decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
is *that* normal practice? | 559 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
is *that* normal practice?
Authored by: Anonymous on Wednesday, January 16 2013 @ 07:58 AM EST
Quoting from the document text:

"Later that day, beginning at 11:00 am, the Secret Service
assumed control of the investigation"

Let me see: Someone is making a copy of what comes down to a
'public library', and upon detecting that, the 'Secret
Service' is called in ???

Is *that* normal? I had to read that three times before
actually believing I read that.

If true, I'd like to know what you folks do to someone who is
found to have parked his car in the wrong place.

[ Reply to This | Parent | # ]

MIT's Role as Described in Aaron Swartz's October Motion to Suppress ~pj
Authored by: Anonymous on Wednesday, January 16 2013 @ 09:11 AM EST
I don't think the "soul searching" of MIT is going to be
conducted like any other business. They have specifically
taken the step of appointing Hal Abelson to assess the whole
matter. Even Lawrence Lessig has stated that he believes Hal
will make a thorough and comprehensive investigation, and it
will likely have some poignant lessons for the institution.
Unfortunately, the environment of MIT may not be the same
again after the this tragedy.

[ Reply to This | Parent | # ]

no
Authored by: designerfx on Wednesday, January 16 2013 @ 09:48 AM EST
MIT is at fault, opencourseware is not. Let's not put good
intentions in with the bad.

[ Reply to This | Parent | # ]

MIT's Role: is this some overpaid administrator's decision inertia
Authored by: Anonymous on Wednesday, January 16 2013 @ 11:28 PM EST
I can't help but think why do universities pay so much money to these
administrators (millions).

In these types of positions, administrators are essentially without oversight or
check and balance on their decision.

Once the MIT administrator(s) involved made the decision, they could not afford
to back down.

So they sacrificed Aaron Schwartz to save face and their overpaid careers?

People just can't admit that they are wrong in the current environment -- too
costly and too risky. So they spiked someone to survive. Just like the mafia.

[ Reply to This | Parent | # ]

How is this different?
Authored by: Anonymous on Thursday, January 17 2013 @ 11:38 AM EST
How is boycotting Opencourseware different from boycotting Sony products? Sony
makes some great hardware, especially in the pro video area. You send a message,
that's what it's about. Do you think an apology will fix things? MITs feet
need to be held to the fire. I hope they get their pants sued off, and lose.

[ Reply to This | Parent | # ]

Changing MAC Addresses
Authored by: celtic_hackr on Thursday, January 17 2013 @ 03:14 PM EST
I have a wireless router. One of the functions it has is to "mimic" a
MAC address. There are only three reasons to change the MAC of a device.

1) You are replacing a piece of equipment and you have connections that rely on
MAC addresses.

2) You need to get around a filter, that got triggered by a certain MAC
address.

3) You are trying to hide your real MAC address.

Reasons 2 and 3 could be for either legitimate or criminal reasons.

But consider this. You get banned from a network, and your MAC address is used
to block you. You have two solutions available.

Change your MAC address by :
1) software,
2) installing a different network device.

Now if installing a different network device in order to get around a MAC
filter, then how do you differentiate from the people buying network cards for
legitimate reasons and those trying to bypass some MAC filter. Does that also
mean that if I replace my cablerouter I can't spoof my old MAC address, and have
to make a support call and have them change my record? The support folks will
likely tell me how to spoof my old MAC address.

But clearly Aaron was walking on the grass even though there was a, sort of, do
not walk on the grass sign.

[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )