack earlier in the week, an event described by boss Andrew Crossley as "typical rubbish from pirates" . He's likely to have changed his tune now because someone discovered that before the site was restored a backup file containing the emails had been left in an open directory. Inevitably this was downloaded and widely distributed on file sharing networks. The collection includes the incoming and outgoing emails of Andrew Crossley and his employees, complete with attachments, and contains masses of information about how ACS:Law goes about its business and how much money it make...