Security of Your File-Sharing AppsAdded: Thursday, March 14th, 2013
Category: About Torrents > Staying Safe And Secure
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2010, www.extratorrent.com
Security specialists have always claimed that file-sharing clients, video applications and social networking were all taking the best of your bandwidth, let alone the fact that they created a serious hole through which viruses and malware could get into your PC. Today this theory is tested by a network security company Palo Alto.
Between May and December 2012, the security company has investigated the firewall logs of over 3.000 of its clients. According to the logs, the average network had contained 30 video apps, 19 file-sharing apps, and 17 social networking apps (like well-known Facebook and YouTube).
These applications proved to consume only 20% of the available bandwidth. In addition, only 0.4% of the logs which contained threat warnings were discovered. Nevertheless, video applications proved to be consuming most of bandwidth (about 13% of the available bandwidth).
This means that ISPs which choose to block such apps in order to increase security and bandwidth are recommended to reconsider their strategy. According to Palo Alto, a real security threat can be found within other popular apps, which account for 97% of all software exploits – Internet browsing, Microsoft SQL, MS SQL Monitor, MS Remote Procedure Call, SIP (VoIP), MS Office Communicator, Server Message Block, Active Directory, and DNS.
The security company agrees that by using the abovementioned apps you can exploit a system without ever crossing a perimeter IPS, underscoring the importance of outfits that bring IPS and threat prevention measures deeper into the network and not exclusively monitoring at the perimeter. The author of the report, company’s senior research analyst Matt Keil, explained that the volume of exploits targeting business critical apps had been stunning and served as a data center security wake-up call.
March 14th,2013Posted by:
Thursday, March 14th, 2013
|I disagree of this part of this information (ths means that ISPs which choose to block such apps in order to increase security and bandwidth are recommended to reconsider their strategy.) I think the ISP will lose customers and money over this and give them a bad name. File-Sharing Apps are entitled to be use as any other app and not to be blocked. Re guards to bandwidth speed not all customers will get the same speed regardless of the price because what area you live in as well.|
|I think you have got the Gist of the report wrong my friend ,they are not saying that the main issue in security is filesharing apps, but that the greatest risk is with the other mentioned applications (Internet browsing, Microsoft SQL, MS SQL Monitor, MS Remote Procedure Call, SIP (VoIP), MS Office Communicator, Server Message Block, Active Directory, and DNS) and that only a miniscule percentage (0.4%) of threats to systems come from P2p applications as compared to these other applications.Palo Alto is one of the more innovative and enterprising of companies in the world and have long expoused the idea of more modular operating systems due to the combined flaws in security of integrated operating systems like windows,as we know it is easy to take down or infiltrate windows as opposed a Linux system for this very reason and so more modular systems for security are the way to go.|
|Not saying you cannot hack Linux with time and know how, but all you need for someone to hack windows is to turn it on.|
|OMG DO YOU PEOPLE EVEN READ WHAT SAM WRITES???? MNIBARI12 Reconsider means that the COMPANIES that ARE restricitng bandwidth because you ARE a file sharer are doing an injustice to you as well as themselves You say you DISAGREE WITH SAM... BUT YOU DONT HE IS SAYING EXACTLY WHAT YOU WROTE ..DUH AND AS FOR YOU EMBOLISM JAYSUS HE DOESNT HAVE THE GIST OF THE REPORT WRONG YOU JUST DONT KNOW HOW TO READ.... SAM NEVER SAID THAT.... HE SAID EXACTLY HAT YOU SAID AS WELL THAT THE RISKS WERE WITH THE APPS NOT THE FILE SHARING ...ANOTHER DUH People please read this article again as neither of you are reading it correctly....SAM IS REPORTING IT CORRECTLY!|
|OH BTW Thanks SAM for all the info We appreciate all the research you do and all the information you give to us! I for one am THANKFUL for the heads up!|
|@#4 <frostycarver> I did not state Sam had it wrong I corrected MNIBARI12 ,so Duh and doh!!|
|posted by (2013-03-16 00:14:05)|
|I was reading that article and thinking ..apps...what are these apps? Sounded familiar but do I use them (without GOOG)?|
|posted by (2013-03-16 00:27:00)|
|and if they are embedded into something like an OS then likely it will be complicated...|
|posted by (2013-03-16 01:16:58)|
|LOL case in point I just got blocked from a web with this|
Your requested URL has been blocked by the URL Filter database module of McAfee Web Gateway. The URL is listed in categories that are not allowed by your administrator at this time.
Don't have MaCrappy on my PC.
|@ 5 www.thefreedictionary.com/gist if you need to understand its meaning and follow your own advice by reading what is written.|
~8 yes you do if installed and in a domestic situation there are some not required but the intrusions cannot just be turned off since windows is an interpolative system with a dynamic link library where everything is connected to everything else and that's where it falls down in security,PA is in California and are the sort of people that do peripherals security and conceptualise the next generation firewalls with AIDS (LOL)Auto intrusion detection systems with some degree of autonomy,a thinking firewall with greater control of the communication processes and more radical framework.
|zone alarm security suite free for home use is one of my favourite ones of those I install for people in small set ups and domestics at the moment and it stopped everything I threw at it and once updated with latest definitions was rock solid.|
|ZA also hides you ID well and clips the last octet of your ip addy as well which I always thought cool.|
|Embolism... YOU NEVER SPECIFIED TO WHOM YOU WERE TALKING TO SO BACK AT YA...MY FRIEND????? SMARTASS|
|@13 if you followed your own advice and read what was written that should be self evident to even someone who paraphrases Homer Simpson ,lol.|
|@1 following your train of thought in regard qoute: (ths means that ISPs which choose to block such apps in order to increase security and bandwidth are recommended to reconsider their strategy.)|
I direct you to this latest news www.vuze.com/corp/press.php in regard : VUZE APPLAUDS FCC IN SETTING TRAFFIC-THROTTLING HEARING since this report is good news towards getting the FCC and all ISP`s to stopping said throttling back and joint works with the industry to make Bittorrent work and get used as it should,just one small step towards a freer internet for us all and the report by Sam gives a report that in effect proves p2p is not the fly in the ointment security wise all the others would say it is in order to suppress what we do with it.
|posted by (2013-03-16 20:46:56)|
|Embolism do you know of a program that I can basically I can navigate to an program, right click on it and chose "Do not allow internet connection"? I have a firewall but its not so simple (at all).|
|you can shut off services or control process within the computers own o/s with windows manager or in services,or do much the same thing in Linux but with a lot more variations and ways to do it including 3rd party program management,personally would kill or in Linux not install anything I don`t need to run my system or any 3rd party services for same.|
It is just as easy in zone alarm or Comodo to control most network processes and stop ,limit or control access.zone alarm security suite allows with right click all your network options for control or simply to shut it down got to you wired or wifi connection symbol and disable it.
Embolism avatar @17 the network connection not the symbol,lol,I would think you still want access to the internet so in services or in zone alarm Comodo would be the best options,zone alarm allows you to allow,deny,stop the process or ask you what you want to doregarding all connections so if you wish to stop a connected application i.e a program from updating you just deny its access or have the fire wall ask you if you wish to allow it or not in that instance and to allow it once as an exception or to change the rule.
|sourceforge.net/directory/freshness:recently-updated/?q=+system+process+management for 3rd party programs .|
|process hacker is voted around 95% so may give you a better visual representation of what the firewall is doing with control options for same but one process manager suffices for me and less complicated,not that I am on my windows partition for anything more than an odd game now and then.|
|posted by (2013-03-17 19:25:10)|
|Thanks very much for your reply Embolism. I do in fact have Comodo as a firewall, always on Safe Mode, but it has allowed suddenly Sandboxie and TuneUp Utilities to phone home. As to the original question the best I have found in there is to 'Close and block access' but I don't want both together - I want to soft to still be running. Will look into process hacker anyways. Thanks again.|
|posted by (2013-03-18 00:37:21)|
|So....Palo Alto have just now confirmed what we have known to be true since at least Windows 95, that M$ products are a security risk.|
Add that to the fact that people are "Urging" M$ to make apple products more useful by opening a security breach via Office for iPwn..... I'm thinking that the world is finally coming to realise the joys of that which is linux.
Or maybe I'm just reading too much into this....and need to be committed....
Most Popular Stories