Content | Navigation |


P2P Applications

Peer to Peer technology has been around now for a few years, applications such as BitTorrent, iMesh, eDonkey, and Grokster use a series of computers as a network allowing individuals to share files back and forth between each other without relying on a central location.  These networks create a very stable and reliable way to share information, however, there is a dark side to this sharing of information. 


  1. Copyright Infringement - This sharing of files can very easily lead to violation of Federal and State copyright laws.  It is against the law in the United States to copy intellectual property without permission of the copyright holder. Many of these applications will claim that there downloads are legit and that downloading from them will not get you into any trouble, however, we recommend that you read the small print that states that only certain downloads are legit, better yet, use an application that you purchase your files from.
  2. Bandwidth Violation - Many of these applications rely on high bandwidth providers, such as university systems, to provide a high quality of service for their downloads, as such when these applications are run on these types of networks they provide very fast downloads, and at the same time degrade the network for legitimate uses of the university such as research and business use of the campus.
  3. Possible Data Breaches - File sharing is exactly that, sharing of files, these programs are designed to share files, and improperly configured applications can make any and possibly all files on your computer available to anyone else using the same P2P network that you are using.  We have seen tax records, social security cards, immigration records, bank account statements, and many other very sensitive information shared with the P2P online world.
  4. Malware Infection Vector - Many malware writers use P2P applications to spread their tools to unsuspecting downloaders, with the promise of "free software" comes the very real possibility that you are opening your computer to an infection that could expose your credit cards, bank accounts, and who knows what else to criminals.

Peer to Peer technology is a great tool for quick downloads, but while on the campus of NDSU, we suggest you uninstall any of these types of applications.

NDSU IT Security Updates

September 2, 2016

We're not watching you, honest ;)

Apple has release a urgent update to their El Capitan and Yosemite operating systems as well as updates for the safari browser on other devices when it was discovered that a one-touch piece of malware could be installed and used to watch all traffic to and from the computer.  Update your Apple devices quickly, as this malware is out on the Internet.


August 31,2016

2012 called and wants its credentials back

Today, the over 68 million usernames and credentials from the 2012 breach of Dropbox were released onto the Internet. If you use Dropbox or have the same password as your Dropbox account, you will want to change your password as soon as possible.



Student Focused. Land Grant. Research University.

Follow NDSU
  • Facebook
  • Twitter
  • RSS
  • Google Maps

North Dakota State University
IT Help Desk Phone: +1 (701) 231-8685
Administrative Calls Only: +1 (701) 231-7961 / Fax: (701) 231-8541
Campus address: Quentin Burdick Building 206
Physical/delivery address: 1320 Albrecht Blvd, Fargo, ND 58102
Mailing address: NDSU Dept. 4510 / PO Box 6050 / Fargo, ND 58108-6050
Page manager: Information Technology Services

Last Updated: Friday, January 13, 2012
Privacy Statement