Quote:
Originally posted by CDSmith
In the eyes of most court systems I know of...
if you are supporting thievery then you are a thief by association, and
ignorance is no excuse.
If you buy and display stolen content, once it is found out you can be forced to remove that content, you can even be fined, and people have been in some cases. Your sites can be shut down as well, and it doesn't often take a court case to achieve this.
How many programmers have to come forward and confirm Choker's claim before people accept it as legitimate? Some of you people really need to stop trying to tell everyone "what the point here is" and just shut up and do the right thing. Now that I see the stance some of you hardheads are taking I don't blame the guy one bit for calling you what he has called you.
I'm sorry, but the real bottom line here is simply this: if you don't want to be called/labelled a thief, then don't support thievery.
|
I feel it is important to remain focused on the primary issue(s). Often times the discussion can become emotionally heated, where innuendo and unsubstantiated claims are mistaken for fact.
I am one person who has stood up and openly challenged Choker and the business tactics he employs. This really should not be my job to defend my use of his competitors software product, however there comes a time for each of us to take a stand as to what is right.
Is this a matter that can or will be decided in Webmaster chat rooms? My personal response is no, because the issues at stake are far to complicated and the legal issues should be addressed in a proper venue.
When the developer of one software product (TURBO TRAFFIC TRADE)
Alleged that I, the end-user of their competing software product (CJOVERKILL) has stolen the TTT product is false, misleading and factually without merit.
In various open forums both developers (chocker & icefire ) have laid claim to their respective software products.
At present the claims presented by both sides (Choker & Icefire) are each compelling in their own right, however fail to establish legal claim or independent review by an established software developer arbitration organization, who would have expertise in closely contested matters as this.
I have no business interest with either of the above names, other than a licensed end-user of CJOVERKILL.
When I downloaded and installed CJOVERKILL acknowledged my acceptance and agreement to respect to all terms specified by Mr. Georgiev and CJOVERKILL.
The CJOverkill reads
CjOverkill 2.0.1
Copyright Kaloyan Olegov Georgiev
ice [at] icefire.org
This script has limited open source license. Read LICENSE at the end of this file for more info.
If you are a developer or you need to modify the script then you must read the license before continuing.
BY INSTALLING OR USING CjOverkill SOFTWARE "PRODUCT", YOU CONSENT ON BEHALF OF
YOURSELF AND/OR THE ENTITY YOU REPRESENT TO BE BOUND BY, AND BECOME A PARTY TO, THIS AGREEMENT "LICENSE" AS THE "LICENSEE". IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, YOU MUST NOT INSTALL CjOverkill OR USE THE CjOverkill SOFTWARE, AND YOU DO NOT BECOME A LICENSEE UNDER THIS AGREEMENT. THIS PRODUCT IS PROVIDED BY Kaloyan Olegov Georgiev "THE AUTHOR" "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
(2) This version of the LICENSE supersedes any prior versions.
(3) LICENSEE of the PRODUCT (all versions, including any beta versions,
incomplete, damaged, hacked or downloaded from a non official site versions) must accept this license agreement in full and the disclaimer.
(4) LICENSEE is strictly prohibited from redistributing the source code or precompiled code of the PRODUCT unless LICENSEE has a written permission by
THE AUTHOR.
(5) LICENSEE may attempt to reproduce or alter the source code of the PRODUCT
in order to adapt the code to his particular needs. IN NO CASE LICENSEE CAN
SELL PRODUCT OR PRODUCT DERIVATES.
6) If LICENSEE alters the PRODUCT code, then LICENSEE is not allowed to
distribute the altered code or leave this code to a third party persons or
entities unless point #7 and point #8 requerements are met.
(7) If LICENSEE wants to distribute altered copies of the PRODUCT, then LICENSEE must have the written consentment of THE AUTHOR of the PRODUCT and depending on the modifications point #8 will need to be met or not.
(8) LICENSEE is strictly prohibited from removing the 1% traffic payload or the ads code present in the trades section of the PRODUCT.
(9) By modifying the PRODUCT LICENSEE agrees to submit the altered code to THE AUTHOR in order it to be reviewed and perhaps included in future
releases of the PRODUCT. In this case LICENSEE must provide some information
if LICENSEE wants his name to appear in the PRODUCT developement team credits.
(10) LICENSEE may terminate this license agreement at any time provided that
LICENSEE destroy all copies of the PRODUCT. This LICENSE will automatically
terminate if LICENSEE fails to comply with any part of the agreement, at
which time, LICENSEE must destroy all copies of the PRODUCT.
THE AUTHOR, at any time, may terminate this LICENSE agreement, in which case LICENSEE must destroy all copies of the PRODUCT.
(11) LICENSEE agrees that the use of any version of the PRODUCT that has removed payload traffic or ads code in the administration area (use of
hacked versions, tricked versions or non offical and unnaproved by THE
AUTHOR versions of the PRODUCT that have removed and/or modifyed payload
traffic and/or ads code without THE AUTHOR's authorization are included here)
WILL NOT TAKE LEGAL (OR OTHER) ACTIONS OF ANY KIND AGAINST THE AUTHOR if THE
AUTHOR executes his right to destroy all the versions of the PRODUCT that
met the mentioned unathorized modifications. This action could lead but not
limited to any kind of data damage, data loss, network saturation and third
party software used by LICENSEE security defeat.
(12) WHEN DISTRIBUTING OFFICIAL OR ANY KIND OF MODIFYED VERSIONS (NON
AUTHORIZED MODIFYED VERSION ARE INCLUDED TOO) OF THE PRODUCT THIS LICENSE
AGREEMENT MUST BE INCLUDED INTACT