Looks like Valve got pretty well buggered. Gabe Newell:

Ever have one of those weeks? This has just not been the best couple of days for me or for Valve.

Yes, the source code that has been posted is the HL-2 source code.

Here is what we know:

1) Starting around 9/11 of this year, someone other than me was accessing my email account. This has been determined by looking at traffic on our email server versus my travel schedule.

2) Shortly afterwards my machine started acting weird (right-clicking on executables would crash explorer). I was unable to find a virus or trojan on my machine, I reformatted my hard drive, and reinstalled.

3) For the next week, there appears to have been suspicious activity on my webmail account.

4) Around 9/19 someone made a copy of the HL-2 source tree.

5) At some point, keystroke recorders got installed on several machines at Valve. Our speculation is that these were done via a buffer overflow in Outlook’s preview pane. This recorder is apparently a customized version of RemoteAnywhere created to infect Valve (at least it hasn’t been seen anywhere else, and isn’t detected by normal virus scanning tools).

6) Periodically for the last year we’ve been the subject of a variety of denial of service attacks targetted at our webservers and at Steam. We don’t know if these are related or independent.

Followup thread pinpointing the leaker?

What I really need is a blog-all tabs popup/bookmarklet…

(Update: Jesse let me know that bookmarklets can’t look at other tabs, although it might able to cycle through tabs… Will have to look into it; Maybe needs to be a XUL extension? Where in the Moz DOM is the tab info stored?)

From /., Eric_the_Awful posts:

“It is refreshing to see that P2P United is acknowledging that their members should be more active in educating their users about the consequences of illegal file sharing that is rampant on their networks as well as the other risks these networks pose to personal privacy and security,” Amy Weiss, senior vice president of communications for RIAA, said in a statement. “But, let’s face it, they need to do a whole lot more before they can claim to be legitimate businesses.”

So for the P2P United businesses to become quote legitimate businesses end quote, they should act like the RIAA and the RIAA’s constituents.

  1. Sue their own customers.
  2. “Offer” their artists (perhaps the programmers in this case?) unconscionable contracts along the line of “You agree to assign the authorship rights of your work to us. You will bear the entire financial risk of the marketing and reproduction of your work. In most cases we will receive the vast majority of the benefits of your work.”
  3. “Cook” their books so that any profits generated by their artists/programmers appear in the vaguest possible terms, again avoiding any requirement to actually pay the artists/programmers.
  4. Control their customer’s access to new and old works. Make it difficult/impossible for their customers to legally obtain works that aren’t on the “top 40.”
  5. Accuse anyone who complains (or offers an alternative) of profound moral sins such as stealing from the artists.
  6. Spend profits purchasing lobbying power to protect the above system.
  7. Attack any organization or entity that appears to offer alternatives to the customers or artists.
  8. Require the artists under threat of financial ruin to use the above system.

Wow. That’s a great way to run a business. I’m sure that the P2P networks would be loved by everyone if they adopted to above “business plans.”

I’ve got a few other words for Amy Weiss, but they are not fit for printing.