Group pp

387 views

Published on

Illegal Downloading pp

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
387
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Group pp

  1. 1. DOWNLOADING<br />
  2. 2. The Internet<br />The origins of the Internet reach back to research in the 1960s<br />It was commissioned by the United States government for military purposes.<br />Commercialised in the mid 90’s<br />
  3. 3. Mp3<br />Created in 1991 and released in 1993.<br />Mp3 = MPEG-1 or MPEG-2 Audio Layer 3<br />At 128 kbit/s – 11 times smaller than original source.<br />Removes High and low frequency sounds undetectable by human hearing.<br />Allowed music to be shared.<br />Mp3 appeared on internet in 1994.<br />Popularity increased with the creation of Winamp<br />
  4. 4. Nullsofts’s Winamp<br />A Media player<br />Created in 1997<br />One of the first and most popular Mp3 player.<br />Available for free.<br />Its popularity, and ease of use aided in the file-sharing of Mp3.<br />
  5. 5. Napster<br />Created in 1999<br />Created by Shawn Fanning while attending Northeastern University in Boston.<br />Software allowed music (Mp3) files to be shared between other users.<br />
  6. 6. Gnutella<br />Gnutella works by having a large circle of users (called nodes),using the gnutella client software.<br />On initial startup, the software must find at least one other node.<br />When conducting a search, a request is sent to each node , who forwards the request to all its connected nodes, and on and on... (initially) up to 7 times, until the request is found<br />If a search request turns up a result, the node that has the result contacts the searcher.<br />
  7. 7. BitTorent<br /><ul><li>BitTorrentis one of the most common protocols for transferring large files
  8. 8. Created in 2001 by Bram Cohen
  9. 9. It works by having the initial file, being split and a part of the file is sent to whoever wants it.
  10. 10. As the receivers all receive different parts of the file, they in turn share their part of the file to the others
  11. 11. This results in higher speed possibilities as the file is then being sent from multiple computers.</li></li></ul><li>Napster/Metallica controversy 2000 - 2001<br />Metallica Discovers song “I Disappear” available on Napster along with all their songs.<br />Legal action was initiated against Napster<br />Violated three areas of the law: copyright infringement, unlawful use of digital audio interface device, and the Racketeer Influenced and Corrupt Organizations Act (RICO)<br />Napster shuts down July 2001<br />
  12. 12. Illegal Downloading<br />Illegal downloading is transferring data that are copyright – infringed from one computer to another<br />
  13. 13. How To Download<br />Find a torrent program<br /> Most common: uTorrent, Deluge, Vuze,BitTorrent, Opera <br />
  14. 14. 2. Find a torrent site and search for a file you would like to download.<br /> Popular sites: The Pirate Bay and Mininova<br />
  15. 15. Continued…<br />Download file<br />Downloading will start through your torrent program<br />
  16. 16. WHAT DO PEOPLE ILLEGALLY DOWNLOAD?<br />People tend to download mostly entertainment products such as music, movies, television shows and games. <br />All types of music is downloaded by people for free using trojan sites or open sharing. <br />Movies are posted on the internet usually from people in the United States and then they are easily accessed freely by people with an internet connection. <br />
  17. 17. Illegal downloading is not just restricted to visual entertainment. Audio and electronic books are accessed in this same manner. <br />The illegal downloading of text is becoming more and more of a problem. Harry Potter was released on the internet through sources still unidentified, that leaked vast slabs of text that were then downloaded and distributed. <br />Software is being illegally downloaded and is being used to service the stealing of documentations, passwords, bank details, personal details and supposedly secure information. <br />
  18. 18. Private documentation has also been leaked onto the internet and illegally downloaded by the wrong people, who have gone on to use the information for unsavoury purposes. <br />Not all illegal downloading is for the wrong reasons. Entertainment purposes tend to warrant people wanting to obtain music, movies and games earlier than their release date, because the dates are varied from country to country. Meaning there is an opportunity for people to do so. <br />

×