The anatomy of a fraud
Consider the suit: SOFTWARE FREEDOM CONSERVANCY, INC.
and ERIK ANDERSEN v.BEST BUY CO., INC, et.al.
Here are relevant paragraphs from the SFLC-Andersen complaint:
20. Mr. Andersen is the author and developer of the BusyBox
computer program, and the owner of copyrights in that computer
program. BusyBox is a single computer program that comprises a
set of computing tools and optimizes them for computers with
limited resources, such as cell phones, PDAs, and other small,
specialized electronic devices. BusyBox is extremely
customizable, fast, and flexible, and, on information and belief,
is used in countless products sold by many manufacturers all over
31. Mr. Andersen is, and at all relevant times has been, a
copyright owner under United States copyright law in the FOSS
software program known as BusyBox. See, e.g., �BusyBox,
v.0.60.3.�, Copyright Reg. No. TX0006869051 (10/2/2008).
Plaintiff Software Freedom Conservancy is the corporate home for
the BusyBox project and the designated copyright enforcement
agent for Mr. Andersen with respect to BusyBox.
Here is a link to the source code for BusyBox v.0.60.3:
Here is the copyright registration filed by Andersen:
Type of Work: Computer File Registration Number / Date:
TX0006869051 / 2008-10-02 Application Title: BusyBox, v.0.60.3.
Title: BusyBox, v.0.60.3. Description: Print material. Copyright
Claimant: Erik Andersen, 1971- . Date of Creation: 2002 Date
of Publication: 2002-04-27 Authorship on Application: Erik
Andersen, 1971- ; Domicile: United States; Citizenship: United
States. Authorship: New and revised computer source code by Erik
Andersen. Pre-existing Material: Previous version of the program
and computer program code from other sources. Basis of Claim: New
and revised computer source code by Erik Andersen. Copyright
Note: C.O. correspondence. Names: Andersen, Erik, 1971-
Inspection of the relevant facts of record listed above will reveal
that Erik Andersen and the SFLC are promoting a criminal fraudulent
copyright registration. See:
17 USC Sec. 506. Criminal offenses...
(e) False Representation. �
Any person who knowingly makes a false representation
of a material fact in the application for copyright
registration provided for by section 409, or in any
written statement filed in connection with the application,
shall be fined not more than $2,500.
1) The copyright registration clearly claims "BusyBox, v.0.60.3".
2) The Complaint para. 20 clearly states, "Mr. Andersen is the author
and developer of the BusyBox computer program, and the owner of
copyrights in that computer program. BusyBox is a single computer
3) The Complaint para. 31 clearly states, "Mr. Andersen is, and
at all relevant times has been, a copyright owner under United States
copyright law in the FOSS software program known as BusyBox".
4) A cursory examination of the source code files in the tarball
busybox-0.60.3.tar.bz2 reveals multiple authors of the source code
5) The conclusion that the the copyright registration statement
by Erik Andersen:
"Mr. Andersen is the author and developer of the BusyBox
computer program, and the owner of copyrights in that computer
comprises a knowingly false statement is inescapable.
||12/18/2009 12:29:10 AM
See related articles to this posting
> 4) A cursory examination of the source code files in the tarball
> busybox-0.60.3.tar.bz2 reveals multiple authors of the source code
The contents of the AUTHORS file in tarball busybox-0.60.3.tar.bz2:
List of the authors of code contained in BusyBox.
If you have code in BusyBox, you should be listed here. If you should
be listed, or the description of what you have done needs more detail,
or is incorect, _please_ let me know.
Erik Andersen <email@example.com>, <firstname.lastname@example.org>
Tons of new stuff, major rewrite of most of the
core apps, tons of new apps as noted in header files.
Edward Betts <email@example.com>
expr, hostid, logname, tty, wc, whoami, yes
John Beppu <firstname.lastname@example.org>
du, head, nslookup, sort, tee, uniq
Brian Candler <B.Candler@pobox.com>
Randolph Chung <email@example.com>
fbset, ping, hostname, and mkfifo
Dave Cinege <firstname.lastname@example.org>
more(v2), makedevs, dutmp, modularization, auto links file,
various fixes, Linux Router Project maintenance
Magnus Damm <email@example.com>
insmod powerpc support
Larry Doolittle <firstname.lastname@example.org>
pristine source directory compilation, lots of patches and fixes.
Gennady Feldman <email@example.com>
Sysklogd (single threaded syslogd, IPC Circular buffer support,
logread), various fixes.
Karl M. Hegbloom <firstname.lastname@example.org>
cp_mv.c, the test suite, various fixes to utility.c, &c.
Daniel Jacobowitz <email@example.com>
Matt Kraai <firstname.lastname@example.org>
documentation, bugfixes, test suite
John Lombardo <email@example.com>
Glenn McGrath <firstname.lastname@example.org>
ar, dpkg, dpkg-deb
Vladimir Oleynik <email@example.com>
cmdedit; ports: ash, stty, traceroute; locale, various fixes
and irreconcilable critic of everything not perfect.
Bruce Perens <firstname.lastname@example.org>
Original author of BusyBox. His code is still in many apps.
Tim Riker <Tim@Rikers.org>
bug fixes, member of fan club
Kent Robotti <email@example.com>
reset, tons and tons of bug reports and patchs.
Chip Rosenthal <firstname.lastname@example.org>, <email@example.com>
wget - Contributed by permission of Covad Communications
Pavel Roskin <firstname.lastname@example.org>
Lots of bugs fixes and patches.
Gyepi Sam <email@example.com>
Remote logging feature for syslogd
Linus Torvalds <firstname.lastname@example.org>
mkswap, fsck.minix, mkfs.minix
Mark Whitley <email@example.com>
grep, sed, cut, xargs, style-guide, new-applet-HOWTO, bug fixes, etc.
Charles P. Wright <firstname.lastname@example.org>
Enrique Zanardi <email@example.com>
tarcat (since removed), loadkmap, various fixes, Debian maintenance
Emanuele Aina <firstname.lastname@example.org>
12/18/2009 12:56:09 AM
Shit. It looks as if someone has hacked my name and password. You'll
see a post with some crap about New Zealand in it.
Looks like that's my last post on this newsgroup (or anywhere).
The net was fun while it lasted, but now it seems to have attracted
every mental case on the planet.
Bill Markwick , Posted to the comp.sys.hp48 group , the following :
> Shit. It looks as if someone has hacked my name and password.
> You'll see a post with some crap about New Zealand in it.
> Looks like that's my last post on this newsgroup (or anywhere).
>...Oraknowledge is a fraud!
I purchased the Oracle 8i & 9i eboot camp from Oraknowledge last year
with the guarantee that you could take the classes as many times as
needed until you passed the all the tests. I was forced to suspend my
training due to family matters. When I tried to contact Oraknowledge
some months later neither my emails or phone calls were returned. I
did have the President's personal email address, email@example.com,
so I gave him one last chance to make good on his word. He offered to
send me a CD-ROM with all the classes I was taking recorded. He never
I encourage anyone who has been...Click Fraud
Well fraud is kinda overblown, but it's certainly false "advertising".
For years I've been watching Jobs do the song and dance about the glory
and splendor of iChat on the Mac. A lot of Windows people oo and ah
about that part of the demo presentations. There's some great new
features involved with my newest installation of Leopard.
But it apparently *can't* work the way they've presented it. Where is
all the endless echoing of audio coming through the speaker system?
Sitting at my dsk I say "Hola, compadre" and a second later I hear it
If you have an iTunes account some chinese kid probably has your CC
numbers. Good job Apple. Nice security you have there. LOL
"MuahMan" <firstname.lastname@example.org> wrote in message
> If you have an iTunes account some chinese kid probably has your CC
> numbers. Good job Apple. Nice security you have there. LOL
No! It can'...Anatomy of Fork()
I wonder how fork is implemented. The guy who "taught" us UNIX
descrbed fork() as returning twice, but now I know that's not
possible. I know somewhere along the line, the newly created child
process is entered in the process table and the address space of its
parent duplicated, but its the mechanism by which fork() appears to
return twice that I do not understand. Anyone care to give me any
I'm not trying to implement fork, I just want a step-by-step
description of how it does what it does and how it returns in parent
>...Is Debian a fraud ?
Apparently during the install/upgrade process Debian
wants to me to pay for an internet connection, which it
will use to 'connect to it's site'.
This is worse than Micro$loth!
Although I've bought the 5 DVDs, it wants to take control
of my computer and internet connection, right from the start.
You heard about the ex-soviet software that dialed your modem
to the soviet-union, and milked-off the soviet-side telco costs?
["Followup-To:" header set to comp.os.linux.misc.]
On 2010-02-12, email@example.com <firstname.lastname@example.org> wrote:
> Apparently durin...Anatomy of a Thread
Is it just me or all all threads in this newsgroup degenerating to
"John Slade" <email@example.com> stated in post
firstname.lastname@example.org on 6/27/08 6:29 PM:
> Is it just me or all all threads in this newsgroup degenerating to
> steve caroll
> John Slade
Oh no...Fraud and spam
Is there somewhere to forward true fraud emails to?
On Aug 22, 5:04=A0am, John Young <j...@scallawags.net> wrote:
> Is there somewhere to forward true fraud emails to?
your isp would be one choice
their isp could be another