ExtraTorrent.cc - The Largest Bittorent SystemLogin   |   Register
Latest Articles
Most searched
Hot torrents
First Cams
View Torrent Info: Underworld Blood Wars 2016 HDCAM NAKRO
View Torrent Info: Moana 2016 HD-TS XviD AC3-CPG
View Torrent Info: Shut.In.2016.HDCAM.x264 - Lesnar
View Torrent Info: Fantastic Beast and Where To Find Them 2016 HD-TS x264-CPG
Hot torrents
View Torrent Info: The.Bourne.Identity.2002.BRRip.XviD.AC3-ETRG
View Torrent Info: The.Hollars.2016.HDRip.XViD-ETRG
View Torrent Info: Krampus.The.Christmas.Devil.Returns.2016.BRRip.XviD.AC3-EVO
View Torrent Info: It Had to Be You.2016.HDRip.XviD.AC3-EVO
Hot torrents
H264 X264
View Torrent Info: Kids.in.Love.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: Fender.Bender.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: End.of.a.Gun.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: Sully.2016.720p.BRRip.x264.AAC-ETRG
Hot torrents
View Torrent Info: The.Walking.Dead.S07E07.HDTV.x264-FUM[ettv]
View Torrent Info: Westworld.S01E10.WEBRip.x264-FUM[ettv]
View Torrent Info: Shameless.US.S07E10.HDTV.x264-LOL[ettv]
View Torrent Info: Frontier.2016.S01E05.HDTV.x264-KILLERS[ettv]
View Torrent Info: YZ.2016.Marathi.720p.WEB-DL.H264.ESub.AAC2.0-DDR
View Torrent Info: Nenu Sailaja (2016)   EXTRAS 720p UNCUT HDRip x264 [Dual Audio] [Hindi DD 2.0 - Telugu 2.0] Exclusive By -=!Dr.STAR!=-
View Torrent Info: Morgan (2016) 1080p BDRip DUAL DD 5.1 x264 ~ PyZ
View Torrent Info: Kahaani 2 (2016) Hindi 1CD Desi Cam x264 AAC - Downloadhub
To add new messages please Login or Register for FREE
Warning! Protect Yourself from Lawsuits and Fines!
Your IP Address is   Location is United States
Your IP Address is visible to EVERYONE. Hide your IP ADDRESS with a VPN while torrenting!
ExtraTorrent strongly recommends using Trust.Zone VPN to anonymize your torrenting. It's FREE!

ExtraTorrent.cc > Articles > Security of Your File-Sharing Apps

Security of Your File-Sharing Apps

Security of Your File-Sharing Apps

Added: Thursday, March 14th, 2013
Category: About Torrents > Staying Safe And Secure
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2010, www.extratorrent.com
Security specialists have always claimed that file-sharing clients, video applications and social networking were all taking the best of your bandwidth, let alone the fact that they created a serious hole through which viruses and malware could get into your PC. Today this theory is tested by a network security company Palo Alto.

Between May and December 2012, the security company has investigated the firewall logs of over 3.000 of its clients. According to the logs, the average network had contained 30 video apps, 19 file-sharing apps, and 17 social networking apps (like well-known Facebook and YouTube).

These applications proved to consume only 20% of the available bandwidth. In addition, only 0.4% of the logs which contained threat warnings were discovered. Nevertheless, video applications proved to be consuming most of bandwidth (about 13% of the available bandwidth).

This means that ISPs which choose to block such apps in order to increase security and bandwidth are recommended to reconsider their strategy. According to Palo Alto, a real security threat can be found within other popular apps, which account for 97% of all software exploits – Internet browsing, Microsoft SQL, MS SQL Monitor, MS Remote Procedure Call, SIP (VoIP), MS Office Communicator, Server Message Block, Active Directory, and DNS.

The security company agrees that by using the abovementioned apps you can exploit a system without ever crossing a perimeter IPS, underscoring the importance of outfits that bring IPS and threat prevention measures deeper into the network and not exclusively monitoring at the perimeter. The author of the report, company’s senior research analyst Matt Keil, explained that the volume of exploits targeting business critical apps had been stunning and served as a data center security wake-up call.

March 14th,2013

Posted by: 

Date:  Thursday, March 14th, 2013

Comments (22) (please add your comment »)

posted by (2013-03-15 10:07:41)
No avatarI disagree of this part of this information (ths means that ISPs which choose to block such apps in order to increase security and bandwidth are recommended to reconsider their strategy.) I think the ISP will lose customers and money over this and give them a bad name. File-Sharing Apps are entitled to be use as any other app and not to be blocked. Re guards to bandwidth speed not all customers will get the same speed regardless of the price because what area you live in as well.

posted by Site FriendET loverSuperman (2013-03-15 21:28:35)
Embolism avatarI think you have got the Gist of the report wrong my friend ,they are not saying that the main issue in security is filesharing apps, but that the greatest risk is with the other mentioned applications (Internet browsing, Microsoft SQL, MS SQL Monitor, MS Remote Procedure Call, SIP (VoIP), MS Office Communicator, Server Message Block, Active Directory, and DNS) and that only a miniscule percentage (0.4%) of threats to systems come from P2p applications as compared to these other applications.Palo Alto is one of the more innovative and enterprising of companies in the world and have long expoused the idea of more modular operating systems due to the combined flaws in security of integrated operating systems like windows,as we know it is easy to take down or infiltrate windows as opposed a Linux system for this very reason and so more modular systems for security are the way to go.

posted by Site FriendET loverSuperman (2013-03-15 21:43:37)
Embolism avatarNot saying you cannot hack Linux with time and know how, but all you need for someone to hack windows is to turn it on.

posted by Site FriendET junkieET loverGirlSun (2013-03-15 21:49:44)
frostycarver avatarOMG DO YOU PEOPLE EVEN READ WHAT SAM WRITES???? MNIBARI12 Reconsider means that the COMPANIES that ARE restricitng bandwidth because you ARE a file sharer are doing an injustice to you as well as themselves You say you DISAGREE WITH SAM... BUT YOU DONT HE IS SAYING EXACTLY WHAT YOU WROTE ..DUH AND AS FOR YOU EMBOLISM JAYSUS HE DOESNT HAVE THE GIST OF THE REPORT WRONG YOU JUST DONT KNOW HOW TO READ.... SAM NEVER SAID THAT.... HE SAID EXACTLY HAT YOU SAID AS WELL THAT THE RISKS WERE WITH THE APPS NOT THE FILE SHARING ...ANOTHER DUH People please read this article again as neither of you are reading it correctly....SAM IS REPORTING IT CORRECTLY!

posted by Site FriendET junkieET loverGirlSun (2013-03-15 21:54:42)
frostycarver avatarOH BTW Thanks SAM for all the info We appreciate all the research you do and all the information you give to us! I for one am THANKFUL for the heads up!

posted by Site FriendET loverSuperman (2013-03-15 22:15:55)
Embolism avatar@#4 <frostycarver> I did not state Sam had it wrong I corrected MNIBARI12 ,so Duh and doh!!

posted by Blocked (2013-03-16 00:14:05)
skreamer avatarI was reading that article and thinking ..apps...what are these apps? Sounded familiar but do I use them (without GOOG)?

posted by Blocked (2013-03-16 00:27:00)
skreamer avatarand if they are embedded into something like an OS then likely it will be complicated...

posted by Blocked (2013-03-16 01:16:58)
skreamer avatarLOL case in point I just got blocked from a web with this

Your requested URL has been blocked by the URL Filter database module of McAfee Web Gateway. The URL is listed in categories that are not allowed by your administrator at this time.

Don't have MaCrappy on my PC.

posted by Site FriendET loverSuperman (2013-03-16 01:42:00)
Embolism avatar@ 5 www.thefreedictionary.com/gist if you need to understand its meaning and follow your own advice by reading what is written.

~8 yes you do if installed and in a domestic situation there are some not required but the intrusions cannot just be turned off since windows is an interpolative system with a dynamic link library where everything is connected to everything else and that's where it falls down in security,PA is in California and are the sort of people that do peripherals security and conceptualise the next generation firewalls with AIDS (LOL)Auto intrusion detection systems with some degree of autonomy,a thinking firewall with greater control of the communication processes and more radical framework.

posted by Site FriendET loverSuperman (2013-03-16 01:52:07)
Embolism avatarzone alarm security suite free for home use is one of my favourite ones of those I install for people in small set ups and domestics at the moment and it stopped everything I threw at it and once updated with latest definitions was rock solid.

posted by Site FriendET loverSuperman (2013-03-16 02:03:56)
Embolism avatarZA also hides you ID well and clips the last octet of your ip addy as well which I always thought cool.

posted by Site FriendET junkieET loverGirlSun (2013-03-16 08:52:30)

posted by Site FriendET loverSuperman (2013-03-16 18:25:34)
Embolism avatar@13 if you followed your own advice and read what was written that should be self evident to even someone who paraphrases Homer Simpson ,lol.

posted by Site FriendET loverSuperman (2013-03-16 19:16:41)
Embolism avatar@1 following your train of thought in regard qoute: (ths means that ISPs which choose to block such apps in order to increase security and bandwidth are recommended to reconsider their strategy.)
I direct you to this latest news www.vuze.com/corp/press.php in regard : VUZE APPLAUDS FCC IN SETTING TRAFFIC-THROTTLING HEARING since this report is good news towards getting the FCC and all ISP`s to stopping said throttling back and joint works with the industry to make Bittorrent work and get used as it should,just one small step towards a freer internet for us all and the report by Sam gives a report that in effect proves p2p is not the fly in the ointment security wise all the others would say it is in order to suppress what we do with it.

posted by Blocked (2013-03-16 20:46:56)
skreamer avatarEmbolism do you know of a program that I can basically I can navigate to an program, right click on it and chose "Do not allow internet connection"? I have a firewall but its not so simple (at all).

posted by Site FriendET loverSuperman (2013-03-16 21:08:07)
Embolism avataryou can shut off services or control process within the computers own o/s with windows manager or in services,or do much the same thing in Linux but with a lot more variations and ways to do it including 3rd party program management,personally would kill or in Linux not install anything I don`t need to run my system or any 3rd party services for same.
It is just as easy in zone alarm or Comodo to control most network processes and stop ,limit or control access.zone alarm security suite allows with right click all your network options for control or simply to shut it down got to you wired or wifi connection symbol and disable it.

posted by Site FriendET loverSuperman (2013-03-16 21:32:52)
Embolism avatarDelete comment
Embolism avatar @17 the network connection not the symbol,lol,I would think you still want access to the internet so in services or in zone alarm Comodo would be the best options,zone alarm allows you to allow,deny,stop the process or ask you what you want to doregarding all connections so if you wish to stop a connected application i.e a program from updating you just deny its access or have the fire wall ask you if you wish to allow it or not in that instance and to allow it once as an exception or to change the rule.

posted by Site FriendET loverSuperman (2013-03-16 22:01:42)
Embolism avatarsourceforge.net/directory/freshness:recently-updated/?q=+system+process+management for 3rd party programs .

posted by Site FriendET loverSuperman (2013-03-16 22:14:03)
Embolism avatarprocess hacker is voted around 95% so may give you a better visual representation of what the firewall is doing with control options for same but one process manager suffices for me and less complicated,not that I am on my windows partition for anything more than an odd game now and then.

posted by Blocked (2013-03-17 19:25:10)
skreamer avatarThanks very much for your reply Embolism. I do in fact have Comodo as a firewall, always on Safe Mode, but it has allowed suddenly Sandboxie and TuneUp Utilities to phone home. As to the original question the best I have found in there is to 'Close and block access' but I don't want both together - I want to soft to still be running. Will look into process hacker anyways. Thanks again.

posted by (2013-03-18 00:37:21)
No avatarSo....Palo Alto have just now confirmed what we have known to be true since at least Windows 95, that M$ products are a security risk.
Add that to the fact that people are "Urging" M$ to make apple products more useful by opening a security breach via Office for iPwn..... I'm thinking that the world is finally coming to realise the joys of that which is linux.
Or maybe I'm just reading too much into this....and need to be committed....

Articles Search
Most Popular Stories
Articles Categories
Articles Tags

Home - Browse Torrents - Upload Torrent - Stat - Forum - FAQ - Login
ExtraTorrent.cc is in compliance with copyrights
BitCoin: 12DiyqsWhENahDzdhdYsRrCw8FPQVcCkcm
Can't load ExtraTorrent? Try our official mirrors: etmirror.com - etproxy.com - extratorrentonline.com - extratorrentlive.com
2006-2016 ExtraTorrent.cc1