{"id":289,"date":"2009-12-12T01:31:47","date_gmt":"2009-12-12T09:31:47","guid":{"rendered":"http:\/\/systemsolver.com\/StatlerBlog\/?p=289"},"modified":"2009-12-12T01:31:47","modified_gmt":"2009-12-12T09:31:47","slug":"xp-pro-concurrent-users","status":"publish","type":"post","link":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/2009\/12\/12\/xp-pro-concurrent-users\/","title":{"rendered":"XP Pro Concurrent Users"},"content":{"rendered":"<p>There is a hack to allow several users to <a href=\"http:\/\/sala.pri.ee\/?page_id=11\">simultaneously log into<\/a> [<a href=\"http:\/\/sig9.com\/articles\/concurrent-remote-desktop?from=50&amp;comments_per_page=50\">or here<\/a>] a computer running XP Pro (and perhaps<a href=\"http:\/\/www.ethicalhacker.net\/content\/view\/106\/24\/\"> hack Server 2003<\/a>). I researched the legality of such a hack and am personally convinced it is legal under US copyright law, though I am not a lawyer and am not offering this as legal advice. I do offer three links that support my opinion.<\/p>\n<p>The first link is from D. J. Bernstein [<a href=\"http:\/\/en.wikipedia.org\/wiki\/Daniel_J._Bernstein\">Wikipedia<\/a>] who brought the court case<a title=\"Bernstein v. United States\" href=\"http:\/\/en.wikipedia.org\/wiki\/Bernstein_v._United_States\">Bernstein v. United States<\/a>which ruled that software is protected speech. At Mr. Bernsein&#8217;s site he gives his understanding of the<a href=\"http:\/\/cr.yp.to\/softwarelaw.html\">software user&#8217;s rights<\/a>. In part, he says,<\/p>\n<blockquote style=\"border: 2px solid #666666; padding: 15px; background-color: #f0f0f0; width: 350px; color: #000099;\"><p>&#8230; according to the CONTU Final Report, which is generally interpreted by the courts as legislative history, &#8220;the right to add features to the program that were not present at the time of rightful acquisition&#8221; falls within the owner&#8217;s rights of modification under section 117.<\/p>\n<p>Note that, since it&#8217;s not copyright infringement for you to apply a patch, it&#8217;s also not copyright infringement for someone to give you a patch.<\/p><\/blockquote>\n<p>My second link is from US Code Title 17 Chapter 1 \u00a7117 [<a href=\"http:\/\/www.law.cornell.edu\/uscode\/17\/117.html\">Cornell Law<\/a>] &#8220;Limitations on exclusive rights: Computer programs&#8221; which says in part,<\/p>\n<blockquote style=\"border: 2px solid #666666; padding: 15px; background-color: #f0f0f0; width: 350px; color: #000099;\"><p><strong style=\"color: #000099;\">Making of Additional Copy or Adaptation by Owner of Copy.\u2014 <\/strong><span style=\"color: #000099;\"> Notwithstanding the provisions of section <\/span><a style=\"color: #000099;\" href=\"http:\/\/www.law.cornell.edu\/uscode\/uscode17\/usc_sec_17_00000106----000-.html\">106<\/a><span style=\"color: #000099;\">, it is not an infringement for the owner of a copy of a computer program to make or authorize the making of another copy or adaptation of that computer program provided: <\/span><br style=\"color: #000099;\" \/> <br style=\"color: #000099;\" \/><span style=\"color: #000099;\"> (1) that such a new copy or adaptation is created as an essential step in the utilization of the computer program in conjunction with a machine and that it is used in no other manner, or <\/span><br style=\"color: #000099;\" \/> <br style=\"color: #000099;\" \/> (2) that such new copy or adaptation is for archival purposes only and that all archival copies are destroyed in the event that continued possession of the computer program should cease to be rightful.<\/p><\/blockquote>\n<p>From my reading I understand there is some controversy over who &#8220;owns&#8221; a computer program. Some people wonder if, indeed, you purchase the software or it is simply licensed. This point is arguable, but I found no rulings to say software is only licensed and not owned.<\/p>\n<p>And my third link is from the report that US Code Title 17 Chapter 1 \u00a7117 is based on, &#8220;<a href=\"http:\/\/digital-law-online.info\/CONTU\/contu2.html\">Final Report of the National Commission on New Technology Uses of Copyrighted Works<\/a>&#8221; (CONTU as referenced in the first quote) In part, the report states, [emphasis is mine]<\/p>\n<blockquote style=\"border: 2px solid #666666; padding: 15px; background-color: #f0f0f0; width: 350px; color: #000099;\"><p>The new copyright law should be amended: (1) to make it explicit that computer programs, to the extent that they embody an author&#8217;s original creation, are proper subject matter of copyright; (2) to apply to all computer uses of copyrighted programs by the deletion of the present section 117; and <strong>(3) to ensure that rightful possessors of copies of computer programs may use or adapt these copies for their use.<\/strong><\/p><\/blockquote>\n<p>As an addendum I offer this last link to a findlaw.com article on &#8220;Year 2000 Self-Help: Two Possible Defenses To Charges Of Copyright Infringement When A Software Licensee Performs Its Own Y2K Fix&#8221; [<a href=\"http:\/\/library.findlaw.com\/1998\/Oct\/1\/130507.html\">Link<\/a>] which discusses the defense of a customer fixing a software problem themselves.<\/p>\n<p>So there you have it, my reasons for believing it is okay to apply the Terminal Services Hack to a computer running XP Pro. Microsoft may not like it, but the chances of them arguing against it  is slim enough to be none (especially after the hack has been freely available on the web for at least 5 years, and that hacking to get the feature wasn&#8217;t necessary in XP Pro SP1; see the links above).<\/p>\n<p>My primary interest in allowing concurrent users is not really so much to allow multiple users, it&#8217;s to allow one user to have simultaneous and completely separate computing spaces on one computer&#8230;but that&#8217;s another story.<\/p>\n<p>P.S. Vista may be hacked as well according to <a href=\"http:\/\/www.makeuseof.com\/tag\/remote-desktop-concurrent-sessions-for-windows-vista\/\">this site<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is a hack to allow several users to simultaneously log into [or here] a computer running XP Pro (and perhaps hack Server 2003). I researched the legality of such a hack and am personally convinced it is legal under US copyright law, though I am not a lawyer and am not offering this as [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-289","post","type-post","status-publish","format-standard","hentry","category-general"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/wp-json\/wp\/v2\/posts\/289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/wp-json\/wp\/v2\/comments?post=289"}],"version-history":[{"count":0,"href":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/wp-json\/wp\/v2\/posts\/289\/revisions"}],"wp:attachment":[{"href":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/wp-json\/wp\/v2\/media?parent=289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/wp-json\/wp\/v2\/categories?post=289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/systemsolver.goodhealthyday.com\/StatlerBlog\/wp-json\/wp\/v2\/tags?post=289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}