I think all those mp3.com style things suck badly. Those installations with the "Play" button and tons of cookies. Where do you get real mp3 files for download ? With lynx... ? Netscape sucks badly. Its ok, but all those useless decorations.... Anyway: ---------- Forwarded message ---------- Date: Tue, 9 May 2000 19:02:12 +0200 From: bleed <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: MP3 Police hi .... von: http://slashdot.org/article.pl?sid=00/05/08/107227&mode=flat zum vorgehen von netPD aka mp3police, Metallicas Service zur Identifizierung von Napsterusern auf der mal wirklich gruendlichen diskussion auf http://slashdot.org ----------------------------> That's a lure for script kiddies (Score:2) by anticypher ([EMAIL PROTECTED]) on Monday May 08, @08:15PM EDT (#282) (User Info) http://127.210.19.3/index.html All the probes are coming out of a cable system in the UK. Look on whois.ripe.net for the real source inetnum: 62.254.209.128 - 62.254.209.159 netname: MP3PLTD descr: Internet applications for the music industry. admin-c: BW2097-RIPE tech-c: COH1-RIPE person: Bruse Ward address: 1st Floor,Godolphin House address: 2 The Avenue address: Newmarket Suffolk. CB8 9AA phone: +44 1633 670000 e-mail: [EMAIL PROTECTED] nic-hdl: BW2097-RIPE changed: [EMAIL PROTECTED] 19991221 source: RIPE but can't find the registry contact for mp3police.co.uk, it seems to be hosted at Xara.net. According to logs, mp3police.co.uk were actively scanning http, ftp, and napster style connections starting in mid-april. Machines were under occasional cyber-attack by groups of 5 machines, each taking turns probing different services and trying to walk ftp trees on a few anonymous-login servers, and ignored robots.txt on the web servers. Couldn't tell from the logs what they were looking for, but since they didn't try to rattle any exploits, the rogue bots were ignored for more immediate threats. It should be noted that for a while they were attempting napster type connections on whole banks of IP addresses, whether or not the nodes were running napster. It shows up kind of funny in the security logs when routers are probed by a rogue napster client. So their scanning pre-dates the lawsuit, or else there were preparations for the suit going on for a long time. I think mp3police or netpd have been getting ready to sell their services to the first lawsuit to come along. They've collected tons of logs over a period of months, and then when metallica hit the news their marketing guy contacted the lawyers. I wonder what their business plan looks like :-) ---------------> cu bleed

