Peer to Peer technology has been around now for a few years, applications such as BitTorrent, iMesh, eDonkey, and Grokster use a series of computers as a network allowing individuals to share files back and forth between each other without relying on a central location. These networks create a very stable and reliable way to share information, however, there is a dark side to this sharing of information.
- Copyright Infringement - This sharing of files can very easily lead to violation of Federal and State copyright laws. It is against the law in the United States to copy intellectual property without permission of the copyright holder. Many of these applications will claim that there downloads are legit and that downloading from them will not get you into any trouble, however, we recommend that you read the small print that states that only certain downloads are legit, better yet, use an application that you purchase your files from.
- Bandwidth Violation - Many of these applications rely on high bandwidth providers, such as university systems, to provide a high quality of service for their downloads, as such when these applications are run on these types of networks they provide very fast downloads, and at the same time degrade the network for legitimate uses of the university such as research and business use of the campus.
- Possible Data Breaches - File sharing is exactly that, sharing of files, these programs are designed to share files, and improperly configured applications can make any and possibly all files on your computer available to anyone else using the same P2P network that you are using. We have seen tax records, social security cards, immigration records, bank account statements, and many other very sensitive information shared with the P2P online world.
- Malware Infection Vector - Many malware writers use P2P applications to spread their tools to unsuspecting downloaders, with the promise of "free software" comes the very real possibility that you are opening your computer to an infection that could expose your credit cards, bank accounts, and who knows what else to criminals.
Peer to Peer technology is a great tool for quick downloads, but while on the campus of NDSU, we suggest you uninstall any of these types of applications.
Aug 4, 2015
Free Windows 10 Upgrade, yes indeed Windows 10 is a free upgrade for a year for computers with Windows 7 and 8 installed on them. However, Microsoft will not tell you about this in an e-mail. Ransomware (software that will encrypt your files and then ask for money for the decryption key) has been seen being delivered through an e-mail promising a free windows 10 upgrade. Delete these messages as you get them and do not open any attachment that you did not expect to receive.
Jul 28, 2015
1.4 million cars recalled for vulnerable remote control. Fiat, Chrysler, Jeep, and Dodge vehicles can possibly be controlled remotely over the Sprint network. Researchers have shown that while sitting at their desks they can take over many functions of a vehicle on the road through the onboard Infotainment system tied to the Sprint cellular network.
Feb 17, 2015
Over-sharing on a first date could lead to no second date, but over-sharing on a social media site could lead to data theft, real property theft, or physical danger to yourself or your family. There are lots of automated scripts already running on the Internet looking for keywords that are posted to social media, these scripts do everything from changing the word "meet" to "meat" and posting the results to twitter, to alerting potential thieves that a family is now on vacation and away from their house. Be safe on social media
Feb 6, 2015
New Slim Spray Diet ... Want a Cruise ... Fight Hair Loss Now ... SPAM SPAM SPAM ... It seems to get into every e-mail inbox beofre the account is even setup. But there are some ways to fight this menace.
- Don't reply to it
- Don't tell vendors your e-mail account
- If your service has the option, report it or mark it as spam
There are more ways to fight in the link below.
FEB 4, 2015
Its Tax Refund Season, Time for a new phone or tablet. But what about the old one? Do you have information on that device that could be used against you? How can you make sure that your old phones and devices don't come back to haunt you when you are done with it? Many people buy old equipment off ebay just to see what kind of data is left on those devices. Follow this guide to make sure that your device is wiped clean before you dispose of it.
FEB 3, 2015
When you download an app on social media or your mobile device, you may be allowing it to collect personal information like your contacts list or location. If possible, look at an app’s permissions before downloading and make sure you are comfortable with the information it collects. If the app does not tell you what information it collects, error on the side of caution and assume that it may be collecting information.
FEB 2, 2015
There is a security and privacy threat almost everywhere you go. Most don't even think about it. Free WIFI, if its free how can that be bad? In fact most Free WIFI could be quite safe, but a few access points could have an active sniffer on the line watching every single nibble of data that goes across its interface, looking for passwords, usernames, or e-mail addresses. Click Below for more information on safely using WIFI when traveling.