Even though Sony decided to suspend using controversial copy-protection technology, consumers and network managers are still furious.
Despite Sony BMG Music Entertainment's decision to stop using its controversial copy-protection technology, the anger generated by what one expert called "inept-ware" is unlikely to subside anytime soon.
Security experts believe that the world's second largest music label failed to see the ramifications when it chose to install the software without first seeking permission from PC users, and then using technology called a "rootkit" to hide its presence. The software came with 20 music CDs sold by Sony BMG.
But some customers of the record company and its parent, Sony Corp., were far less forgiving.
"I am personally making it a policy of mine that from this point on, Sony won't be able to sell me anything," Dennis Barr, Kansas City, Mo., said. "My family has a PS2 (PlayStation 2) plus some games, and I have a Sony CD player in my stereo rack. But no more -- no Sony music, no Sony appliances, no Sony gadgets of any kind. They've lost my business for life, because they were too damn dumb to realize just what they were doing."
Besides the hit Sony has taken among customers, its brand appears to have also been tainted.
"I don't condone piracy, but the unbridled greed of Sony is disgusting," Michael King, Salinas, Calif., said. "They are saying what the others (record companies) think - they own the information forever, even if you buy it, and have the unlimited right to control the information, including its use no matter what or where."
While not under-playing the seriousness of Sony's technology, which hackers have exploited in an attempt to hide malicous software, security experts believe the company made a bad decision in trying to do something right, which is protect its property.
Graham Cluley, senior technology consultant for Sophos Plc, called the technology, which was developed by U.K.-based First4Internet, "inept-ware."
"I don't think it was malicious in its intent," Cluley said.
However, a poll of systems administrators by Sophos found a far stronger opinion, which Cluley called "typical."
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.