home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-04-26 | 92.7 KB | 1,921 lines |
-
- *******************************************************
- ** _______ ____ **
- ** IIIII I IIIII IIIII I I **
- ** I II I I II I I I I____ **
- ** III I III IIIII I I **
- ** I I I I I I I I **
- ** I I I I I I I I____ **
- **keepin' the dream alive **
- *******************************************************
-
- -=> VOLUME 1, ISSUE 1, June, 1989 <=-
-
- **** WELCOME ****
-
- To the first issue of -=* PIRATE *=-!
- Special thanks for getting this issue out go to:
- Jedi
- Spanky
- Jim Richards
- Hatchet Molly
- Chris Robin
- Maxx Cougar
- Taran King
- Knight Lightning
- Flint
- The Man
-
- Any comments, or if you want to contribute, most of us can
- be reached at one of the following boards:
- GREAT ESCAPE (312) 535-2761 >>> PIRATE HOME BOARD
- SYCAMORE ELITE (815) 895-5733
- THE UNDERGROUND (201) 957-1976
- PACIFIC ALLIANCE (818) 280-5710
- BITNET ADDRESS (Chris Robin): TK0EEE1@NIU.BITNET
-
- +++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Our goal is to share knowledge, gossip, information, and tips
- for warez hobbyists.
-
- TABLE OF CONTENTS
-
- *. What's a Pirate?
- *. Pirate Do's and Don'ts
- *. Pirate tips
- *. Why Software ownership is bad for society
- *. Copyright Law
- *. Computer laws in Wisconsin
- *. Editorial: Big Brother in the Computer Room?
- *. Sysop's corner
- *. What's hot, what's not
- *. Wants and Needs
- *. Board Review of the Month: THE GREAT ESCAPE
- *. A few decent boards
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- * * * * SO YOU WANT TO BE A PIRATE? * * * *
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- What's a pirate? COMPUTER PIRACY is copying and
- distribution of copyright software (warez). Pirates are
- hobbyists who enjoy collecting and playing with the latest
- programs. Most pirates enjoy collecting warez, getting them
- running, and then generally archive them, or store them away. A
- PIRATE IS NOT A BOOTLEGGER. Bootleggers are to piracy what a
- chop-shop is to a home auto mechanic. Bootleggers are people who
- DEAL stolen merchandise for personal gain. Bootleggers are
- crooks. They sell stolen goods. Pirates are not crooks, and
- most pirates consider bootleggers to be lower life forms than
- child molesters.
-
- Pirates SHARE warez to learn, trade information, and have fun!
- But, being a pirate is more than swapping warez. It's a life
- style and a passion. The office worker or class mate who brings
- in a disk with a few files is not necessarily a pirate any more
- than a friend laying a copy of the lastest Depeche Mode album on
- you is a pirate. The *TRUE* pirate is plugged into a larger
- group of people who share similar interests in warez. This is
- usually done through Bulletin Board Systems (BBSs), and the
- rule of thumb is "you gotta give a little to get a little...ya
- gets back what ya gives." Pirates are NOT freeloaders, and only
- lamerz think they get something for nothing.
-
- A recent estimate in the Chicago Tribune (March 25, p. VII: 4)
- indicated that computer manufacturers estimate the cost of
- computer piracy at over $4 billion annually. This is absurd, of
- course. Businesses rarely pirate warez, because the penalties for
- discovery do not make it cost effective. Individuals who pirate
- are rarely going to spend several thousand dollars a year for
- warez they generally have little practical use for, and there's a
- lot of evidence that pirates spend more money on warez they
- probably don't need. In fact, pirates may be one of the best
- forms of advertising for quality products, because sharing allows
- a shop-around method for buying warez. Most of us buy a program
- for the documents and the support, but why invest in four or five
- similar programs if we aren't sure which best suits our needs?
- Nah, pirates aren't freeloaders.
-
- Is piracy unethical? It may be illegal, although most states have
- laws providing a grey area between archiving (storing) and use.
- But, is it UNETHICAL? We think not. We challenge the claim that
- pirates cost software manufactures any lost revenue, and will
- argue that they spread the word for high quality products. The
- average person cannot afford the mega-bucks needed to buy Dbase-4
- and Foxbase, and would do without either if forced to buy. But,
- by testing out both, we are able to inform those who WILL buy
- which is better. So, we spread computer literacy, indirectly
- encourage improvements, and keep the market alive. Pirates hurt
- no one, take money from nobody's pocket, and contribute far more
- to the computer industry than they are willing to acknowledge.
-
- How many of us have had mega-fone bills in a month? The
- tele-comm folks must love pirates. No, pirates aren't cheap
- skates. The fun of finding an obscure program for somebody, the
- thrill of cracking a program, the race to see who can be the
- first to upload the latest version--these are the lure of piracy.
- We are collections of information. Unlike those who would keep
- computer literacy to the affluent few, we make it more readily
- available to the masses.
-
- So what's a pirate? A pirate is somebody who believes that
- information belongs to the people. Just as a book can be zeroxed
- or placed in a library to be shared, pirates provide a type of
- library service. The experienced pirate even acts as a tutor in
- helping those who may have purchased warez. We don't bitch about
- serving as unpaid consultants to the computer industry, and we
- don't wouldn't think to request payment for our services. By
- providing a user-friendly network of information sharers, we
- increase computer literacy which is in everybody's mutual
- interests.
-
- The software industry is unlikely to acknowledge (or even
- recognize) the contributions of pirates to their enterprise, and
- continue to view us as "the enemy!" Pirates are not represented
- in legislation and have no strong constituency to challenge
- misrepresentation. PIRATE NEWSLETTER is intended to break down
- the power of media to define us as crooks and outcasts and bring
- us together. By keeping information open and flowing and not
- under the control of a privileged few, we are enhancing democracy
- and freedom of the market place.
-
- PIRATES ARE FREEDOM FIGHTERS KEEPNG THE DREAM ALIVE!
-
- >> *END* <<
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- * * * * PIRATE DOs AND DON'Ts * * **
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- If you want to get on an elite board and stay there, there's
- some things you should do, and some things that are taboo.
- Here's a partial list:
-
- -----
- DO:
- -----
-
- 1. DO make copies from original disks, and be sure to put the
- version of the product in the description.
- 2. DO put "read me" tips in the first disk if there's a trick
- to getting a program working.
- 3. DO put up complete files, NOT partial files, and label
- them as they are on the disk.
- 4. DO put in the file description whether the program is
- cracked or uncracked
- 5. DO read the message section of the boards, and contribute
- when you can. Don't be afraid to ask dumb questions.
- 6. DO make sure you have sufficient space on your hard drive
- or disks when downloading a large file.
- This may sound silly, but it's not unusual especially for
- novices to forget space and botch a download.
- 7. DO make sure to describe whether a program you uploaded
- has special requirements (mouse, math co-processor).
- 8. DO keep up on protocols...use the fastest available.
- Using Xmodem is a sure sign of a lamer.
- 9. DO read the bulletins and check to be sure the board
- doesn't already have a copy of what you are uploading.
- 10. DO use zip comments to specify what a disk is.
- ----------------
- ------
- DONT:
- -----
- 1. DON'T whine and swear at the sysop. You get on a board
- and get more access as you prove yourself deserving.
- 2. DON'T upload .gif files and other programs that are a
- dime a dozen and of little use. Upload what you would like
- to receive.
- 3. DON'T start changing handles for every board. Most BBSers
- are known by one handle, and change only if there is a good
- reason to.
- 4. DON'T phreak to a pirate board. It draws attention to the
- board and makes life miserable for everybody.
- 5. DON'T logoff prematurely. Use the board's logoff command.
- 6. DON'T change the names of a file just to get upload credit.
- This is a sure way to get kicked off any board.
- 7. DON'T start flaming other users. Pirate boards are SHARE
- boards, and most users would rather read some good tips
- and not engage in petty arguments.
- 8. DON'T upload faulty files or incomplete files. Be sure
- it's all there. If it isn't, at least indicate that in the
- file description.
- 9. DON'T blame the sysop for faulty files until you have
- at least tried leaving messages for help.
- 10. DON'T log on just to look around...upload or post something.
- If you don't SHARE, you're taking time away from other
- users.
-
- >> *END* <<
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- * * * * PIRATE TIPS * * * *
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ------------
- DOCUMENTS:
- ------------
-
- Some programs require dox for full use their capabilities.
- There are document files for some programs floating around,
- and if you have any, upload and spread them to your favorite
- boards or use e-mail (bitnet) to get them to friends.
- QUE publishes a variety of texts that in most cases are more
- helpful than the original documentation. These include tips on
- most LOTUS program, dBase-4, Rbase, Q&A, Excell, Wordperfect,
- Word Star, Paradox, DisplayWrite, Microsoft Word, SuperCalc,
- PageMaker, and many, many more. Most large bookstores carry these
- (or will order them), or you can call QUE's order line at
- 1-800-428-5331.
-
- ------------------
- UPLOADING FILES:
- ------------------
-
- One of the biggest hassles is downloading a file only to find
- that it doesn't work or that not all files are included. When
- you upload a program, BE SURE TO use a diskcopy command that
- copies the ENTIRE program, including subdir, label each disk (or
- file) as it appears on the original. If a program is snatched or
- if there are any problems, you should specify when uploading. USE
- THE ZIP COMMENT (pkzip -z /filename) command to label each file.
- So, if you upload a 5 disk set, and if the first disk from the
- original files is the program files, be sure this is the first
- disk you zip and upload. Label it something like MYFILE-1 and in
- the zip command label it as it is labeled on the original.
- NEVER(!!) install a program, especially a large on such as ALDUS,
- and then just zip up the directory into a single multi-meg file
- for uploading. REMEMBER: Not all users can handle files over
- 360 K, so keep files to a manageable size!
-
- -----------------
- UNWORKABLE FILES
- -----------------
-
- What do you do if you get a program that doesn't work? Check
- back with the sysop of the board where you obtained it.
- Most sysops appreciate being told of problems---if you have
- a problem, somebody else will likely have the same problem, and
- it doesn't do the sysop a favor to keep silent. Sometimes it's
- just a matter of finding the right trick, but if it's a bad
- program, it should be taken off the board ASAP! But don't bitch
- at the sysop--Nothing's worse than a whiney user. If you
- find there's a trick to getting a program working, leave a
- message on the board. Remember the motto: ONE FOR ALL, and all
- that, and SHARING is the pirate credo!!
-
- >> *END* <<
-
- (The following is reprinted from BITNET unedited ((eds.)).
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- * * * Why Software Ownership is bad for Society * * *
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- Talk given by Richard Stallman at Univ. of Texas, Feb. 1987.
- Square brackets contain comments and clarifications that were not
- said in the original talk.
-
- Copyright @copyright%% 1987, Free Software Foundation, Inc.
-
- This is an unedited transcript of an informal talk. Verbatim
- copying and redistribution is permitted; alteration is not.
-
- If you are interested in helping to edit this to be more suitable
- for publication, please contact the Free Software Foundation:
- 675 Mass Ave, Cambridge, MA 02139; or send email to
- gnu@prep.ai.mit.edu.
-
- The field of software is a fairly new one. About twenty years
- ago, people started doing lots of programming. There was no
- clear basis in tradition for whether software should be
- considered property or not. There were several possible
- traditions you could consider extending by analogy to the area of
- software, no one of which was inevitable, or necessarily more
- right than the others. One of them was the area of mathematics.
- Some people believe that a program is like a mathematical
- formula, and the tradition for mathematical formulas is that they
- couldn't be property. Another thing that programs are like is
- recipes. In fact, of all the things that people encounter in
- daily life, the recipe is the one that's most like a program.
- It's directions for getting something useful done. And recipes,
- also, by our traditions cannot be property. There was a third
- thing, and that was literature. As it happens, literature
- traditionally @emph%could% be property. Programs have something
- in common with all three of these things. They don't have more,
- particularly, in common with literature than they do with
- mathematics or recipes, but the decision was made to treat them
- like literature because the people who had the most to gain from
- that particular decision were allowed to decide.
-
- But this decision was not good for society as a whole. It's
- incredibly destructive, and it feeds an overall destructive
- tendency in this society which we can see in every area. And
- that's why, having observed the results, I came to the conclusion
- that it was unacceptable, that software @emph%cannot% be
- property, and that I would dedicate my career to bringing that
- about.
-
- If we look at the traditional forms of intellectual property, we
- can see they were all designed to fit into niches where they
- could exist without doing great harm to society. These niches
- were often created by the technology that existed at the time.
- For example, consider the area of books, for which copyright was
- invented. At the time, books could only be copied by mass
- production. Earlier, books were copied one at a time, by hand,
- and at that time there was no idea of copyright. In fact, people
- didn't even have the @emph%concept% of strictly distinguishing
- their original book from a non-original one. It was a continuum.
- They recognized that some writers wrote more new things into
- their books, while they copied passages [from other books], or
- they might just be copying entire books. All of these things
- were legitimate, useful activities, though useful in different
- ways. But when the printing press was invented, it suddenly
- became for all intents and purposes impossible to copy a book by
- hand. Not that it was any harder than it had been before, but by
- comparison with making a copy on a printing press, it was so
- ridiculously impractical that no one would want to do it. The
- situation where books were made by mass production lent itself to
- copyright in the sense that copyright became a restriction on one
- particular kind of industry---a form of industrial regulation.
- It didn't take away the rights of the reading public in any way,
- because members of the reading public couldn't copy books anyway.
- They didn't own printing presses, so it was effectively
- impossible for them to copy books. But this niche was created by
- a particular technology, and changing technology can make it go
- away again. The technology of computer programs has never been
- like that.
-
- [I have since learned that people did copy books by hand to a
- significant extent after the printing press was developed. What
- I said was true in recent times, but in England in the 1500's
- (and perhaps later) government-enforced featherbedding among
- printers made printed books fairly expensive; as a result, poor
- people might more easily afford the time to copy a book than the
- price of the book. But these people were not prosecuted for
- copying or told it was wrong. Copyright was applied only to
- authors and publishers. It was treated as an industrial
- regulation.]
-
- If we look, for example, at patents, we find something that was
- specifically set up to benefit the @emph%public%, not the
- inventor. It was set up to encourage inventors to disclose what
- they had invented, and to give them monopolies that were limited
- in time, to a time that short compared to the useful life of any
- invention then. It's no longer short, compared to the useful
- life of any invention today. In fact, core memory was already
- pretty much obsolete when its patent ran out. That's a very
- famous patent, and I suspect that a lot of other patents have the
- same results. But remember, the purpose of setting up patents
- was to benefit mainly society as a whole, by encouraging
- disclosure and thus making it possible for people to build on
- each others' work. You won't find a motive like that among
- people who advocate intellectual property today.
-
- In the time that I've worked as a programmer, I've watched things
- change from a situation where people generally shared work and
- generally used work that had been done in whatever way was
- useful, to one in which is nearly impossible to utilize work that
- other people have done, where people feel uncomfortably cynical.
- Constantly, a person will describe a great piece he's doing
- that's so exciting, you ask him %%will I be able to use it?'',
- and his face falls, and he says, no, you probably won't be, and
- he realizes that he's doing something wrong, but he perhaps
- doesn't have the commitment to doing right that would be required
- to decide that he wasn't going to do it any more. But that kind
- of thing [doing what they know is wrong and being too scared to
- stop] demoralizes people.
-
- If we look at the two arguments that are advanced most often
- toward intellectual property in software, they are one, the
- emotional argument, and two, the economic argument. The
- emotional argument goes something like %%I put my sweat, and my
- heart, into this program. It's my soul; it comes from @emph%me%,
- it's @emph%mine!%.'' Well, it's sort of fishy that most of these
- people would then go sell it to a company. And what ever
- happened to egoless programming, anyway? So I don't really think
- that that argument is worth refuting any harder than that. It's
- a feeling that people can cultivate when it suits them, not one
- that is inevitable. By comparison, consider all the great
- artists and artisans of medieval times, who usually didn't even
- sign their names. They didn't consider that it was relevant who
- had done the work, only that it existed; and this was the way
- people thought for hundreds of years.
-
- The economic argument goes something like, %%I want to get rich
- (except that I'll call that %make a living'), and if you don't
- allow me to get rich by programming, then I won't program. And
- then you'll be screwed---so there!'' Well, I'll explain later
- why I think we don't have to go along with that kind of
- blackmail. But first I want to address the claim [I should have
- said, the implicit assumption] that society actually benefits
- from proprietary software development.
-
- The first problem with that argument is that it's comparing the
- wrong two things [owned software vs no software]. Certainly,
- software development is useful. But to link the development of
- the software with subsequent ownership and prevention of use is
- to beg the question. The question is, %%Should software
- development be linked with some ability to stop people from using
- it?'', and in order to decide this, we have to judge the effects
- of each of those two activities independently. What I intend to
- show is that the effects of @emph%ownership%, by itself, are very
- destructive, and therefore, if you want to encourage the
- development which is useful, we should not connect it with
- something destructive [like ownership]. And I'll go on to
- explain other ways in which this [encouragement] can easily be
- done.
-
- Let's look at the overall effects of software ownership.
- Consider that we have a program that has been developed, and now
- it either can be free, or it can be proprietary. There are three
- different levels of material harm that come from making it
- proprietary. And with each of these, there's a concomitant form
- of spiritual harm. By %%spiritual'' I mean the effect on
- people's feelings, attitudes, and thoughts of the actions that
- they take. These changes in people's ways of thinking will then
- have a further effect on their actions in the future.
-
- The first level is the level of simple use of a program. If a
- program is successfully made proprietary, that will cause fewer
- people to use it. This doesn't make it any less work, however.
- Here is a crucial difference between programs and cars, chairs,
- or sandwiches. That is, once there's one of them, @emph%anyone%
- can essentially snap his fingers and have as many more copies of
- the thing as are wanted. This isn't true for material objects,
- which are conserved, and which have to be built in the same way
- that the first one was built. With material objects, it's not
- necessarily destructive to have a price on them because that
- means if people decide to buy fewer of them, you can @emph%make%
- fewer of them and use fewer resources and spend less of your
- time. You might say, %%Well, these people only want to pay for
- ten of these, so I'll build ten and I'll spend the rest of the
- day going fishing.'' But that's not relevant when the question
- is whether @emph%they% should build some more @emph%themselves%,
- which is what users will do with free programs. So we find that
- there's no overall benefit which comes---no non-selfish,
- non-obstructive reason to want to put a price on the use---why
- have a disincentive to use something which really costs nothing
- to make? A great spiritual harm goes along with this waste,
- because of the way it's worked.
-
- The spiritual harm comes from the nondisclosure agreements and
- licenses that people sign, because each buyer is asked to betray
- his neighbors. If you want to use a program and your neighbor
- wants to use the program, the Golden Rule says that you should
- want @emph%both% of you to get that program. You shouldn't aim
- for a solution where you get it and the other people don't, if
- you want to be a good citizen, that is. And the nondisclosure
- agreement essentially says %%I promise to be a bad citizen---I
- promise to say %To hell with my neighbors!' To hell with
- everyone! Just give @emph%me% a copy!''. And you can see the
- spiritual effect that has on the community you live in.
-
- A lot of people unconsciously recognize this and that's why the
- decide to share programs anyway. But they feel somewhat guilty
- because they haven't reasoned it out carefully and decided that
- the nondisclosure agreements are illegitimate morally. They know
- that they must break those agreements in order to be still
- friends with their friends, but they still think that the
- agreements are valid also, and so they feel @emph%ashamed% of
- being friends with their friends. And that's also a kind of
- spiritual harm. I say that people shouldn't @emph%have% to
- explain in a slightly embarrassed tone of voice that they're
- %%pirates''. They shouldn't @emph%think% of themselves as
- pirates. They shouldn't use that particular propoganda term.
-
- The second level of material harm is at the level of
- @emph%adapting% programs. Most commercially available software
- isn't fully available, even commercially. It's available for you
- to take it or leave it, but it's not available for you to change.
- But changing programs is an incredibly useful thing, and if that
- is prevented, it's a great harm. I have a friend who told me
- that she worked as a programmer in a bank for about six months,
- writing a program that was pretty close to something that was
- commercially available, and she thought that if she could have
- gotten source code for that commercially available program, it
- would have taken much less than six months to adapt it to their
- needs. But they couldn't get the source code, so she had to do a
- lot of make-work, a lot of work that you would include in the GNP
- but was really totally useless. And I'm sure you've all had the
- experience as programmers of being frustrated because there was a
- program you wanted to change and couldn't.
-
- We can consider what it would be like if recipes were hoarded in
- the same fashion as software. You'd say, %%How do I change this
- recipe to put in less salt?'', and the great chef says, %%How
- dare you insult my recipe, the child of my brain, by trying to
- tamper with it? You don't have the judgement to tamper with my
- recipe and make it work right!''. %%But my doctor says I'm not
- supposed to eat salt! What do I do?''.
-
- The spiritual harm that comes from this is to the spirit of
- self-reliance, which used to be greatly valued in this country.
- If you can't be self-reliant, then the landscape that you live in
- is frozen under someone else's control and you can't change it.
- That leads to a demoralized attitude like %%Well, yeah, this
- system isn't really what we want, but it's hopeless to think of
- trying to change it, so we'll just have to live with it and
- suffer and suffer and suffer.'' And nothing can kill morale of
- programmers like that.
-
- I remember even at MIT we had an example like that, and I
- remember how it demoralized people. Our first graphics printer
- was the XGP, which many of you are probably lucky enough not to
- have heard of. But that was available ten years ago or more.
- And all the software for that was written at MIT, and we could
- change it. We put in lots of nice features, such as it would
- send you a message when your document had actually been printed;
- and it would a send you a message if you had anything queued and
- there was a paper jam; and many other nice features. Then later
- we got something called the Dover, which was another gift from
- Xerox. But there, the software was proprietary, and it ran in a
- separate computer that served as the spooler, and we couldn't add
- any of those features. So when you got a message that said
- %%your document has been sent'', you don't know if it's been
- printed, you won't find out when it's been printed, and no one
- would get informed when there was a paper jam, so it might sit
- there with no one fixing it for an hour. And we all knew that we
- were capable of fixing these things, probably as well as the
- original authors were, but somebody found it useful to sabotage
- us. That was a constant source of frustration.
-
- The third level of material harm is the level of software
- development. Software development used to go on by a sort of
- evolutionary process, where a person would take a program and
- rewrite parts of it for one new feature, and then another person
- would rewrite parts to put another new feature in; this could go
- on over twenty years. The final program might have many features
- that the original one didn't have, but you might still see a few
- lines of code that you could recognize by their style as having
- been there from ten years before without ever being changed. And
- one of the main goals of intellectual property is to prevent this
- kind of evolution, to try to make it impossible for you to throw
- together a program quickly and easily by cannibalizing things
- that are already written. In any kind of intellectual field,
- progress is built by standing on the shoulders of others. That's
- what's no longer allowed---you can only stand on the shoulders of
- the other people in @emph%your company% nowadays.
-
- And the spirit that's harmed by this material harm is the spirit
- of scientific cooperation, which used to be so strong that
- scientists would cooperate with each other even when they were in
- countries that were at war. Nationalism wasn't able to destroy
- scientific cooperation, but greed has. Nowadays, people don't
- publish enough in their papers to be able to replicate anything.
- They publish only enough for you to be able to gaze in amazement
- at how much they had been able to do.
-
- [Tape counter 213-227: someone describes the example of
- Karmarkar's algorithm, an efficient algorithm for linear
- programming that AT&T is keeping secret.]
-
- So now that I have shown all these reasons why ownership of
- software is bad for society, I think the conclusion that we
- shouldn't allow or recognize in any way a concept such as
- ownership of programs. We should say that programs are
- @emph%not% property, and if we want to encourage software
- development, we should encourage it in another way.
-
- There are many fields in which no one sees a way to get rich by
- owning something and no one expects to, but there are still lots
- of people eager to work in the field. They compete bitterly,
- though more sadly than bitterly, I guess, for the few funded
- positions available, none of which is funded very much.
-
- Suddenly, however, when it becomes possible by hoarding
- information to get rich, you find people saying that no one will
- work in the field if they can't get rich. Well, it may be true
- at that moment, but it's a consequence of the expectation that
- you @emph%can% get rich. Therefore, we shouldn't assume that it
- has to be true in any particular field. It's essentially a
- coincidence that that field makes it possible to get rich by
- hoarding, and if we were to take away the possibility of getting
- rich by hoarding, then after a while, when the people had
- intellectually readjusted, they would once again be eager to work
- in the field for the joy of working in it, and they would ask us
- only to provide them a pittance to live on. And these pittances
- can be provided at universities which right now are proprietary
- software sellers. They can be supported by hardware
- manufacturers which have to do software development anyway, and
- twenty years ago did free software development. They can be
- supported by government contracts and grants, which actually
- support a lot of proprietary software development today. A large
- amount of software development is supported one way or another by
- the military, some of which may have to do with building weapons,
- but not all of it; but it's proprietary anyway, most of the time.
-
- Some people I know right now have a contract to write a
- proprietary, improved version of a free program that supports
- TCP/IP on IBM PC's. And with this contract, they could make a
- living just as well writing free software, but of course they're
- not going to; they want to be able to clean up afterwards. And
- you all know of people who get research grants to develop
- something at a university, and then they make the unfinished
- version free, and go on to start companies to sell something with
- the last few finishing touches, so that you'd actually want to
- use it.
-
- Our whole world, everywhere we look, all forms of good will to
- your neighbor are being undermined by the search for ways to
- obstruct for profit. Fifty years ago, various people in the
- Mafia would go around to stores in the neighborhood and say %%You
- have a nice building there; it would be a shame, wouldn't it, if
- it burned down, and there have been a lot of fires around here
- lately. I think you need some protection''. And this was called
- the %%protection racket''. Now we have people going to computer
- users and saying, %%You've got some nice software there, but I
- paid those congressmen to say it's illegal for you to have it. A
- lot of people have been going to jail around here lately for
- that. You wouldn't want to go to jail, would you? I think you
- need to pay me some money.'' And this is the software protection
- racket.
-
- They say that they're providing a useful service to the public,
- that they are software publishers, or software stores. But these
- functions only appear to be necessary because of the restrictions
- they have managed to place on us. You wouldn't need a software
- store if software were free. You'd only need the public library,
- which would have a computer with copies that you could download,
- or copy onto floppies or tapes, of one copy of all the programs
- that you'd want. And it wouldn't cost very much---nothing,
- compared with what software stores cost to run, to make this
- thing go.
-
- But the people in the Mafia fifty years ago didn't want to admit
- to themselves---they wanted to pretend to themselves that there
- was something legitimate about what they were doing, and that's
- why they phrased it in terms of protection. They didn't bluntly
- say %%I'll burn your store down if you don't pay me.'' So, too,
- the software publishers like to pretend, and speak as if they
- were doing something useful, instead of simply saying %%if you
- use that program, I'll send some cops after you if you don't pay
- me.''
-
- [Unintelligible question, apparently about if there are
- sufficient programmers to write software w/o monopolies.
- Ans:]
-
- Well how do you know they're not sufficient? So much of software
- work today is wasted by duplication that's done only for
- proprietary reasons, we could probably get as much software
- delivered with half the programmers if we didn't have this form
- of featherbedding. In fact, it's sort of funny to look at the
- quest for software productivity. There are two meanings you
- could have for software productivity. You can look at the
- software productivity of the industry as a whole, or you could
- ask about the productivity of a particular company. There's a
- lot of work being put into increasing the software productivity
- of particular companies one by one, but the best way to increase
- the productivity of the whole industry is to eliminate the
- artificial obstruction. And that would increase productivity far
- more than anything people are trying to do now. But they don't
- want that, because what they want is productivity of my company,
- not productivity that actually benefits society. But they use
- that language to try make people overlook the difference.
-
- It's an interesting thing about how language is used for
- propoganda. By choosing particular words, you don't @emph%force%
- people to think a certain way, but you can strongly suggest
- certain avenues of thought. By using a certain word for two
- things, you can bias people without their knowing it towards
- seeing the similarities and underestimating the differences. And
- this is one of the reasons why software hoarders use the terms
- %%property rights'' and %%ownership'' and %%theft'' while I use
- the term %%software hoarding''. Software hoarding is my name for
- the crime of trying to prevent someone else from sharing a
- program with a third party. And that's the same thing that's
- going on with "software productivity". Software productivity has
- two meanings, about which you would say different things, but it
- takes a critical eye to realize that there are two meanings. If
- you don't look critically, you might say %%Ah! Improving
- productivity---that's got to be what we need! Obviously, what we
- want to do to make society work better is improve
- productivity!''. You wouldn't guess that they're talking about a
- very narrow kind of productivity, and excluding something that
- comes into the overall productivity, an area where they
- themselves are deliberately making things worse.
-
- What can we say, I guess, about the overall effect of technology
- on these kinds of restrictions? I've explained how copyright
- pretty much made sense. It was only a small restriction on
- people's freedom in the technological situation in which it was
- invented. But now we've seen a change in technology which makes
- copying things one at a time a feasible way to copy, and anyone
- can do it as well as anyone else, which changes the fundamental
- situation that made copyright legitimate and caused it to become
- illegitimate. Right now we've seen half of that transformation
- in the copying of books. You can xerox a book now, but only for
- very expensive books would you want to, because what you get is
- not as nice as a bound book, and it takes you more work to do it.
-
- It fundamentally does cost more (now) to make a book by xeroxing
- than it does on a printing press. And it costs the individual
- more, so we've only seen a few situations in which people wanted
- to make any number of copies of a book by xeroxing. But that's
- just a transient state, because soon we're going to have
- wonderful computer printers, and we're going to have
- digitizers---scanners, and it will be possible to scan any book
- quickly, you'll have a robot to turn the pages, and have it on
- your disk, and send it across a network to be printed out into a
- beautifully bound copy, and at that time, book publishers will be
- just as useless to society as software publishers are. And at
- that time, the move that's already afoot to eliminate the public
- libraries or tax them with royalties, may essentially complete
- itself. You may be unable to get a copy of a book without
- signing a license of some sort.
-
- In general, the entire thrust of information technology is that
- information is completely interconvertible. Any form can be
- changed into any form. Nothing is ever lost. And also, the
- whole idea of the computer is that it's a universal machine.
- It's a machine that can be programmed to simulate any other
- machine. Why is this better than building a specific machine?
- It's because you can change the program, because you can copy the
- program, load in new programs. The ability to copy and the
- ability to change a program are the entire basis for the
- usefulness of the computer. And those are precisely what the
- software owners don't want the public to be able to do. Software
- owners want to reserve all the benefits of computer technology to
- themselves, with only a %%trickle down'' to the public. I say
- the public should not allow this. If we call the bluff of the
- programmers or the programming investors, they won't have as many
- Porsches and they won't eat as much sushi. But once they are
- willing to go along with that, they'll find that there are other
- ways of organizing businesses that are less profitable, but
- enough for a good number of programmers to make a living
- nonetheless. And we'll take a great step forward toward a world
- in which it's much @emph%easier% to make a living, because there
- won't be as obstruction going on, making us do unnecessary work.
- And we'll see all sorts of indirect effects, because society is
- pretty well linked.
-
- Software hoarding is one form that the tendency to obstruct
- society for profit takes; one that pertains to our field, but
- that actually exists in some other fields as well, to greater or
- lesser extents. And the more people see this going on, the more
- are going to be inclined to do so themselves when @emph%they% get
- a chance, and the more they're going to be demoralized and
- willing to put up with it, and not fight against it when they
- encounter it in others. But conversely, any time we take a stand
- against some of ownership because it makes the whole world
- poorer, we'll help other people stand up in the future, and we'll
- help spread the idea that you should ask not what your country
- can do for you, but what you can do for your country.
-
- [QUESTIONS]
-
- Q: Your talk is very impressive, it's almost like a sermon...
- RMS: Yes, it is. Q: and it's difficult to put all the pieces
- together and argue with it, but I find it especially difficult to
- see how your alternative system would work, or even exactly how
- you imagine it to function. Let me you this: you didn't mention
- music. You mentioned recipes and other things. RMS: yes. Q:
- But music is an interesting analog also, with the score; because
- the composers have a union, and everything, and they not only---
-
- RMS: It supports them very poorly. Copyright as a way to support
- composers or musicians is a @emph%flop%. We should throw it away
- and get something new. We're the only advanced country that
- still relies on that.
-
- Q: Well, the question I wanted to ask you---I realize it doesn't
- work very well, but they hope that they can get some profit from
- the publication of the printed score, but also if a producer of
- say, a Broadway show, or a movie maker, makes a big profit by
- @emph%performing% the composer's work, then the composer would
- like to have a piece of that action too. And you can make an
- analogy between that and a user of software.
-
- RMS: You can, and I think in both cases you get problems further
- down the line. See, the nature of knowledge, and information in
- general, is to make use of it, you transform it, and mix it in
- with other things. And to try to keep track of how much of a big
- program was developed by this author, and how much by this person
- and so on, it fundamentally can't be done unless you forbid them
- to work together, which is what the current system effectively
- does. It's perfectly possible to keep straight which company
- developed something when nothing can ever go from one company to
- another. And that's a tremendous harm.
-
- The whole idea of encouraging the development of information
- seems plausible because the information is useful. But in order
- for it to be fully useful, you have to abandon the idea of
- trying to keep track of who created it, because any component
- could be created in many stages.
-
- Now it's true it doesn't do very much harm to anyone if this
- Broadway producer pays some money to the composer, assuming that
- there was only one composer (of course, there's such a thing as
- the folk process, and there's the process of arrangement as
- well), but it just happened, I guess, that in music there
- wouldn't normally be so many stages of transformation of one work
- that it was hard to keep track of. And part of the reason is
- that fundamentally, the value of music is aesthetic, and
- therefore originality wasn't imposed simply for the sake of
- intellectual property, it was valued for its own sake because
- something that was not new was not aesthetically up to
- contribution. A piece that was made by cannibalizing parts of a
- few other pieces with a little bit that was new wouldn't turn
- music listeners on very much; they'd just say %%oh, yeah! Well,
- I remember that, I've heard that before in so-and-so's work.''
- And in an area where originality has an intrinsic usefulness, you
- won't get things being tacked on by one person, and another, and
- gradually changed around so much, although in some areas of music
- you do---in folk music, that's what happens [originality is not
- the main concern in folk music]. And when there are fewer people
- changing a work, it becomes less of an odious burden to try to
- keep track of who did it, and if you're talking about in
- particular, the Broadway producer, well, he's running a big
- business anyway, and he can arrange to make a license and so on,
- so in that situation it doesn't do very much harm.
-
- There's a danger when somebody says that something is wrong with
- a significant part of society---there's a certain problem that
- you run into, which is that on one side, there are people who
- call you a fanatic, and on the other side there are people who
- call you inconsistent. If you look for every ramification of the
- problem you see and demand that they all be completely excised
- from society, people call you a fanatic. And if you don't look
- for every ramification and demand that it be excised from
- society, people call you inconsistent.
-
- What I believe is that no one coordinate patch will map the whole
- world very effectively. There are many phenomena; each
- phenomenon is the controlling phenomenon in some areas and
- insignificant in others. I'm concerned with eliminating
- intellectual property mainly in the field of software, because
- there I see it really uglifying society and causing tremendous
- waste. If it doesn't cause so much waste in the area of music,
- then I don't feel it's so important to change it there.
- Although, there are certain areas where I object to it, and you
- can see the battle is shaping up again because of the ability of
- individuals to copy.
-
- You may have heard of the proposed laws to tax recorders and tax
- tape, and pay the money to record companies, or to musicians, in
- proportion to their sales. Well, I'd be happy to see a tax on
- tape or tape recorders to support musicians, but @emph%not% in
- proportion to their sales! If your goal is to help the
- struggling musicians (and most musicians are @emph%really%
- struggling, because our current copyright system doesn't support
- them at all), I'd say that that tax should go to the musicians
- who make a @emph%few% sales, but not very many. Because the ones
- who make a lot are rich, and they don't need a handout.
-
- Q: I'm not sure of the legal changes you're proposing. There's
- at least three ways in which software can be proprietary. One
- is copyright laws, which you're obviously against. RMS: yes. Q:
- Another is by entering into a contract: I promise not to copy, I
- promise not to disassemble, I promise to be a bad citizen. The
- third is you can use encryption methods, which perhaps our
- copyright laws, hardware manufacturers support in the processor
- ID [???]. My question is this: are you proposing to make
- entering into certain kinds of contracts illegal, and are you
- proposing to make encrypting in order to hoard software illegal?
-
- RMS: Well, I haven't seen hardware copy protection schemes that
- manage to win. Encryption, I agree, can prevent you from
- changing a program, but I don't see how it can prevent you from
- copying it, because you could copy the encrypted thing. Q: but
- you're still avoiding the question... [not true; that was one
- half of the question] A: I would say that a nondisclosure
- agreement like that should be called unenforceable, like gambling
- debts. Clearly to try to stop people from keeping secrets would
- be tyrannical and I wouldn't be in favor of trying to do that.
- The other thing to realize is that trade secrecy is not fully
- built on those contracts. Those contracts are one step you go
- through to establish something as a trade secret. But there's an
- entire body of trade secret law that imposes things on people who
- have not signed those contracts. So in that area, just as in the
- other areas of copyright and patents, there's explicit government
- intervention which has nothing to do with voluntary contracts, to
- give power to software hoarders, and if that were taken so that
- we had nothing but the voluntary contracts, we'd have a lot less
- power in trade secrecy than we do now.
-
- Q: One other question. Sometimes you seem very concerned about
- the [??] of software. But when it comes to, for instance,
- supporting musicians, you seem to be saying [????]
-
- RMS: The public is @emph%already% supporting @emph%those%
- musicians, and they will make a lot of money anyway, from their
- concerts and so on. And what I'm saying is that obviously, we
- should only have a tax like that if people think it's desirable.
- Maybe people think it's desirable to support starting musicians,
- and musicians whose lives are marginal but who some people like.
- And I think you could set that up in such a way that only a
- person who was yearning to be a musician would consider it
- attractive, and therefore you wouldn't have to worry about
- someone sponging off of it in order to get out of doing any work.
-
- Q: While I sympathize with the position you've laid out, it
- reminds of the debate between capitalism and communism. RMS: Oh,
- no, it's very different. I'll explain to you the difference. Q:
- OK, well, the specific point I'd like you to explain then is that
- while communism is appealing, it removes some basic human
- incentives that are based on self-interest.
-
- RMS: There are lots of kinds of self-interest, and what they are
- depends on the social situation. There are also lots of kinds of
- competition. For example, there was competition among hackers in
- the old days, for who could do a better program, or could make a
- program shorter and faster. That competition, though, didn't
- involve obstruction; yet it motivated people very powerfully, and
- you can see in many areas of life where people are motivated by a
- wish to excel their rivals, to do better than anyone else had
- done. And they might even spend gigantic amounts trying to do
- this. Have you read about the people who were competing to visit
- all the countries in the world first? They spent incredible
- amounts of money trying to do that. But as for the fundamental
- question, communism and capitalism are similar in that they're
- very concerned with %%how much money should each person get?''.
- Capitalism the position of a person who says %%I want to have the
- power to get all the money that my might can bring me'', whereas
- communism says everyone should have the same amount of money, or
- everybody should have an amount of money that's totally
- determined by what that person needs in some sense. But what I'm
- saying is, we all have to pay less attention to how much money
- each of us has, because we're impoverishing each other by paying
- too much attention to it. [TAPE ENDS.]
-
- >> *END* <<
-
- (The following was extracted from a public e-mail file and
- is reproduced unedited, with the exception of deletion of
- multiple lines created by the transmission format--eds.)
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- * * * * COPYRIGHT LAW ** * *
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- I've received a couple of requests for more information on
- copyright law. A fairly good introduction is included with the
- netnews (usenet) software. Note that some things have changed
- since this was written (e.g. copyright notices are no longer
- mandatory, penalties for infringement have doubled).
-
- One point I think the author should have made is that the basis
- for copyright law in the U.S. is constitutional (Art. I Sec. 8):
- "The Congress shall have Power ... To promote the Progress of
- Science and useful Arts, by securing for limited Times to Authors
- and Inventors the exclusive Right to their respective writings
- and Discoveries."
-
- I did some rather disgusting postprocessing to make nroff output
- acceptable to BITNET; this should print properly on a printer
- with 66 lines per page and no perforation skip.
-
- -=EPS=-
-
-
- Copyright Law
-
-
- Jordan J Breslow
- 1225 Alpine Road Suite 200
- Walnut Creek CA 94596
- 1 415 932 4828
-
-
- I am an attorney practicing copyright law and computer law.
- I read a series of queries in net.legal about copyright law and
- was dismayed to find that people who had no idea what they were
- talking about were spreading misinformation over the network.
- Considering that the penalties for copyright infringement can in-
- clude $50,000.00 damages per infringed work, attorneys fees,
- court costs, criminal fines and imprisonment, and considering
- that ignorance is no excuse and innocent intent is not even a
- recognized defense, I cringe to see the network used as a soapbox
- for the ill-informed. For that reason, this article will discuss
- copyright law and license law as they pertain to computer
- software.
-
- My goal is to enable readers to determine when they should
- be concerned about infringing and when they can relax about it.
- I also want to let programmers know how to obtain copyright for
- their work. I'll explain the purpose of software licenses, and
- discuss the effect that the license has on copyright. For those
- of you who are programmers, I'll help you decide whether you own
- the programs you write on the job or your boss owns them. I will
- also mention trademark law and patent law briefly, in order to
- clarify some confusion about which is which. Incidentally, if
- you read this entire essay, you will be able to determine whether
- or not the essay is copyrighted and whether or not you can make a
- printout of it.
-
- This is a long article, and you may not want to read all of
- it. Here is an outline to help you decide what to read and what
- to ignore:
- 1. The Meaning of Copyright from the Viewpoint of the Software User
- 1.1 A bit of history
- copyright
- +1.2 The meaning of _________
- public domain
- +1.3 The meaning of ______ ______
- 1.4 A hypothetical software purchase
- 1.5 Can you use copyrighted software?
- 1.6 Can you make a backup copy?
- 1.7 Licenses may change the rules
-
- +c Copyright 1986 Breslow, Redistributed by permission
-
-
-
-
- 1.8 Can you modify the program?
- 1.9 Can you break the copy protection scheme?
- 1.10 Summary
-
- 2. Copyright Sounds Neat -- How Do I Get One?
- Or, How Do I Know If this Program is Copyrighted?
- 2.1 How do you get a copyright?
- 2.2 How do you lose a copyright?
- 2.3 How do you waste a stamp?
- 2.4 Do you have to register?
- 2.5 How copyright comes into existence
- 2.6 The copyright notice
- 2.7 Advantages of registration
- 2.8 A test to see if you understand this article
-
- 3. Who Owns The Program You Wrote?
- 3.1 Introduction
- 3.2 Programs written as an employee
- 3.3 Programs written as a contractor
-
- 4. A Brief Word about Licenses
- 4.1 Why a license?
- 4.2 Is it valid?
-
- 5.1 Trademark law explained
- 5.2 Patent law
-
- 6. Conclusion
-
- 1. The Meaning of Copyright from the Viewpoint of
- the Software User
-
- 1.1. A bit of history
-
- If you're not interested in history, you can skip this para-
- Modern
- +graph. ______ copyright law first came into existence in 1570,
- by an act of Parliament called the Statute of Anne. Like most
- laws, it hasn't changed much since. It was written with books
- and pictures in mind. Parliament, lacking the foresight to
- predict the success of the Intel and IBM corporations, failed to
- consider the issue of copyrighting computer programs.
-
- At first, courts questioned whether programs could be copy-
- righted at all. The problem was that judges couldn't read the
- programs and they figured the Copyright Law was only meant to ap-
- ply to things humans (which arguabley includes judges) could read
- without the aid of a machine. I saw some mythical discussion
- about that in some of the net.legal drivel. Let's lay that to
- rest: programs are copyrightable as long as there is even a
- minimal amount of creativity. The issue was laid to rest with
- the Software Act of 1980. That Act modified the Copyright Act
- (which is a Federal law by the way), in such a way as to make it
- clear that programs are copyrightable. The few exceptions to
- this rule will rarely concern anyone. The next question to arise
- was whether a program was copyrightable if it was stored in ROM
- rather than on paper. The decision in the Apple v. Franklin
- case laid that to rest: it is.
-
- 1.2. The meaning of copyright
-
- Now, what is copyright? As it is commonly understood, it is
- the right to make copies of something -- or to put it the other
- way around, it is the right to prohibit other people from making
- copies. This is known as an exclusive right -- the exclusive
- reproduce
- +right to _________, in the biological language of the Copyright
- Act -- and what most people don't know is that copyright involves
- not one, not two, but five exclusive rights. These are (1) the
- exclusive right to make copies, (2) the exclusive right to dis-
- tribute copies to the public, (3) the exclusive right to prepare
- derivative works
- +__________ _____ (I'll explain, just keep reading), (4) the ex-
- clusive right to perform the work in public (this mainly applies
- to plays, dances and the like, but it could apply to software),
- and (5) the exclusive right to display the work in public (such
- as showing a film).
-
- 1.3. The meaning of public domain
-
- Before we go any further, what is public domain? I saw some
- discussion on the net about public domain software being copy-
- public domain
- +righted. Nonsense. The phrase ______ ______, when used correct-
- ly, means the absence of copyright protection. It means you can
- copy public domain software to your heart's content. It means
- that the author has none of the exclusive rights listed above.
- public domain freeware
- +If someone uses the phrase ______ ______ to refer to ________
- (software which is copyrighted but is distributed without advance
- payment but with a request for a donation), he or she is using
- the term incorrectly. Public domain means no copyright -- no ex-
- clusive rights.
-
- 1.4. A hypothetical software purchase
-
- Let's look at those exclusive rights from the viewpoint of
- someone who has legitimately purchased a single copy of a copy-
- righted computer program. For the moment, we'll have to ignore
- the fact that the program is supposedly licensed, because the
- license changes things. I'll explain that later. For now, as-
- sume you went to Fred's Diner and Software Mart and bought a
- dozen eggs, cat food and a word processing program. And for now,
- assume the program is copyrighted.
-
- 1.5. Can you use copyrighted software?
-
- What can you do with this copyrighted software? Let's start
- with the obvious: can you use it on your powerful Timex PC? Is
- this a joke? No. Prior to 1980, my answer might have been No,
- you can't use it!
-
- People actually pay me for advice like that! Well think:
- you take the floppy disk out of the zip lock baggy, insert it in
- drive A and load the program into RAM. What have you just done?
- You've made a copy in RAM -- in legalese, you've reproduced the
- work, in violation of the copyright owner's exclusive right to
- reproduce. (I better clarify something here: the copyright own-
- er is the person or company whose name appears in the copyright
- notice on the box, or the disk or the first screen or wherever.
- It may be the person who wrote the program, or it may be his
- boss, or it may be a publishing company that bought the rights to
- the program. But in any case, it's not you. When you buy a copy
- of the program, you do not become the copyright owner. You just
- own one copy.)
-
- Anyway, loading the program into RAM means making a copy.
- The Software Act of 1980 addressed this absurdity by allowing you
- to make a copy if the copy "is created as an essential step in
- the utilization of the computer program in conjunction with a
- machine and ... is used in no other manner ...." By the way,
- a machine
- +somebody tell me what _ _______ means. If you connect 5 PC's on
- a machine several machines
- +a network is that _ _______ or _______ ________? A related ques-
- tion is whether or not running software on a network constitutes
- a performance. The copyright owner has the exclusive right to do
- that, remember?
-
- 1.6. Can you make a backup copy?
-
- OK, so you bought this copyrighted program and you loaded it
- into RAM or onto a hard disk without the FBI knocking on your
- +door. Now can you make a backup copy? YES. The Software Act
- also provided that you can make a backup copy, provided that it
- "is for archival purposes only ...." What you cannot do, howev-
- er, is give the archive copy to your friend so that you and your
- pal both got the program for the price of one. That violates the
- copyright owner's exclusive right to distribute copies to the
- public. Get it? You can, on the other hand, give both your ori-
- ginal and backup to your friend -- or sell it to him, or lend it
- to him, as long as you don't retain a copy of the program you are
- selling. Although the copyright owner has the exclusive right to
- distribute (sell) copies of the program, that right only applies
- to the first sale of any particular copy. By analogy, if you buy
- a copyrighted book, you are free to sell your book to a friend.
- The copyright owner does not have the right to control resales.
-
- 1.7. Licenses may change the rules
-
- At this point, let me remind you that we have assumed that
- the program you got at the store was sold to you, not licensed to
- you. Licenses may change the rules.
-
- 1.8. Can you modify the program?
-
- Now, you're a clever programmer, and you know the program
- could run faster with some modifications. You could also add
- graphics and an interactive mode and lots of other stuff. What
- does copyright law say about your plans? Well ... several dif-
- ferent things, actually. First, recall that the copyright owner
- has the exclusive right to make derivative works. A derivative
- work is a work based on one or more preexisting works. It's easy
- to recognize derivative works when you think about music or
- books. If a book is copyrighted, derivative works could include
- a screenplay, an abridged edition, or a translation into another
- language. Derivative works of songs might be new arrangements
- (like the jazz version of Love Potion Number 9), a movie
- long version
- +soundtrack, or a written transcription, or a ____ _______, (such
- as the fifteen minute version of "Wipe Out" with an extended drum
- solo for dance parties). In my opinion, you are making a deriva-
- tive work when you take the store-bought word processor and modi-
- fy it to perform differently. The same would be true if you
- translated
- +__________ a COBOL program into BASIC. Those are copyright in-
- fringements -- you've horned in on the copyright owner's ex-
- clusive right to make derivative works. There is, however, some
- adapt
- +breathing room. The Software Act generously allows you to _____
- the code if the adaptation "is created as an essential step in
- the utilization of the computer program in conjunction with a
- machine ...." For example, you might have to modify the code to
- make it compatible with your machine.
-
- 1.9. Can you break the copy protection scheme?
-
- Moving right along, let's assume your store bought program
- is copy protected, and you'd really like to make a backup copy.
- You know this nine-year-old whiz who can crack any copy-
- protection scheme faster than you can rearrange a Rubix cube. Is
- there a copyright violation if he succeeds? There's room to ar-
- gue here. When you try to figure out if something is an infringe-
- ment, ask yourself, what exclusive right am I violating? In this
- case, not the right to make copies, and not the right to distri-
- bute copies. Public performance and display have no relevance.
- derivative work
- +So the key question is whether you are making a __________ ____.
- My answer to that question is, "I doubt it." On the other hand,
- I also doubt that breaking the protection scheme was "an essen-
- tial step" in using the program in conjunction with a machine.
- It might be a "fair use," but that will have to wait for another
- article. Anyone interested in stretching the limits of the "fair
- Betamax
- +use" defense should read the Sony _______ case.
-
- 1.10. Summary
-
- Let me summarize. Copyright means the copyright owner has
- the exclusive right to do certain things. Copyright infringement
- means you did one of those exclusive things (unless you did it
- within the limits of the Software Act, i.e., as an essential step
- ....).
-
- 2. Copyright Sounds Neat -- How Do I Get One? Or, How Do I Know
- if this Program is Copyrighted?
-
- 2.1. How do you get a copyright?
-
- If you've written an original program, what do you have to
- do to get a copyright? Nothing. You already have one.
-
- 2.2. How do you lose a copyright?
-
- If you've written an original program, what do you have to
- do to lose your copyright protection? Give copies away without
- the copyright notice.
-
- 2.3. How do you waste a stamp?
-
- If you mail the program to yourself in a sealed envelope,
- what have you accomplished? You've wasted a stamp and an envelope
- and burdened the postal system unnecessarily.
-
- 2.4. Do you have to register?
-
- Do you have to register your program with the U.S. Copyright
- Office? No, but it's a damn good idea.
-
- 2.5. How copyright comes into existence
-
- Copyright protection (meaning the five exclusive rights)
- fix tangi-
- +comes into existence the moment you ___ your program in a ______
- ble medium
- +___ ______. That means write it down, or store it on a floppy
- disk, or do something similar. Registration is optional. The
- one thing you must do, however, is protect your copyright by in-
- cluding a copyright notice on every copy of every program you
- sell, give away, lend out, etc. If you don't, someone who hap-
- pens across your program with no notice on it can safely assume
- that it is in the public domain (unless he actually knows that it
- is not).
-
- 2.6. The copyright notice
-
- The copyright notice has three parts. The first can be ei-
- ther a c with a circle around it (c), or the word Copyright or
- the abbreviation Copr. The c with a circle around it is prefer-
- able, because it is recognized around the world; the others are
- not. That's incredibly important. Countries around the world
- have agreed to recognize and uphold each others' copyrights, but
- this world-wide protection requires the use of the c in a circle.
- On disk labels and program packaging, use the encircled c. Un-
- fortunately, computers don't draw small circles well, so program-
- mers have resorted to a c in parentheses: (c). Too bad. That
- has no legal meaning. When you put your notice in the code and
- on the screen, use Copyright or Copr. if you can't make a cir-
- cle.
-
- The second part of the notice is the "year of first publica-
- Publication
- +tion of the work." ___________ doesn't mean distribution by Os-
- borne Publishing Co. It means distribution of copies of the pro-
- gram to the public "by sale or other transfer of ownership, or by
- rental, lease, or lending." So when you start handing out or
- selling copies of your precious code, you are publishing. Publi-
- cation also takes place when you merely OFFER to distribute
- copies to a group for further distribution. Your notice must in-
- clude the year that you first did so.
-
- The third part of the notice is the name of the owner of the
- copyright. Hopefully, that's you, in which case your last name
- will do. If your company owns the program -- a legal issue which
- I will address later in this article -- the company name is ap-
- propriate.
-
- Where do you put the notice? The general idea is to put it
- where people are likely to see it. Specifically, if you're dis-
- tributing a human-readable code listing, put it on the first page
- in the first few lines of code, and hard code it so that it ap-
- pears on the title screen, or at sign-off, or continuously. If
- you're distributing machine-readable versions only, hard code it.
- As an extra precaution, you should also place the notice on the
- gummed disk label or in some other fashion permanently attached
- to the storage medium.
-
- 2.7. Advantages of registration
-
- Now, why register the program? If no one ever rips off your
- program, you won't care much about registration. If someone does
- rip it off, you'll kick yourself for not having registered it.
- The reason is that if the program is registered before the in-
- fringement takes place, you can recover some big bucks from the
- infringer, called statutory damages, and the court can order the
- infringer to pay your attorneys fees. Registration only costs
- $10.00, and it's easy to do yourself. The only potential disad-
- vantage is the requirement that you deposit the first and last 25
- pages of your source code, which can be inspected (but not
- copied) by members of the public.
-
- 2.8. A test to see if you understand this article
-
- Now, someone tell me this: is this article copyrighted?
- Can you print it?
-
- 3. Who Owns The Program You Wrote?
-
- 3.1. Introduction
-
- The starting point of this analysis is that if you wrote the
- program, you are the author, and copyright belongs to the author.
- HOWEVER, that can change instantly. There are two common ways for
- your ownership to shift to someone else: first, your program
- might be a "work for hire." Second, you might sell or assign
-
- rights
- +your ______ in the program, which for our purposes means the
- copyright.
-
- 3.2. Programs written as an employee
-
- Most of the programs which you write at work, if not all of
- them, belong to your employer. That's because a program prepared
- by an employee within the scope of his or her employment is a
- author
- +"work for hire," and the employer is considered the ______. This
- is more or less automatic if you are an employee -- no written
- agreement is necessary to make your employer the copyright owner.
- By contrast, if you can convince your employer to let you be the
- copyright owner, you must have that agreement in writing.
-
- By the way, before you give up hope of owning the copyright
- to the program you wrote at work, figure out if you are really an
- employee. That is actually a complex legal question, but I can
- tell you now that just because your boss says you are an employee
- doesn't mean that it's so. And remember that if you created the
- scope
- +program outside the _____ of your job, the program is not a "work
- for hire." Finally, in California and probably elsewhere, the
- state labor law provides that employees own products they create
- on their own time, using their own tools and materials. Employ-
- ment contracts which attempt to make the employer the owner of
- inventions
- +those off-the-job __________ are void, at least in sunny Califor-
- nia.
-
- 3.3. Programs written as a contractor
-
- Wait a minute: I'm an independent contractor to Company X,
- not an employee. I come and go as I please, get paid by the hour
- with no tax withheld, and was retained to complete a specific
- project. I frequently work at home with my own equipment. Is
- the program I'm writing a "work for hire," owned by the Company?
- Maybe, maybe not. In California, this area is full of landmines
- for employers, and gold for contractors.
-
- A contractor's program is not a "work for hire," and is not
- owned by the company, unless (1) there is a written agreement
- between the company and the contractor which says that it is, and
- commissioned work commissioned work
- +(2) the work is a ____________ ____. A ____________ ____ is one
- collective work
- +of the following: (a) a contribution to a __________ ____, (b)
- an audiovisual work (like a movie, and maybe like a video game),
- (c) a translation, (d) a compilation, (e) an instructional text,
- (f) a test or answer to a test, or (g) an atlas. I know you must
- be tired of definitions, but this is what the real legal world is
- made of. An example of a collective work is a book of poetry,
- with poems contributed by various authors. A piece of code which
- is incorporated into a large program isn't a contribution to a
- collective work, but a stand-alone program which is packaged and
- sold with other stand-alone programs could be.
-
- So where are we? If you are a contract programmer, not an
- commissioned work
- +employee, and your program is a ____________ ____, and you have a
-
- written agreement that says that the program is a "work for hire"
- owned by the greedy company, who owns the program? That's right,
- the company. But guess what? In California and elsewhere the
- company just became your employer! This means that the company
- +must now provide worker's compensation benefits for you AND UNEM-
- PLOYMENT INSURANCE
-
- 4. A Brief Word About Licenses.
-
- 4.1. Why a license?
-
- When you get software at the local five and dime, the
- manufacturer claims that you have a license to use that copy of
- the program. The reason for this is that the manufacturer wants
- to place more restrictions on your use of the program than copy-
- right law places. For example, licenses typically say you can
- only use the program on a single designated CPU. Nothing in the
- copyright law says that. Some licenses say you cannot make an
- archive copy. The copyright law says you can, remember? But if
- the license is a valid license, now you can't. You can sell or
- give away your copy of a program if you purchased it, right?
- That's permitted by copyright law, but the license may prohibit
- it. The more restrictive terms of the license will apply instead
- of the more liberal copyright rules.
-
- 4.2. Is it valid?
-
- Is the license valid? This is hotly debated among lawyers.
- (What isn't? We'll argue about the time of day.) A few states
- have passed or will soon pass laws declaring that they are valid.
- A few will go the other way. Federal legislation is unlikely.
- My argument is that at the consumer level, the license is not
- binding because there is no true negotiation (unless a state law
- says it is binding), but hey that's just an argument and I'm not
- saying that that's the law. In any case, I think businesses
- which buy software will be treated differently in court than con-
- sumers. Businesses should read those licenses and negotiate with
- the manufacturer if the terms are unacceptable.
-
- 5. I Have A Neat Idea. Can I Trademark It? What About patent?
-
- 5.1. Trademark law explained
-
- Sorry, no luck. Trademark law protects names: names of
- products and names of services. (Note that I did not say names
- of companies. Company names are not trademarkable.) If you buy
- a program that has a trademarked name, all that means is that you
- can't sell your own similar program under the same name. It has
- nothing to do with copying the program.
-
- 5.2. Patent Law
-
- Patent law can apply to computer programs, but it seldom
- does. The main reasons it seldom applies are practical: the
- patent process is too slow and too expensive to do much good in
- the software world. There are also considerable legal hurdles to
- overcome in order to obtain a patent. If, by chance, a program
- is patented, the patent owner has the exclusive right to make,
- use or sell it for 17 years.
-
- 6. CONCLUSION
-
- I know this is a long article, but believe it or not I just
- scratched the surface. Hopefully, you'll find this information
- useful, and you'll stop passing along myths about copyright law.
- If anyone needs more information, I can be reached at the address
- on the first page. Sorry, but I do not usually have access to
- the network, so you can't reach me there.
-
- Thank you. JORDAN J. BRESLOW
-
- >> *END* <<
-
- (The following is reprinted from public e-mail sources--eds.)
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- -- Computer Law - State of Wisconsin Statute --
- Chapter 293, Laws of 1981
- 943.70 Computer crimes.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- (1) DEFINITIONS. In this section:
-
- (a) "Computer" means an electronic device that performs
- logical, arithmetic and memory functions by manipulating
- electronic or magnetic impulses, and includes all input,
- output, processing, storage, computer software and
- communication facilities that are connected or related to
- a computer in a computer system or computer network.
-
- (b) "Computer network" means the interconnection of
- communication lines with a computer through remote
- terminals or a complex consisting of 2 or more
- interconnected computers.
-
- (c) "Computer program" means an ordered set of instructions or
- statements that, when executed by a computer, causes the
- computer to process data.
-
- (d) "Computer software" means a set of computer programs,
- procedures or associated documentation used in the
- operation of a computer system.
-
- (dm) "Computer supplies" means punchcards, paper tape,
- magnetic tape, disk packs, diskettes and computer output,
- including paper and microform.
-
- (e) "Computer system" means a set of related computer
- equipment, hardware or software.
-
- (f) "Data" means a representation of information, knowledge,
- facts, concepts or instructions that has been prepared or
- is being prepared in a formalized manner and has been
- processed, is being processed or is intended to be
- processed in a computer system or computer network. Data
- may be in any form including computer printouts, magnetic
- storage media, punched cards and as stored in the memory
- of the computer. Data are property.
-
- (g) "Financial instrument" includes any check, draft, warrant,
- money order, note, certificate of deposit, letter of
- credit, bill of exchange, credit or credit card,
- transaction authorization mechanism, marketable security
- and any computer representation of them.
-
- (h) "Property" means anything of value, including but not
- limited to financial instruments, information,
- electronically produced data, computer software and
- computer programs.
-
- (i) "Supporting documentation" means all documentation used in
- the computer system in the construction, clarification,
- implementation, use or modification of the software or
- data.
-
- (2) OFFENSES AGAINST COMPUTER DATA AND PROGRAMS.
-
- (a) Whoever willfully, knowingly and without authorization
- does any of the following may be penalized as provided in
- par. (b):
-
- 1. Modifies data, computer programs or supporting
- documentation.
-
- 2. Destroys data, computer programs or supporting
- documentation.
-
- 3. Accesses data, computer programs or supporting
- documentation.
-
- 4. Takes possession of data, computer programs or supporting
- documentation.
-
- 5. Copies data, computer programs or supporting
- documentation.
-
- 6. Discloses restricted access codes or other restricted
- access information to unauthorized person.
-
- (b) Whoever violates this subsection is guilty of:
-
- 1. A Class A misdemeanor unless subd. 2, 3 or 4 applies.
-
- 2. A Class E felony if the offense is committed to defraud or
- to obtain property.
-
- 3. A Class D felony if the damage is greater than $2,500 or
- if it causes an interruption or impairment of governmental
- operations or public communication, of transportation or
- of a supply of water, gas or other public service.
-
- 4. A Class C felony if the offense creates a situation of
- unreasonable risk and high probability of death or great
- bodily harm to another.
-
-
- (3) OFFENSES AGAINST COMPUTERS, COMPUTER EQUIPMENT OR SUPPLIES.
-
- (a) Whoever willingly, knowingly and without authorization
- does any of the following may be penalized as provided in
- par. (b):
-
- 1. Modifies computer equipment or supplies that are used or
- intended to be used in a computer, computer system or
- computer network.
-
- 2. Destroys, uses, takes or damages a computer, computer
- system, computer, network or equipment or supplies used or
- intended to be used in a computer, computer system, or
- computer network.
-
- (b) Whoever violates this subsection is guilty of:
-
- 1. A Class A misdemeanor unless sub. 2,3 or 4 applies.
-
- 2. A Class E felony if the offense is committed to defraud or
- obtain property.
-
- 3. A Class D felony if the damage to the computer, computer
- system, computer network, equipment or supplies is greater
- than $2,500.
-
- 4. A Class C felony if the offense creates a situation of
- unreasonable risk and high probability of death or great
- bodily harm to another.
-
- -- Penalties for Infractions --
-
- 939.50(3) Penalties for felonies are as follows:
-
- (a) For a Class A felony, life imprisonment.
-
- (b) For a Class B felony, imprisonment not to exceed 20 years.
-
- (c) For a Class C felony, a fine not to exceed $10,000 or
- imprisonment not to exceed 10 year, or both.
-
- (d) For a Class D felony, a fine not to exceed $10,000 or
- imprisonment not to exceed 5 year, or both.
-
- (e) For a Class E felony, a fine not to exceed $10,000 or
- imprisonment not to exceed 2 year, or both.
-
- 939.51(3) Penalties for misdemeanors are as follows:
-
- (a) For a Class A misdemeanor, a fine not to exceed $10,000 or
- imprisonment not to exceed 9 months, or both.
-
- (b) For a Class B misdemeanor, a fine not to exceed $1,000 or
- imprisonment not to exceed 90 days, or both.
-
- (c) For a Class C misdemeanor, a fine not to exceed $500 or
- imprisonment not to exceed 30 days, or both.
-
- >> *END* <<
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- * * * * PIRATE EDITORIAL, by * * * *
- (by Mikey Mouse)
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- BIG BROTHER IN OUR COMPUTER ROOM???
-
- Rumour has it that this August, legislation will go
- into effect making it a criminal offense to send or recieve
- electronic porn through the phones, if it crosses state lines.
- According to this rumour, the user need not know that the graphic
- was porno (which is defined as any nudity). Breaking this law
- three or more times will constitute doing so for business
- purposes, subjection the violator to confiscation of all involved
- computer equipment.
-
- Leave aside for now that on the surface this wouldn't seem to
- affect a board such as this one, that perpetrators will likely
- outnumber enforcers by several orders of magnitude, and that 15
- year olds (the median age of techno-pervs) are notoriously
- difficult to prosecute. If true, this rumour has some disturbing
- implications.
-
- First, it points to the solidification of the legislative concept
- of the electronic community as a genuine entity - almost a 'sixth
- estate', when we have thrived for so long in large part due the a
- BBS is. If it can't vote or be taxed ...
-
- Second, it brings BBS's under the scrutiny of a group that many
- find far scarier that congress, the FBI, or even the KGB - that's
- right, the Fallwellians. These morality police have clearly
- established that they have determination, large numbers of
- followers, and, of course, no morals. If they also develop
- sufficient intelligence (well, it MIGHT happen!) to realize that,
- while they can't picket a BBS, they can turn them in to the Feds,
- and badger the Feds into action, the result could be an onslaught
- of M.O.R.O.N.S (Moral Opposition to Rot Of Naughty Smut) and
- FATheads (Falwell Attack Team) infiltrating the PD, and then the
- PI boards.
-
- Seriously, though - if this does happen, it will provide one more
- reason for authorities to investigate the contents of BBS's in
- general, something that won't be good for anyone. This rumour
- rings true to me - it's just the sort of thing our increasingly
- Fundamentalist legislature would pass. I'm going to ask around
- on CIS about this, since their PBW area would be affected. If
- anyone else has info about this, I'd like to hear it.
-
- (Eds note: To contact MB, call GREAT ESCAPE (312-535-2761) and
- leave a note to "ALL")
-
- >> *END* <<
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- * * SYSOPS CORNER: WHAT'S GOIN ON AT GREAT ESCAPE * *
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- PC Board 14.1/E3 is now running. There are going to be a lot of
- new changes made in the next few weeks for the system. The board
- is going to run Emulex/2 as a PCR/Point door for files and
- messages for all members. In addition, ELITE members who have
- remained faithful to the board in support will also have full
- access to the PCBoard/Prodoor Batch system and will have FREE
- file downloading and unlimited daily time privileges granted to
- them. Except for ELITE members, all users will only have access
- to the new door for transfers and messages. Users who don't keep
- up their share of BOTH posted messages and files will recieve the
- lowest access. We expect to have Node#2 ready and running at
- 2400 baud by early August 89' so until then, 1200 Baud is no
- longer supported by this system. Don't be so cheap, get a 2400
- or 9600 modem now... We may even come up under a new
- system,location and phone number TBA...
-
- We are now offering file points for credit to all current board
- members who post 2-3 messages per logon. These messages must be
- useful and placed in their correct conference. Only messages
- pretaining to the subject matter of the conference are
- considered, no advertisements! I recommend that each message
- post be informative and more than just 1 or 2 lines. Yes, we are
- very serious. This offer stands and will be honored!
-
- I'm happy to report that the new code of PC Board 14.1 now
- supports all File compression formats including .ARC, .PAK, .ZIP,
- LZH and many others As soon as we get a new version of ProDOOR
- later than our 2.9 version, also supports these, we will allow
- all formats on this board for transfer as well as file viewing
- and extracting. The new code also directly supports EMS and
- 34800 Baud Rates with v.32 and v.42 functions.
-
- The new USR 9600 HST gets 19,200 baud Connect on PCBoard using
- old and new serial chip technology under DOS with up to 26,100
- throughput using MNP Class 5 Data compression and error control.
- We now, of course, support YMODEM-G (Registered DSZ) MNP-5
- transfers for best results.
-
- We will NO LONGER be supporting users of 1200 BAUD MODEMS OR
- CONNECTS. So if you have been connecting at 1200 thru PCP or
- using a 1200 baud modem, (Don't be so cheap, get a 2400 now...),
- you will be outta luck. In 2 years of operation, I'd say we have
- only had 2 or 3 users ever contribute regulary at 1200, so it
- seems we would be wasting our's and your time with it. Even 2400
- is slow but it's standard, so we have to support it for awhile.
- Next week, ALL 1200 callers will find a reduction in daily time
- or no time. New Users at 1200 baud will be denied access. All
- users using 4800 Baud modems or connects and above may get better
- access time and daily K than 2400 users.
-
- Added several PC Pursuit Zmodem Transmit Varients for diehard
- Pursuit users, try them for better performance on your next PCP
- DSZ download. SuperK Batch protocols are added for Jmodem,
- Super8K, and K9Xmodem batch upload and downloading -Not tested-,
- BATCH TRANSFERS are mainly for REGULAR or ELITE users. Still
- hoping to get BI-Modem going next week. Watch for some new DOORS
- coming next month. Possible Point-System Board Door running
- Emulex/2 also...
-
- NEW Private USERS are mainly allowed to download our GELIST.ZIP
- filelist. Bulletins show what we are looking for and good
- uploads get fastest access We have no time or energy to waste on
- anything else...NO DONATIONS, sorry.
- - - - - - - - -
- (If you're a sysop and want to sound off, hype your board,
- or need some info, contact us--eds.)
-
- >> *END* <<
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- * * * * WANTS AND NEEDS * * *
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- This section will cover specialized want lists, so if you have
- a program to swap or are looking for one, here's where to
- announce it.
- >> *END* <<
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- MONTHLY REVIEW: THE GREAT ESCAPE (312-535-2761)
- By -=*JEDI*=-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- How do ya review a pirate board? They ain't got no plot, popcorn,
- or 14 year old nymphettes to ogle. And if ya review one you're on
- and the sysop don't like it, off ya goes, and if the sysop's a
- buddy, then the review's gotta be good. So, I says, why not do
- THE GREAT ESCAPE? Might as well jump into the fray and piss off
- everyone. So, here goes.
-
- GREAT ESCAPE's a pretty cool board. In fact, guess it's one of
- the top 10 in the U.S. Has about half a gig of latest top line
- warez and not a lot of garbage. Nice thing about it is how it's
- laid out....files are organized into 3 main conferences, and each
- conference is subdivided into specialty areas. The newcomers'
- conference has enough stuff to keep novices happy and give them a
- chance to prove themselves. The Entertainment conference, for
- gamerz, is subdivided into a bunch of areas depending on kinds of
- games ya like, and most of the stuff is cracked. The Business
- conference is the most impressive, and has 14 areas, divided up
- into stuff like desktop publishing, telecomm, and the rest.
-
- Neatest thing about GREAT ESCAPE is that you can be pretty sure
- that the stuff will work. Maxx Cougar, the head czar and
- some-time despot, tests each one out before it goes up. If
- there's a problem, he yanks it. If the uploader just made a
- mistake, only a whipping happens. Sometimes mistakes happen, and
- if there's a problem with a program, the sysop(s) will get ahold
- of the original uploader or somebody else is around to make it
- right. There's no lame stuff, and files are nearly always
- complete, directly copied from original disks.
- Lamerz are kicked off immediately, though, so be forewarned.
-
- Biggest problem is that most of the stuff is off-line to save
- space. To get it, ya have to request it from the sysops. This can
- be a drag, 'cause sometimes they forget, but if ya keeps at 'em,
- they'll get the requested files up. Guess this is ok, though,
- 'cause it keeps room for newer stuff. Sysops don't take much
- shit, which is good, and if ya screw up an upload, be prepared
- for some public scolding.
-
- GE's pretty popular, so it's pretty hard to get on. Ya also have
- to prove yourself before higher access is given. Seems like the
- trick is to upload quality stuff over a period of time, don't be
- a jerk, post some good info in the message section, and you'll be
- ok.
-
- Users are mostly pretty cool. There's too many message
- conferences to count on my fingers, and seems there's always
- somebody around who can answer questions. One neat thing is ya
- gets credit for posting messages, but they're supposed to be
- intelligent messages, but ya don't have to use big words, which I
- kinda like.
-
- On a 10 point scale, comparing with other top boards, guess my
- rating would be
- Warez = 9.5
- Users = 8
- Messages = 8
- Sysops = 9.5
- Ease of use = 9
- --------------
-
- >> *END* <<
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- * * * * SOME OF OUR FAVORITE BOARDZ * * * *
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- 206-255-1282 ETHEREAL DIMENSION LARGEST IN NORTHWEST
- 212-519-1791 THE RUNNING BOARD BBS
- 217-328-8181 THETA-SIGMA 3/12/24 ASK FOR IBMP NODE
- 301-384-2938 GATES OF DAWN FIRM DIST. BOARD - NAPPA #1
- 303-431-2931 KILLER FAJETAS FROM HELL 150 FREE MEGS
- 303-969-8195 THE DISCORDIAN SOCIETY 12/2400 RUNNING PCBOARD
- 312-282-9279 SKI LODGE RBBS
- 312-297-5385 GAMERS GALAXY GOOD BBS
- 312-385-2764 SHADE-TREE, BBS P/D - S/W AND CONFERENCES
- 312-390-6594 DEFENDER PCBD
- 312-426-8228 THE SHOP RUNNING PC-BOARD - BACKROOM
- 312-481-2130 WASTELANDS BBS 3/12/2400 RUNNING PCBOARD
- 312-509-1816 DARK SIDE MONARCH
- 312-582-9249 FRONT LINE FORM
- 312-699-6353 GRAVEYARD FORM
- 312-749-8139 WAR ZONE TAG
- 312-756-2023 THE JOUSTING FIELDS SPECTRUM 2.1C - 42 MEGS
- 312-831-0456 FERS CENTRAL 1200-2400/SBBS
- 312-991-4639 WILD WEST MONARCH
- 404-921-4635 SUNBANE ELITE BBS 12/24/9600 135+ MGS, EMULEX
- 404-923-3870 THE DUCK ELITE BBS 12/2400 RUNNING PCBOARD
- 408-251-4689 THE PUBB BBS 3/12/2400 RUNNING EMULEX/2
- 408-268-6692 CITY OF THIEVES 3/12/2400 RUNNING PCBOARD
- 416-467-6387 EUPHORIA 160 MEGS - FIRM DIST. #1 -
- 703-971-7874 CORNERSTONE BBS THE FIRM
- 716-636-4540 PLUTONIUM MINES 160 MEGS - VGA GIFS! - PTL -
- 719-260-8472 PLAYDO LAND I 3/12/2400 RUNNING SYS-PC 2.7
- 801-485-7646 BESERKER BBS 12/2400 RUNNING PC BOARD
- 804-451-3551 THE MAGE'S LAIR 3/12/2400 RUNNING PCBOARD
- 815-895-5573 SYCAMORE ELITE OPUS (RESTRICTED)
-
- If you have the names and numbers of elite boards, pass them
- along.
-
- >> *END* <<
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- Well, we ran out of room. With luck, PIRATE will appear
- bi-monthly, but we'll see how it goes. Best way to contact us
- is through the home board. If you have any suggestions, or if
- there's something you would like to see covered, let us know, or
- better yet, write it up and call it in.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
-
- ------------------
- COMING NEXT ISSUE:
- *More on computer law
- *Viruses
- *Board of the Month
- *And more. . .
- ------------------
-
- //////////////////////////////////////////////
- / /
- / END Vol. I, No. 1 /
- / /
- //////////////////////////////////////////////
-
-