New Improved Google Search !!!!!!

Custom Search

Sep 30, 2010

MPAA Called Block WikiLeaks Worldwide

The MPAA representatives asked ACTA negotiators in Mexico to use the treaty for blocking Mexico’s and other countries access to websites like WikiLeaks, calling them “damaging”.

The Motion Picture Association of America is trying to push forward with another policy agenda, linking websites that can’t make much harm (non-commercial peer-to-peer services) with websites profiting from pirated goods. Besides, services like WikiLeaks are also there in a batch, as they are believed to be used for playing a kind of national security card.

The anti-piracy outfits like MPAA have always been trying to present the problem of unauthorized file-sharing much worse than it really is. However, it appeared to be much harder within the last years, because the industry enjoyed record-breaking revenues every year, watching worldwide ticket sales up by 30% for the last 5 years. Now, to convince others that some services pose a threat while they really don’t, they decided to link them with the services that do.

The MPAA is now reported to try and use this trick during the ongoing ACTA negotiations. Last week its representatives arrived at Mexico’s Ministry of the Economy for the information meeting and asked the negotiators if the Agreement can be used to cut off access in Mexico and other countries to the services MPAA called “damaging,” including WikiLeaks. The reason for the Association to call WikiLeaks damaging is hiding behind the ongoing conflict between the American military and the online service in question over the leak of secret papers from Pentagon related to the Afghanistan war.

So, if the outfit can get such tame websites to interests of the US, why doesn’t it focus at the websites that are really damaging? Considering the MPAA has already succeeded in convincing some of the country’s politicians that non-commercial digital piracy is the same as a commercial one, it seems it would be quite easy for it to declare that BitTorrent websites are also dangerous and should all be blocked.

As for the ACTA’s secretive negotiations, they have been almost devoid of contribution from the elected officials. Besides, some countries seem willing to wrap up the process as quickly as they only can, regardless of the apparent lack of transparency.

At the moment, the supposedly final round of negotiations on ACTA has already started in Tokyo and will continue to the end of the month.

Sep 29, 2010

Innocent Infringer Case Will be Reviewed by Supreme Court

The Supreme Court has asked for a response to the petition for writ of certiorari to be filed in by Whitney Harper over her case against Maverick Recording Company. That is a case of the fourteen-year-old girl who was found guilty of copyright violation earlier in 2010, though she didn’t even know that file-sharing was unauthorized.


The case of Whitney Harper may finally reach the Supreme Court, and that would be a very important decision, as file-sharing cases reach the courtroom of the highest court in the country very rarely.

Whitney’s attorney received a letter where the Supreme Court asks her to file a response to the petition for a writ of cert in her case. This petition is actually a paper that is filed by a losing party, where it asks the Supreme Court to review the ruling of a lower court. The petition contains the legal questions, a statement of the facts, a list of the parties, and, of course, arguments for the Court (reason why it should grant the writ).

If this data is submitted in a formal and concise way, the chances rise that the Supreme Court will decide to finally review Whitney’s case. Harper has already won one of the trials, when two years ago the US District Judge granted the girl an “innocent infringer’s” exemption, which allowed her to pay only $200 per each case of violation ($7400 in total) instead of the $750 per case of infringement stipulated in the Copyright Act. Unfortunately, this initial ruling was revoked in 2010 by the 5th Circuit Court of Appeals, which ordered her to pay the $27,750 in damages ($750 p/infringement).

Whitney Harper has argued all this time that she was an “innocent infringer”, as she had no idea of illegal file-sharing, while peer-to-peer applications failed to tell her that files available on their networks were illegal. The matter is that the “innocent infringer” exemption can be granted only if the defendant couldn’t see a proper notification of copyright that the rights holders should put on the physical CDs. While the copyright owners did placed the warning on the original of the CDs, the girl couldn’t see them as there were no physical copies in the network, only digital.

The irony is that Whitney remains liable of copyright infringement anyway, but it matters to her how much she is ruled to pay in damages, because $27,750 would entail a huge economic burden to pay in her college years.

Sep 28, 2010

AIO Wifi Hack 2010 with Tools & Tutorial(125MB)

Image AIO Wifi Hack 2010 with Tools & Tutorial(125MB)

This tool has many different tools to hack and cr@ck wifi so you can use your neighbours internet and do whatever. Tools for Windows and Linux also some nice extra tools!
* Aircrack
* Wireshark
* Ettercap
* Netstumbler
* Airsnare
* WIFIfofum
* Wdriver
* Pong
* CommView
* Airsnort
* AiroPeek
* Knsgem 2
* Aptools
* And A Nice PDF File

Linux Hacks:

* Airpwn
* WEPcrack
* Prismstumbler
* WIFIscanner
* Airfart
* Magicmap
* WPA-cracker
* Wellenreiter
* Void
* Kismet
* Cowpatty
* WIFIzoo
* And A Nice PDF File

Download:( Rapidshare & Hotfile)

Hotfile is good file hosting ! You need have a premium account to download faster.



Sep 27, 2010

How to Spoofing IP Addresses: Learn how to create custom IP packets Using tool RafaleX and Engage Packet Builder

The RafaleX application allows for the creation of custom IP packets. The packet is very customizable and allows for the spoofing of the IP, setting the flags, number of packets, and so forth. RafaleX is becoming hard to locate on the Internet as it appears it is now called Engage Packet Builder.

The RafaleX application is an excellent way to “spoof” custom packets. Attackers can place a valid IP address as the source of the packet and the target will have to attempt to respond to the spoofed address. By sending hundreds of thousands of packets in this manner, an attacker can create a Denial of Service attack against a target.
In this example, the Source IP of the packets to be sent is set to with the source address of port 123. According to Internet etiquette, this should never be able to route on the Internet as the 10.x.x.x range is reserved for Private addressing. Set the destination IP to the target address. In this example it is Set the Destination
port to port 21. The SYN and ACK flags were set for each packet.

*Note: The Ethernet communications process requires a three-way handshake:

SYN: Synchronize
SYN-ACK: Synchronize-Acknowledge
ACK: Acknowledge

When a computer receives an uninitiated SYN-ACK packet its response is to send a RST (Reset) packet.
The number of packets was set to 100. Click the Send button to send the packets to the target. The Status area at the bottom left of the application will tell you that the packets were sent.
The proof is below screen shot captured from packet capturing tool

Sep 26, 2010

How To Hide a hard Disk partition in Windows XP or Vista

You may need to hide a drive either for security reasons (to ensure that children do not have access to a backup drive, for example) or for practical reasons (if your PC has multiple memory card readers never used).
Here’s how to do so, under XP and Vista.
A command in the registry will tell Windows Explorer not to display some readers.
Technically, the system uses a binary value of 32 bits where each bit corresponds to a reader. Bit 0 is the drive A, bit 1 in drive B, etc.. When this bit is “1″ the player is hidden, otherwise it is visible.
  • Go to Start, then Run and then type regedit.
  • Deploy the “HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/CurrentVersion/Policies/Explorer”
  • If the DWORD (32 bit) named NoDrives does not exist, start by creating (click the right mouse button and select New then Value DWORD).
  • Double-click NoDrives to amend this item, select Base Decimal and enter into the data field the decimal value of the player to hide (e.g. 512 for the drive J: )
  • If you hide multiple drives, take their different decimal values and add them.
  • A: 1
  • B: 2
  • C: 4
  • D: 8
  • E: 16
  • F: 32
  • G: 64
  • H: 128
  • I: 256
  • J: 512
  • K: 1024
  • L: 2048
  • M: 4096
  • N: 8192
  • O: 1638
  • P: 32768
  • Q: 65536
  • R: 131072

Sep 24, 2010

Famous SMS website Stop SMS bcoz of " AYODYA VERDICT".

    * Dear User,
    * The Bad news is that Way2SMS has Stopped Message Delivery starting from 1 AM today. Central Govt of India has issued a directive to stop all Bulk Messaging activity temporarily ahead of "AYODYA VERDICT".
    * Way2SMS resumes its message delivery as soon as telecom operators opens delivery from their end.In the meantime, if you'd like updates on this, try visiting way2sms after 6 hours from now.
    * We regret to the inconvenience caused during this period....looking forward for your support and cooperation.
    * -
    * WAY2SMS Team. More Info.visit ...

Sep 20, 2010

WWE The Rock Just Bring It

Complete name : WWE The Rock Just Bring It (2002) Dvd-Rip.avi
Format : AVI
Format/Info : Audio Video Interleave
File size : 420 MiB
Duration : 1h 16mn
Overall bit rate : 764 Kbps
Writing application : MEncoder UNKNOWN-4.4.1
Writing library : MPlayer

Format : MPEG-4 Visual
Format profile : Streaming Video@L1
Format settings, BVOP : Yes
Format settings, QPel : No
Format settings, GMC : No warppoints
Format settings, Matrix : Default
Codec ID : XVID
Codec ID/Hint : XviD
Duration : 1h 16mn
Bit rate : 665 Kbps
Width : 512 pixels
Height : 384 pixels
Display aspect ratio : 4/3
Frame rate : 29.970 fps
Resolution : 24 bits
Colorimetry : 4:2:0
Scan type : Progressive
Bits/(Pixel*Frame) : 0.113
Stream size : 366 MiB (87%)
Writing library : XviD 50


Format : MPEG Audio
Format version : Version 1
Format profile : Layer 3
Codec ID : 55
Codec ID/Hint : MP3
Duration : 1h 16mn
Bit rate mode : Variable
Bit rate : 85.5 Kbps
Channel(s) : 2 channels
Sampling rate : 48.0 KHz
Resolution : 16 bits
Stream size : 47.1 MiB (11%)
Alignment : Aligned on interleaves
Interleave, duration : 24 ms (0.72 video frame)
Interleave, preload duration : 475 ms

Sep 19, 2010

“Firefox 4: beta release of Mozilla's new browser”

Firefox 4 Beta includes an updated Windows and Mac interface that's sleeker and easier to use. (Linux version is coming soon!)

New Tab Location

Tabs are given top visual priority for more efficient and intuitive browsing.
New Tab Location screenshot

Feature Spotlight

Stay in Sync

Synchronize your settings, passwords, bookmarks, history, open tabs and other customizations across multiple devices so you can take Firefox with you wherever you go.

Organize Your Tabs

Reclaim your browser from tab clutter! Drag and drop your tabs into manageable groups that you can organize, name and arrange in a fun and visual way.

Manage Your Add-ons

An easier way to manage your add-ons and discover new options for personalizing your browsing.

OS requirements for Firefox:

Sep 18, 2010

Internet explorer 9 - Beta version ...

What’s new in Internet Explorer 9?

The improvements to Internet Explorer are as much about what you don't see as what you do see. Internet Explorer 9 has a streamlined design, fewer dialog boxes to click through, more intuitive navigation, and many new features that speed up your web browsing experience. Features like Pinned Sites let you pin your favorite website directly to the taskbar for one-click access. Other features, like hardware acceleration, deliver an all-around faster browsing experience. With Internet Explorer 9, websites perform and feel more like the programs you use every day on your PC.
Here's what's new:

Streamlined design

The first thing you'll notice when you open Internet Explorer 9 is the compact user interface. Most command bar functions, like Print or Zoom, can now be accessed by clicking the Tools button, and your favorites appear when you click the Favorites button. Otherwise, Internet Explorer gives you the basic controls you need, and lets the web take center stage.
Streamlined design in Internet Explorer 9 Internet Explorer 9 puts the focus on the web
Note If you want to restore the Command bar, Favorites bar, and status bar, right-click to the right of the New Tab button, and then select them on the menu.

Pinned Sites

If you visit certain webpages regularly, Pinned Sites allows you access them directly from the taskbar on your Windows 7 desktop.
A pinned site on the taskbar Pin sites to your task bar for instant navigation
Pinning a site is simple: click the icon to the left of the web address in the address bar (or the website icon on the New Tab page) and drag it to the taskbar—the website's icon will stay there until you remove it. When you click the icon later, the website will open in Internet Explorer.
Whenever you open a pinned site, the website icon appears at the top of the browser, so you have easy access to the website home page. The Back and Forward buttons change color to match the color of the icon.

Download Manager

Download Manager is a powerful new feature that keeps a running list of the files you download from the Internet and notifies you when a file could be malicious. It also lets you pause and restart a download—if you have a slow internet connection—and shows you where to find downloaded files on your computer. You can clear the list at any time.
Download Manager Keep your downloads in order with Download Manager

Enhanced tabs

Tabbed browsing allows you to move easily between multiple open webpages in a single window, but there might be times when you want to look at two tabbed pages at the same time. Tear-off tabs allow you to drag a tab out of Internet Explorer to open the tab's webpage in a new window, and Snap it for side-by-side viewing.
Tear-off tabs shown side-by-side See two tabs side-by-side with Tear-off tabs
Tabs are also color coded to show which open webpages are related to each other—to give you a handy visual reference as you click between tabs.

New Tab page

The redesigned New Tab page displays the sites you visit most often and color codes them for quick navigation. A site indicator bar also shows how often you visit each site, and you can remove or hide the displayed sites anytime you like.
The New Tab page The New Tab page

Search in the address bar

You can now search directly from the address bar. If you enter a website's address, you'll go directly to the website. If you enter a search term or incomplete address, you will launch a search using the currently selected search engine. Click the address bar to select your search engine from the listed icons or to add new ones.
Search terms in the address bar Type a search term in the address bar to find what you're looking for
When you search from the address bar, you'll have the option of opening a search results page or the top search result (if your search engine supports the feature). You can also get optional search suggestions in the address bar—but they are off by default, in case you don't want to share what you type with a search provider.

Notification Bar

The Notification Bar that appears at the bottom of Internet Explorer gives you important status information when you need it, but it won't force you to click a series of messages to continue browsing.
The Notification Bar The Notification Bar gives you information without getting in your way

Add-on Performance Advisor

Add-ons, such as toolbars, can enhance your browsing experience, but they can also slow it down. Add-on Performance Advisor tells you if an add-on is slowing down your browser performance, and then allow you to disable or remove it.

Add-on Performance Advisor Experience better browsing with Add-on Performance Advisor

Hardware acceleration

To speed up performance, Internet Explorer uses the power of your computer's graphics processor, also known as a GPU, to handle graphics-heavy tasks like video streaming or online gaming. By tapping into the GPU, Internet Explorer delivers a faster and more immersive web experience.

~~~~~ DOWNLOAD HERE ~~~~

Sep 17, 2010

10 Amazing Torrent Sites

The order is pretty arbitrary, if you don’t like it, make your own list ;)
If you’re looking for high speed downloads, you might want to check out Usenet.
For your consideration

1. Torrentz

Alexa Rank: 1492

2. Mininova

Alexa Rank: 290

3. ThePirateBay (update: 25 Pirate Bay alternatives)

Alexa Rank: 427

4. Demonoid (private)

Alexa Rank: 470

5. Isohunt

Alexa Rank: 720

6. Meganova

Alexa Rank: 8970

7. BiteNova

Alexa Rank: 11558

8. BitTorrent

Alexa Rank: 1468

9. Torrentbox

Alexa Rank: 4360

10. TorrentReactor

Alexa Rank: 9103

10.1 Fenopy

10.2 SumoTorrent

10.3 Snarf-It

Sep 16, 2010

How to create a torrent?

t’s not that I have anything against msn (although the file transfer sucks), but why don’t just use BitTorrent? Especially if you want to send something to more than one person, or if you want to share high quality HDTV files, because then you can share the bandwidth.
So how do you do this? Well it’s very simple. Open your favorite BitTorrent client and do the magic trick:
file > create torrent
That’s all? Well almost. All you need to do now is put in the tracker info and tick some boxes. This can differ somewhat from client to client but it all comes down to the same thing.
utorrent bit torrent
1. File > Create new Torrent (or CTRL + N)
2. Select the files and or directories
3. Trackers: This is probably the hard part for most people. But it’s pretty easy, just put in one of the popular public trackers. You can use one or more trackers, but in general one is enough.
Here are some good trackers you can use:
Put one of these in the tracker box
4. Do NOT tick the private torrent box (unless you’re using a private tracker)
5. Save the torrent and send it to your friends
bitcomet bit torrent
1. File > Create Torrent (or CTRL + M)
2. Select the files and or directories
3. Select “enable public DHT network” from the dropdown box
This way you can be your own tracker if the public tracker goes down.
4. Tracker server and DHT node list
Again, This is probably the hard part for most people. But it’s pretty easy, just put in one of the popular public trackers. You can use one or more trackers, but in general one is enough.
Here are some of the most popular trackers at the moment:
Put one of these in the tracker box
5. Save the torrent and send it to your friends
azureus bit torrent
1. File > New Torrent (or CTRL + N)
2. Tick “use an external tracker”.
And again, This is probably the hard part for most people. But it’s pretty easy, just put in one of the popular public trackers.
Here are some of the most popular trackers at the moment:
Put one of these in the tracker box
3. Select single file or dicectory, click NEXT and point to the file or directory you want to share, and click NEXT
4. Do NOT tick “private torrent”
5. Do tick “allow decentralized tracking”
6. Save the torrent and send it to your friends

Sep 15, 2010

Why BitTorrent Works

Well, lets take a sneak peek under the hood of your BitTorrent client, and list a couple of features that make BitTorrent as fast, stable, and robust as it is.
How it all Starts
BitTorrent starts with chopping a file into small pieces, the person who starts sharing the file (initial seed) sends those small pieces to available peers in the swarm. The BitTorrent protocol makes sure that the seed sends a unique piece to everyone, so they can immediately exchange these pieces with each other.
Thus, the great advantage is that everyone starts sharing pieces of the file right away.
Fair trading
BitTorrent swarmOnce you have a little piece of the file, your BitTorrent client tries to find other people who might be interested in the pieces you have. The BitTorrent protocol works as a tit-for-tat game, you only upload pieces to people who offer something to you. The more you upload to others, the more you receive.
This fair trading principle prevents free-riders from stealing your precious bandwidth.
Once you’re trading pieces with someone, the BitTorrent client keeps a close eye on this peer, as soon as the other side stops sending you data it will stop sending as well (choke). In the meantime, your client keeps searching for other peers It randomly sends data to peers who are interested (optimistic unchoke) to see if that peer is a potential trading partner.
Selecting pieces
So what pieces does your client sent first? Well, BitTorrent works with a “rarest piece first” scheme. Your BitTorrent client generally looks for the rarest piece that’s available among the peers in the swarm. This makes sure that the most common pieces are still available at the end and may prevent people from getting stuck at 99%.
Seeders & New Peers
Seeders don’t stop sending out pieces of course, but the rules change a bit. As a downloader the client determines the best peer by the upload/download ratio. A seeder however is only interested in peers with a high upload speed, so these fast uploaders can send the pieces to other peers, and speed up the overall speed of the swarm (seeds + peers).
New peers (without pieces) are more likely to receive a piece of the file at random. Besides this, new peers are not bound to the rarest piece first restriction. This makes sure that a new peer receives a “piece” as quick as possible, so he can share it with others.

Sep 14, 2010

How To Avoid Spies On BitTorrent

Most anti-piracy outfits and other organizations that track BitTorrent users rely on information they obtain from BitTorrent trackers. This is an easy and convenient technique to gather info, but also one that can be circumvented.
Let’s assume you want to download ‘Steal This Film’ without being spied on by third parties that monitor the download. Impossible? Not really…
Pretty much all BitTorrent clients allow users to remove the trackers from a torrent before downloading. In uTorrent you can do so by clicking the advanced button in the torrent opening dialog box. You’ll then see the trackers included in the torrent plus some other info.
If you want to go trackerless you’ll have to delete the trackers and make sure that the DHT, Peer Exchange and Local Peer Discovery boxes (see screenshot) are checked otherwise you you won’t be able to download at all.
That’s it…
We have to note that it’s by no means impossible to track people who download without a tracker. It’s just harder to do so and thus far we haven’t seen evidence that DHT tracking is being used.

Sep 13, 2010

How an Anti-Piracy Firm Became Banned In Its Own Country

The road to curtailing the Swiss activities of Logistep has been a long one and although it ended in Switzerland, the complaints began in France.
Back in 2007, Razorback, the non-profit group which previously administered the well known Razorback eDonkey server, alerted data protection authority Préposé fédéral à la protection des données et à la transparence (PFPDT) about the activities of Logistep.
Logistep works in a particularly controversial area of anti-piracy action. It collects the IP addresses of those it believes are sharing its clients’ media on the Internet and that data is then used to identify them through the courts. Once found, they receive cash demands to make lawsuits go away.
The company’s work came to light in France when hundreds of file-sharers received letters accusing them of sharing the game Call of Juarez. For Elizabeth Martin, the lawyer who did Logistep’s work in France, the experience was not a happy one.
As originally reported by Numerama, The Commission Nationale Informatique et Libertés (French Commission of Freedom and Computings, roughly the equivalent of the Préposé Fédéral in Switzerland) stated that because Martin had failed to declare her activities, her work in this area was illegal.
Furthermore, Martin also became the subject of a disciplinary investigation conducted by her own peers. Condemning her, a lawyer’s disciplinary board declared, “By choosing to reproduce aggressive foreign methods, intended to force payments, the interested party also violated [the code] which specifies that the lawyer cannot unfairly represent a situation or seriousness of threat.”
Martin was ordered by the disciplinary board to suspend her activities as a lawyer for 6 months and she was banned from belonging to lawyers’ professional associations for a period of 10 years. France had not gone well for Logistep and back in Switzerland, things were heating up.
In January 2008 the Swiss data protection authority (Préposé fédéral à la protection des
données et à la transparence) published a recommendation that Logistep stop collecting IP addresses in Switzerland. Among other things it argued that it was unacceptable that Logistep collects data without the knowledge of people involved and that the systematic collection and recording of data in order to track violations of copyright does not conform to the purpose of the P2P applications.
Logistep was dismissive of the request (the Préposé can only make recommendations) and vowed to carry on regardless. It did just that. In response the Préposé – with the assistance of the former Razorback administrator mentioned earlier and his lawyer Sébastien Fanti – filed a lawsuit.
In June 2009 the Federal Administrative Court (TAF) came to a decision, one which saw it overrule the Federal Data Protection commissioner’s decision of 2008.
While the Court acknowledged that the monitoring and data harvesting activities conducted by Logistep raised privacy concerns, it decided that those concerns were trumped by the needs of the anti-piracy company. In a nutshell, since there are few other ways to deal with this type of online piracy, the end justified the means. Logistep could continue.
Refusing to accept this decision, the Préposé decided to appeal the ruling. Yesterday that road came to an end and it was bad news for Logistep.
In a ruling by the Federal Court – which is final and cannot be appealed – the activities of Logistep were declared illegal in Switzerland.
From a panel of 5 judges, the vote was 3 to 2 in favor of the Préposé and against Logistep, with a statement that the breaches of privacy carried out by the company were illegal. Even the judges who believed that Logistep acted legally agreed that IP addresses are private data.
According to Numerama, who have followed this case closely, the ruling was public which is unusual in these types of case. This type of arrangement is usually there to make clear a court’s intent to set a precedent.
The ruling means that it is now illegal to collect IP addresses in Switzerland with the aim of later filing a lawsuit, and the ruling reinforces the notion that IP addresses are private data. Furthermore, it seems unlikely that Swiss courts will accept IP addresses gathered from outside the country as evidence against suspected file-sharers either.
For Logistep, however, with a flick of a switch or two it will be business almost as usual. They have already announced a relocation of their data harvesting operation to Germany.
For former Razorback admin bile666, the battle goes on. Despite complying with notice and takedown requests, several years ago the Razorback eDonkey server was seized and that lawsuit continues today.
However, in light of this Swiss decision, TorrentFreak is informed that lawyer Sébastien Fanti and bile666 are seriously considering filing lawsuits against the IFPI and other companies that collected Swiss IP addresses so that criminal proceedings can also be initiated against them.

Sep 12, 2010

6,000 Song File-Sharer Arrested in Sweden

Lots of file-sharers across Sweden seem to be inspired by their flagship website – The Pirate Bay, going on to distribute files via BitTorrent protocol, in most cases unhindered and unconcerned by possible legal circumstances. However, for those who choose some other methods of downloading it may end up badly, because police has arrested another user for sharing large quantities of copyrighted content.

Swedish police continues to make relatively insignificant but regular attempts by arresting users they are able to prove are sharing large quantity of tracks all at once. Last Friday the police targeted another individual.

The police recently carried out another operation in central Sweden against, as they call it, a suspected “pirate network”. They were acting on a tipoff from IFPI, a record industry group, when carried out the raid in the Ostersund region. There they arrested an individual suspected of sharing about 6,000 songs in the Internet.

Henrik Rasmussen, a prosecutor, confirmed that the police have received a warning from the record industry’s association. The information provided to them led to an address outside Ostersund, where they made a seizure of computer media. At the same time he suggested that the arrested user confessed to his activities.

The prosecutor admits that the offense can result in a jail sentence. However, going on earlier cases, the court might hand down a suspended sentence or fines.

Over the last years Sweden has perhaps generated more news regarding file-sharing than any other country in the world. Thanks to the activities of The Pirate Bay and Piratbyran, this country with population of less than 10 million has consistently punched above its weight.

Despite the attempts made by copyright holders, Swedish file-sharers continue their activities, even in the face of tighter laws, and the number of subscribers using BitTorrent networks is still increasing. However, people who prefer shared-folder type file-sharing methods might be in danger, like the user arrested in Ostersund. The latter was using Direct Connect to share content, and it’s quite easy to prove large scale violation against Direct Connect users, while proving the same against BitTorrent users is not. That’s the reason why BitTorrent users usually escape police attention.

Sep 10, 2010

Pirate Bay Documentary Collected Enough Money to Release

The moviemakers working on a documentary about the world’s largest BitTorrent tracker website The Pirate Bay called “TPB: AFK” (The Pirate Bay: Away From Keyboard), has reached their goal of $25,000. That’s the exact amount they needed to pay to film editor and for renting a studio to make an observational, character-driven movie about 3 men whose hobby website launched a global political movement.


A couple of Swedish moviemakers have managed to collect enough donations to bring their film “The Pirate Bay: Away From Keyboard” to reality. Actually, the amount of money they needed to create the documentary has already been surpassed so far, exceeding $26,500.

This movie can prove to be a defining piece in the picture of 3 Pirate Bay co-owners and their early years and long-lasting fights with right owners, which ended up with a conviction for the copyright violation this past spring. However, the final decision has yet to be determined at the Court of Appeals, the hearing scheduled on September 28th.

The moviemakers call the film, 2 years in the making, a documentary about 3 computer addicts who managed to revolutionize the media distribution industry with their hobby website. Three guys, Tiamo, Brokep and Anakata – a tree hugging eco activist, a beer crazy hardware fanatic and a paranoid cyber libertarian, managed to force the White House to threaten the Swedish government with trade sanctions. The movie “The Pirate Bay: Away From Keyboard” showed what the pirates that Hollywood hates most went through on a personal level.

Besides the Pirate Bay co-founders, the documentary also features representatives of the video game, film and music industries, discussing their views on file-sharing. The representatives of Antipiracybureau, IFPI and MPAA act as the plaintiffs in the court, saying that their country, Sweden, became a literal pirates nest.

“The Pirate Bay: Away From Keyboard” is neither a fan film about the BitTorrent tracker, nor a journalistic work on copyright problem. The filmmakers describe it as an observational, character-driven movie about 3 men whose hobby website forced a global political movement. The release date of the film is scheduled to after the trial on October 15th, which is only 6 weeks away.

Thanks to TorrentFreak for providing the source of the article

Subscribe via email N get Tips

Enter your email address:

Delivered by FeedBurner

Label Cloud

2009 (1) 2010 (3) 2011 (1) 2011 IPL Player (1) 3 IDIOTS (1) 3G dongle (1) Academics (3) ACCOUNT (1) ACRTICALS (3) acta (1) Addons (1) ADSL Router (1) Adzero (1) AIRTEL (14) Airtel 3G (1) airtel Grps (1) airtel proxy (1) android (3) Android Phone (3) Android Phone codes (1) ANTIVIRUS (7) ARP hacking (1) BAT (2) BHUVAN (1) BIOS (2) bitcomet (16) BITTORRENT (21) BLOG (4) BLOGGER (5) blu ray (1) BOLLYWOOD LATEST MOVIES (4) BOLLYWOOD MOVIES (4) BOOK (2) British rapper (1) BROADBAND (4) BSNL (7) BTJunkie (1) BTJunkie Shut down (1) BTJUNKIES (17) Cabana (1) calender (2) Caller ID (1) CAM RIPS (8) CAPCHA (1) CAT (1) CCNA (6) CCNP (1) CES 2011 (1) CHAT (2) CHATING (1) CHATTING (1) CHINA (3) Christmas (1) CID (1) CISCO (8) CISCO PRESS (2) CLONING (1) CODE (5) COLLECTION (2) COMMAND (2) CRACK (26) crack key (3) CRACKSOFTWARE (11) CSS (1) DAILY MOTION (1) Dan Bull (1) DAP (1) data backup (1) data storage (1) dekstop (1) Delhi 100 Year (1) DESI TORRENTS (20) DISK (1) DIY (1) DOCOMO (2) Docs (1) DOWNLOAD (13) DragonBall Browser (1) dvd (1) DVD Rip (12) dvd vs blu ray (1) E-mail (1) Ebook (7) EDUCATION (3) ERROR (3) ESET (1) ET (4) EXAM (8) EXPLORER (2) EXRTA TORRENT (20) extratorrent (10) FACEBOOK (8) facebook hacking (6) FACEBOOK TIMELINE (2) FACEBOOK Tips (1) FAT32 (1) FILESHARNING (1) FIRE FOX (14) First Bamboo Smartphone (1) FIRST ON NET (1) FOLDER (2) FORMAT (1) Free DNS (1) FREE GPRS (22) FREE MMS (12) FREE SMS (16) freesoftware (6) FRIST ON NET (1) FTP (1) full software (25) FUNNY (3) G.D (1) G.D. (1) GAME HACKING (12) GAME KEYS (2) GMAIL (12) GMAIL HACKING (16) GMAT (1) GNS3 (1) GOOGLE (53) GOOGLE CROME (20) Google Doodles (3) GOOGLE EARTH (23) Google Global DNS (2) Google Map. (1) Google Nexus (2) Google Nexus mobile (2) Google Open DNS (2) google pulgins (16) google Search Tips (7) google software (5) Google Tip (6) Google Tricks (6) GOOLGE HACK (35) GSM (2) gsm hack (1) GTALK (7) GURU OF HACKING (8) H (3) HA (1) HAC (3) HACK (100) HACKER (39) Hackers (14) HACKING (76) HACKINGTOOLS (38) Happy holidays (1) Happy holidays 2011 (1) HARDWARE (2) HOLLYWOOD MOVIES (4) hotmai (1) How To (1) how to backup data (1) how to store data (1) HSTR (2) HTML (1) HUTCH (2) I-PHONE (4) I-phone 4 (3) I-Phone 5 (3) I-Phone 5 Leak (2) I-phone Leak Video (2) IDEA (6) IDM software (1) IE (8) IE8 (6) IE9 (6) India Delhi (1) INFORMATION (3) INTERNET (22) IP-ADDRESS (6) iPhone 3 (1) iPhone 4s (1) iPhone 4s Tariff plan for india (1) iPhone 5 (1) iPhone4 (1) IPL 2011 (1) IPL 4 Auction News (1) IPL4 (1) IPLT20 Schedule (1) ISOHUNT (2) ISP (2) IT (2) jingle bells (1) JOKES (2) JTO 2009 (1) KEY (4) KeyBoard (1) Keyboard Tips (1) Kieron-Scott (1) KUTCH (1) learning software . Photoshop (2) lightroom (1) long term data backup (1) long term storage (1) Lumia 710 (1) Lumia 800 (1) MAC (2) MAC OS (1) Malware (1) Mango (1) MANGO Mobile OS (1) MANGO OS (2) MAT (1) MBA (3) Meego (1) MESSENGER (3) METACAFE (1) MICROSOFT (7) Microsoft Onenote (1) Microsoft PowerPoint (3) MOBILE (41) MOBILE CODES (27) Mobile Memory Card (1) Mobile Repair. (2) Mobile Save (1) mobile software (1) MODEM (2) MOTOROLA (2) MOUSE (1) MOVIES (5) MS-DOS (4) MS-OFFICE (3) MS-OFFICE KEYS (2) MSN HACKING (7) MSN PASSWORD (11) MTV (2) MYSPACE (1) N-SERIES (1) Network (5) NETWORKING (6) new camera (1) New Year (5) NEWS (3) NOD32 (1) NOKIA (10) Nokia lumia (1) Nokia Lumia 800 (1) Nokia Lumia 820 (1) Nokia Lumia 900 (1) Nokia Lumia 920 (1) Nokia Mango (2) Nokia meego (2) Nokia N9 (1) NORTON 360 (1) NOTEPAD (1) NOTIFICATION (1) NTFS (1) OPERA (5) ORKUT (16) ORKUT HACKING (18) ORKUT VIRUS (8) OUTLOOK (4) P2P (10) PAPER (1) PASSWORD (7) PC SUITE (3) Peer To Peer (8) PENDRIVE (1) PHILIPS (1) PHOTO (2) photoshop (1) pipa (1) Piracy (13) PIRATESBAY (26) PRINTER (1) PROXY SITES (3) (1) RAPID HACK (6) rapidshare (1) Rapper protests piracy (1) REGISTRY (4) Reset Your Mobile Memory (1) RESULTS (4) ROADIES (4) Roadies 8.0 Raghu Rajiv RAnvijay Bani Roadies 5.0 Roadies 6.0 Roadies 7.0 (2) ROUTER (4) RSS (1) S60 (5) SAGEM (2) SAMSUNG (7) SARDAR (1) SCPIRTING (5) SCRAP (2) Search by Image (1) secret codes (2) Secure Your Computer (1) SECURITY (6) Serial key (2) SETTING (2) Shirt (1) SIM (1) SIMULATOR (3) SITEMETER HACK (1) SKYPE (1) Smartphone (1) SMS (7) SOFTWARE (17) Songs (1) (1) SOPA (2) SOPA Cabana (1) SPAM MAIL (3) statcounter (1) STD (1) storage (1) suraj fake (1) SYSTEM (1) T (1) TAG (1) Tango OS (1) TECH NEWS (1) THEMES (3) Timeline (1) TIMEPASS (4) TIP (110) TIPS (126) TNA (1) TOOLBAR (1) TOOLS (7) torrent (23) TORRENT HACK (9) TRICK (187) TROJAN (4) TUTORIAL (1) TV (1) TWEAK (8) UK (1) Unlimited Download (1) unlocking (1) UNRATED EDITIONS (3) USB (9) USB dongle (1) UTORRENT (15) VIDEO (4) Virus (2) Virus google (1) Virus total (1) Virustotal (1) VODAFONE (5) w3 counter (1) WAY2SMS (2) website (1) WI-FI (14) WINDOWS (96) WINDOWS 7 (44) windows 7 GodMode (2) Windows 7.5 OS (5) Windows 8 (9) windows 8 installation (2) WINDOWS VISTA (27) WINDOWS XP (92) windowsphone (1) Winzip (1) WIRELESS (12) WORDPRESS (1) WP7 (3) WP8 (3) WVIL (1) WVIL unbelievable (1) WWE PAYPER VIEW (1) WWE RAW (1) WWE SMACKDOWN (1) (5) XAT (1) XP Password (2) Xvid (9) YAHOO (18) YAHOO HACKING (11) yahoo messanger (4) YOUTUBE (9) YOUTUBE dOWNLOAD (3) YOUTUBE DOWNLOADER (3) youtube new look (2) zip7 (1)