Mechling/Mechcom Support Group   

File Sharing

   One of the largest growing problems in today's Internet experience is the use of file sharing software. File sharing is the practice of making files available for other users to download over the Internet and smaller networks. Usually file sharing follows the peer-to-peer (P2P) model, where the files are stored on and served by personal computers of the users. Most people who engage in file sharing are also downloading files that other users share. Sometimes these two activities are linked together. P2P file sharing is distinct from file trading in that downloading files from a P2P network does not require uploading, although some networks either provide incentives for uploading such as credits or force the sharing of files being currently downloaded. However, P2P applications introduce security risks that may put your information or your computer in jeopardy. 

What risks does file-sharing technology introduce?

** Installation of malicious code - When you use P2P applications, it is difficult, if not impossible, to verify that the source of the files is trustworthy. These applications are often used by attackers to transmit malicious code. Attackers may incorporate spyware, viruses, Trojan horses, or worms into the files. When you download the files, your computer becomes infected (see articles on Spyware, Adware, and Viruses for more information). Sometimes this malware remains installed on the system even if the original file sharing software is removed, and can be very difficult to eliminate. In many cases such malware can interfere with the correct operation of web browsers, anti-virus software, anti-spyware and software firewalls, and can cause degraded performance on affected systems.

** Slow-downs and Connection Intermittence - When running a file-sharing program, you may have too many open "states" or connections to and from your pc. This can cause your internet connection to become very slow or normal functions, like sending and receiving email, to stop functioning all together. The use of file-sharing programs can seriously degrade your normal internet surfing, instant messaging, and email. By limiting the number of connections to and from your computer (uploads and downloads), you will decrease the likelihood of error messages and "page can't be displayed" responses from your browser and email programs.

** Exposure of sensitive or personal information - By using P2P applications, you may be giving other users access to personal information. Whether it's because certain directories are accessible or because you provide personal information to what you believe to be a trusted person or organization, unauthorized people may be able to access your financial or medical data, personal documents, sensitive corporate information, or other personal information. Once information has been exposed to unauthorized people, it's difficult to know how many people have accessed it. The availability of this information may increase your risk of identity theft. 

** Susceptibility to attack - Some P2P applications may ask you to open certain ports on your firewall to transmit the files. However, opening some of these ports may give attackers access to your computer or enable them to attack your computer by taking advantage of any vulnerabilities that may exist in the P2P application. 

** Denial of service - Downloading files causes a significant amount of traffic over the network and relies on certain processes on your computer. This activity may reduce the availability of certain programs on your computer or may limit your access to the internet. 

** Prosecution - Files shared through P2P applications may include pirated software, copyrighted material, or pornography. If you download these, even unknowingly, you may be faced with fines or other legal action. If your computer is on a company network and exposes customer information, both you and your company may be liable.

How can you minimize these risks?

The best way to eliminate these risks is to avoid using P2P applications, keep reliable anti-virus software up-to-date, and run adware/spyware scans on a regular basis.  

Related Articles:

More File Sharing Risks

Info from the Electronic Frontier Foundation

ISPs outraged at music download licensing proposals

File-Sharing Programs Carry Trojan Horse

Peer-to-Peer File Sharing & Copyright Law

What Parents Should Know About File Sharing

File Sharing Isn't Just a Problem for Record Labels

ISPs see costs of file sharing rise

The RIAA's hollow victory over ISPs

RIAA & Ringtone Legality

What They Know Could Hurt You