noobbunny.blogg.se

Peer to peer file sharing software
Peer to peer file sharing software









peer to peer file sharing software peer to peer file sharing software
  1. PEER TO PEER FILE SHARING SOFTWARE INSTALL
  2. PEER TO PEER FILE SHARING SOFTWARE SOFTWARE
  3. PEER TO PEER FILE SHARING SOFTWARE DOWNLOAD

PEER TO PEER FILE SHARING SOFTWARE SOFTWARE

KaZaA, for example, has the ability to create a separate P2P network without your knowledge through additional software that is installed when you load its software.

PEER TO PEER FILE SHARING SOFTWARE INSTALL

This would be a huge problem if the request for the upgrade were redirected to another site that would install a program such as a Trojan horse. Some can automatically upgrade themselves. These programs do a lot more than you might be aware of. Your machine would also then be vulnerable to catching a virus and then potentially spreading it to others. This is significant because if this were to happen and your computer were then used to attack another institution or corporation, there would be serious security and legal consequences. Some of these programs allow remote control of your computer, either as part of their design or by allowing new ways for your computer to be compromised. After all, the primary purpose for our network is to assist in academic research and to provide facilities for the Trinity community. This means that our network would be used to serve others outside of the university to the detriment of our own users here at Trinity. Multiply this by more than 2000 TigerNet connections and an even larger number of office connections, and you will begin to understand our concern. At the same rate, that one song would result in 720MB of outbound file transfers in one day.

PEER TO PEER FILE SHARING SOFTWARE DOWNLOAD

So, that one 5MB download quickly became 20MB. In tests done by IT staff at another institution, one song was downloaded and within half an hour, three people had connected to the machine to upload that same file. Peer-to-peer applications affect both of these missions. We also have a duty to all users to provide adequate access and a stable network. We care about the security of our students' machines. This affects the security and stability of Trinity's network. If you are sued, the damages can be significant-in the thousands of dollars. Many copyright owners monitor P2P networks to find infringers, and large industry organizations have stated that they will file lawsuits against individual sharers. Downloading, or making available for download, these copyrighted works can be a violation of federal law. Many files being shared on peer-to-peer networks are distributed without the permission of the person or company who owns the copyright on that work.

peer to peer file sharing software

When another network administrator sees this type of traffic targeted towards their networks, it can be misinterpreted as a probe for vulnerabilities or an attack. For example, there is a specific worm that is transmitted through KaZaA that actually has the ability to overwrite files on your hard drive.īecause these programs attempt to discover and query other peers, they generate network traffic which is sometimes interpreted as hostile. The intent is either to infect your machine or to install a remote control program on your machine in an effort to use your machine for nefarious purposes. Not everyone is as trustworthy as you are there are those out there who will disguise a malicious program as something harmless, like a music file. In the process of sharing files back and forth with other peers, you put yourself in the position of possibly infecting or damaging your own computer.











Peer to peer file sharing software