Browse Definitions :
Definition

cuckoo egg

A cuckoo egg is an MP3 file that typically contains 30 seconds of the original song with the remainder of the song overwritten with cuckoo clock noises, white noise, and/or voice messages such as, "Congratulations, you must've goofed up somewhere." Ideally, a cuckoo egg should have the same playing length as the music it pretends to be. The purpose of cuckoo eggs is to deter the downloading and sharing of MP3 files using Napster and similar approaches.

Typically, a Napster user downloads an MP3 file and sometimes share it with others before listening to it. Recognizing this, a cuckoo egg creator creates the cuckoo egg to look exactly like a real MP3 file. The user then unknowingly shares the cuckoo egg with other unsuspecting users spreading the cuckoo egg like a virus. Unlike a virus, cuckoo eggs do not damage computers, but simply annoy and waste the time of those who download the files.

The Cuckoo Egg Project began with Michael and Stephanie Fix. Stephanie Fix is a musician who is concerned about the illegal availability of copyrighted music through Napster. The concept centers on the idea of how a real cuckoo bird lays its eggs in another bird's nest. To the Fixes, the Napster system is like a huge nest of MP3 files, a perfect environment in which to lay cuckoo eggs

The first cuckoo egg was laid on June 10, 2000. Since then, Napster users have posted hundreds of angry messages at the Cuckoo Egg Project's Web site. Whether it's deterring them from downloading other songs has not been determined.

There is an ironic twist to the Cuckoo Egg Project. According to the official Web site's FAQ, cuckoo eggs are also not legal, because they also use unauthorized portions of copyrighted songs. But they claim that only a sample portion is used compared to the entire song being used with Napster, which is more defendable according to fair use laws. Anyone who creates and distributes MP3 files can create cuckoo eggs.

This was last updated in September 2005

Continue Reading About cuckoo egg

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close