Protecting icons

Published: 8 July 1999 y., Thursday

Good Samaritan registers URLs in attempt to foil exploitation of cultural icons. The Kansas man is a kind of Internet Good Samaritan, spending his own time and cash to register famous names online, and then handing them over to the celebrity, free of charge. "DO UNTO OTHERS what you would like to have done unto you," says the 47-year-old Moritz, a former youth minister who travels abroad to speak to religious groups. Moritz began buying up the names after he first logged onto the Internet several years ago. Much of what Moritz saw was the misuse of celebrity names - and much of that was pornographic. "Anywhere in the world, someone could type in demimoore.com and you_d come upon a site that had links to several things, one of them hardcore pornography," he said. Moritz decided to take the information highway_s high road by giving away stars_ names. His mission: protect cultural icons from Web exploitation, which he says makes the Web safer for everyone.
Šaltinis: MSNBC
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.

Facebook Comments

New comment


Captcha

Associated articles

12 New Mobile Processors

CeBIT: AMD Jump-Starts Competition In Thin-And-Light Notebook Market; Unveils 12 New Mobile Processors more »

search.lt news

search.lt presents newest links more »

Microsoft explores self-managing software

The company plans to unveil the initiative, called Dynamic Systems Initiative (DSI), at a Las Vegas conference next week when it debuts its new systems management tools more »

CeBit cleans up with new tech

Oracle deal: Good omen for Linux group? more »

DSL Leads Global Connections

Global DSL subscriptions nearly doubled during 2002, from 18.8 million to 35.9 million more »

Password-stealing e-mails spread

Scam widens; latest seeks Discover Card accounts more »

“Chief” level event

The ICT World Forum @ CeBIT 2003 more »

Deloder worm leaves behind two Trojan horses

The worm uses infected copies of remote-access app VNC and Internet-communications app IRC more »

Intel's New Wireless Platform: Centrino

After years of working with code-named chipsets and bundling the processors on a new platform, Intel Corp. Wednesday officially took the wraps of its latest Centrino technology more »

Two main problems

Europe finds MS guilty, but wonders what to do about it more »