Language Selection

English French German Italian Portuguese Spanish

Online pirates pounce on new Harry Potter book

Filed under
Web

The sixth book in the Harry Potter series, the fastest-selling book of all time, has become among the quickest to fall prey to Internet piracy, with illicit copies available online within hours of its release.

Tech-savvy fans of the boy wizard teamed up to scan the entire 607 page book into digital form, with unauthorized e-book copies appearing online less than 12 hours after "Harry Potter and the Half-Blood Prince" went on sale on Saturday.

Copies of the audio version of the book were also widespread on file-trading networks such as BitTorrent.

A lawyer for author J.K. Rowling's agents, Christopher Little, said his firm was working to combat the piracy but admitted that some illicit copies would probably slip through.

"We have put in place some countermeasures but I can't disclose the specifics," said Neil Blair. "We have sent takedown notices (against Web sites hosting the illicit copies) but we haven't filed any lawsuits."

Even thousands of illicit downloads would be no more than a drop in the ocean for a book that sold 8.9 million copies in 24 hours. But the Potter piracy is likely to add to media companies' fears that online file-trading is a threat to nearly every aspect of their businesses.

In recent months the hottest movie of the summer, "Star Wars: Episode III -- Revenge of the Sith," and one of the hottest records, Coldplay's "X&Y," were both leaked online immediately after their release.

Rowling has yet to make a deal to publish her books in a downloadable format, even as Audible Inc and Apple's iTunes Music Store have used the popularity of portable music devices like the iPod to make downloadable audiobooks one of the fastest growing parts of the overall audiobook sector.

Rowling has railed against unauthorized "Harry Potter" e-books on her Web site in the past.

"You should NEVER trust any Harry Potter e-books offered for download from the internet or on P2P/file-trading networks," she wrote in January, warning they may also expose users to computer viruses or fraud.

Hard-copy piracy has also spread to India, where street vendors have been seen hawking illegal copies of "Half-Blood Prince" at steep discounts.

Source.

More in Tux Machines

BSD Leftovers

  • FreeBSD Q2'2016: EFI Improvements, Prepping For FreeBSD 11.0, Package Updates
    For FreeBSD fans not closely following its development on a daily basis, the FreeBSD project has released their Q2'2016 quarterly status report that covers various activities going on around this BSD operating system project.
  • EuroBSDCon 2016 schedule has been released
    The EuroBSDCon 2016 talks and schedule have been released, and oh are we in for a treat! All three major BSD's have a "how we made the network go fast" talk, nearly every single timeslot has a networking related talk, and most of the non-networking talks look fantastic as well.

Security News

  • Linux Security Automation at Scale in the Cloud
    Ten years ago it didn’t seem like Linux growth could increase any faster. Then, in 2006, Amazon launched Amazon Web Services (AWS). Linux growth went from linear to exponential. AWS competitors sprang up and were acquired by IBM, Microsoft, and other big players, accelerating Linux expansion even more. Linux became the platform of choice for the private cloud. But this movement wasn’t confined to the cloud. A rush to create Linux applications and services spilled over to traditional on premises. Linux had evolved from that obscure thing people ran web servers on to the backbone operating system of the majority of IT.
  • Don’t want to get hacked? Close your laptop.
    My friends often leave their computers open and unlocked. I tell them they should probably get in the habit of locking their computers, but they don’t listen to me. So I’ve created a simple project to hack my friends and show them the importance of computer security. All I need to do is wait for them to leave their computer unlocked for a few seconds, open up their terminal, and type a single, short command.
  • Citibank IT guy deliberately wiped routers, shut down 90% of firm’s networks across America
    It was just after 6pm on December 23, 2013, and Lennon Ray Brown, a computer engineer at the Citibank Regents Campus in Irving, Texas, was out for revenge. Earlier in the day, Brown – who was responsible for the bank’s IT systems – had attended a work performance review with his supervisor. It hadn’t gone well. Brown was now a ticking time bomb inside the organisation, waiting for his opportunity to strike. And with the insider privileges given to him by the company, he had more of an opportunity to wreak havoc than any external hacker.
  • Explo-Xen! Bunker buster bug breaks out guests from hypervisor
    A super-bug in the Xen hypervisor may allow privileged code running in guests to escape to the underlying host. This means, on vulnerable systems, malicious administrators within virtual machines can potentially break out of their confines and start interfering with the host server and other guests. This could be really bad news for shared environments. All versions of open-source Xen are affected (CVE-2016-6258, XSA-182) although it is only potentially exploitable on x86 hardware running paravirtualized (PV) guests. The bug was discovered by Jérémie Boutoille of Quarkslab, and publicly patched on Tuesday for Xen versions 4.3 to 4.7 and the latest bleeding-edge code.
  • Intel Puts Numbers on the Security Talent Shortage
    The cybersecurity shortfall in the workforce remains a critical vulnerability for companies and nations, according to an Intel Security report being issued today. Eighty-two percent of surveyed respondents reported a shortage of security skills, and respondents in every country said that cybersecurity education is deficient.

Android Leftovers

today's howtos