There are a lot of computer programs out there that allow for peer-to-peer file-sharing. Each of these systems – like the popular Kazaa, Morpheus, or Grokster applications – are easy to use, and provide great fun. However, if you choose …[Continue]
Best Line of Defense Re: File Sharing on P2P Networks
There are some big risks that come with file sharing over peer to peer networks. So, what is the best line of defense against these risks? Well, the first is knowing what they are, and the second is knowing how …[Continue]
Common Risks of File Sharing on Peer to Peer Networks
Sharing files over peer to peer networks has many risks. Let’s take a look at the more common ones: Malware and Spyware: Some file-sharing software comes bundled with malware such as spyware, viruses, adware, or otherwise privacy-invasive software. Usually you …[Continue]
What is Spyware and Why Do You Need It?
Spyware is software that tracks computer use. This technology can be used intentionally or unintentionally and it can be used for good or for bad. Most notably it is used for bad, in which case it is sometimes called “malware”. …[Continue]
How to Protect Your Computer from Music Download and Attachment Viruses
One common question about Internet safety is, “How do I protect my computer while enjoying email attachments and downloading music?” The answer is that by following a few simple rules, it is easy to protect your computer while doing both. …[Continue]