Thursday, March 31, 2005

.
Grokster and the Supreme Court - Dangers of P2P File Sharing (Search Engine Journal)

“Peer-to-Peer (P2P) systems do not operate on secure lines, thus providing a conduit for hackers to enter a network or computer, access personal and confidential information, as well as deploy viruses or worms.”

“Spyware and adware programs are frequently bundled into P2P file-sharing software. These programs collect personal information for marketers and provide access to your computer by malicious hackers.”

“When you are running the software for P2P services, your computer’s disk space, bandwidth, and processing power are used to help other users on the same system operate their software more efficiently because of their own network or firewall constraints.

Not only can this overload systems or networks with excessive data, disk space, and network bandwidth, unscrupulous hackers can also insert arbitrary code in each supernode’s address space or crash all supernodes.”
.