Tag Archives: security

Risks and Rewards of File Sharing

Often when people hear the term “peer-to-peer file sharing”, they think of torrents, illegal swapping of the latest movies and music, and resulting lawsuits by the record or movie industries for piracy.  That does happen; however, file sharing encompasses much more than ripping off the latest hits. Peer-to-Peer, or P2P, is the most widely used form of file sharing. It has become a big and growing part of the Internet, already accounting for 50-70% of consumer network traffic, with millions of P2P clients downloaded and in use.  In 2004, an estimated 70 million people were busily sharing files, and doubtless many more now. But P2P is not the only means to share files over the Net. It should not be confused with file hosting, which uses the more familiar client-server architecture of the Internet to stream files to users from big, centralized Web servers. In its purest form, Peer-to-Peer is strictly that: users’ computers directly linked across the Net to their peers; that is, other users’ computers.  They join in a network of equals, each machine devoting some fraction of its computing power, bandwidth, and memory to the network, ideally without any need for a central coordinator. In fact, P2P works pretty much the way the Web was originally intended to function. Collaborative computing Civilization is the story of how ever-larger tasks can be done, and done much more efficiently, with cooperation. As a form of collaborative computing between users, … Continue reading

Posted in How the Net Works, News, Security, Tips and Tricks | Tagged , , , , , , , , , | Comments Off

10 Free SWCP Services to Help Keep You Secure

At Southwest Cyberport, we know that all we can do to increase our members’ security in their online activities helps keep everybody else safe, too. So we not only offer a lot of good advice to all and sundry right here on the blog, there’s also a number of tools and services we make available to our customers for no extra charge. SWCP Members are invited, nay encouraged, to make full use of them as needed. Just log in at the Members Portal  at our website with your username and password. Antispam filters –Whether you use SWCP’s email services through us or have us forward your mail to another box elsewhere, everyone should take advantage of this vigorous suite of email filters. You can block addresses, make sure that mail from other addresses reaches you filtered or unfiltered, and determine just how sensitive you want the filters to be. You can even set up addresses that mail should be forwarded to, or automatic replies for when you’re away. Spamprobe – Also located with our antispam filters, Spamprobe is an additional sophisticated spam filter,  one that learns from you. You can actually teach Spamprobe to distinguish spam from good mail, allowing you to further fine-tune your spam filters to keep the junk out. Webmail – Along with our antispam filters, this is a very helpful interface. You can directly manage your email from anywhere in the world with a web browser, … Continue reading

Posted in Online Tools, Resources, Security | Tagged , , , , , , , | Comments Off

Zombie Alert!

With Halloween coming up, the fear and fascination with the walking dead is everywhere. In recent years, the Centers for Disease Control have used zombie alerts to warn of the flu. Highway departments have also zombie mania to get people to try to slow down, though that has drawn a lot of criticism. But they’re all latecomers. Back in 2007, the FBI issued a warning about zombie attacks. Nothing tongue in cheek about this one, either; it was very serious indeed. These weren’t the kind of modern zombie that wants to eat your brains; these zombies were more traditional in that they have become unwitting, helpless slaves of an evil master. Yet these zombies are not undead flesh and blood; they lust after your PC, laptop, tablet, or smartphone to turn them into zombie machines just like the rest to attack other devices. The threat is still quite real, and an infestation can not only quickly destroy your files and render your computer useless to you, but makes it a danger to the entire Internet. Hordes of zombies Zombie programs, also called “bots”, hijack computers through trickery. Infection often occurs when the user is tricked into opening an email attachment with a virus or visits a booby-trapped webpage, though they can also appear in downloaded files. Free screensavers are also a common means of infection, because a screensaver is an executable program. The virus quickly commandeers the computer, to steal … Continue reading

Posted in Security | Tagged , , , , , , , , | Comments Off