P2P-Zone  

Go Back   P2P-Zone > Peer to Peer
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Peer to Peer The 3rd millenium technology!

Reply
 
Thread Tools Search this Thread Display Modes
Old 31-07-03, 04:51 AM   #1
multi
Thanks for being with arse
 
multi's Avatar
 
Join Date: Jan 2002
Location: The other side of the world
Posts: 10,343
Default FTC consumer alert

File-Sharing: A Fair Share? Maybe Not.

Every day, millions of computer users share files online. Whether it is music, games, or software, file-sharing can give people access to a wealth of information. You simply download special software that connects your computer to an informal network of other computers running the same software. Millions of users could be connected to each other through this software at one time. The software often is free and easily accessible.

Sounds promising, right? Maybe, but make sure that you consider the trade-offs. The Federal Trade Commission (FTC), the nation's consumer protection agency, cautions that file-sharing can have a number of risks. For example, when you are connected to file-sharing programs, you may unknowingly allow others to copy private files you never intended to share. You may download material that is protected by the copyright laws and find yourself mired in legal issues. You may download a virus or facilitate a security breach. Or you may unwittingly download pornography labeled as something else.

To secure the personal information stored on your computer, the FTC suggests that you:
  • Set up the file-sharing software very carefully. If you don't check the proper settings when you install the software, you could open access not just to the files you intend to share, but also to other information on your hard drive, like your tax returns, email messages, medical records, photos, or other personal documents.
  • Be aware of spyware. Some file-sharing programs install other software known as spyware. Spyware monitors a user's browsing habits and then sends that data to third parties. Sometimes the user gets ads based on the information that the spyware has collected and disseminated. Spyware can be difficult to detect and remove. Before you use any file-sharing program, you may want to buy software that can prevent the downloading of spyware or help detect it on your hard drive.
  • Close your connection. In some instances, closing the file-sharing program window does not actually close your connection to the network. That allows file-sharing to continue and could increase your security risk. If you have a high-speed or "broadband" connection to the Internet, you stay connected to the Internet unless you turn off the computer or disconnect your Internet service. These "always on" connections may allow others to copy your shared files at any time. What's more, some file-sharing programs automatically open every time you turn on your computer. As a preventive measure, you may want to adjust the file-sharing program's controls to prevent the file-sharing program from automatically opening.
  • Use and update your anti-virus software regularly. Files you download could be mislabeled, hiding a virus or other unwanted content. Use anti-virus software to protect your computer from viruses you might pick up from other users through the file-sharing program. Although your virus filter should prevent your computer from receiving possibly destructive files, computer security experts suggest you avoid files with extensions like .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, and .cmd.
  • Talk with your family about file-sharing. Parents may not be aware that their children have downloaded file-sharing software on the family computer and that they may have exchanged games, videos, music, pornography, or other material that may be inappropriate for them. Also, because other peoples' files sometimes are mislabeled, kids unintentionally may download these files. In addition, kids may not understand the security and other risks involved with file-sharing and may install the software incorrectly, giving anyone on the Internet access to the family's private computer files.


from



after all this time...this appears now...?
why now?
i think they could of issued a warning 3 yrs or so ago...
or is this just the new riaa boss weilding some political clout..?
Attached Images
 
__________________

i beat the internet
- the end boss is hard
multi is offline   Reply With Quote
Old 31-07-03, 04:59 AM   #2
multi
Thanks for being with arse
 
multi's Avatar
 
Join Date: Jan 2002
Location: The other side of the world
Posts: 10,343
Default ok this may be going a bit far but while im on the subject..

i saw this at the srt8dog forum..by a poster called ESAD:

Quote:
It's late, I'm tired, this will not be spell checked and may need grammar correction.
You will have to read the manual for BestCrypt as these instructions are complete but lack any real detail.

1) If you are not sure whether you have any key loggers or Trojans on your computer, reformat and re-install your OS.

2) Install BESTCRYPT. Make a container with 5GB size. (Good for transfer to DVD) You can make them much larger if you don't plan to move containers to DVD. Use 4096 bit key and a short password.
Name it something simple like family photos. Now, throw a few pics of mom and dad in there.

3) Next go to the BestCrypt control panel and make a "hidden part". This is Steganography. What you are doing is creating a hidden part inside your encrypted container that takes up the rest of the space
left over after you have added the images. You will give this "hidden part" a very long password. **Remember - after you have created the larger hidden part, you can no longer add any more files to the original container.**

4) Now what you have is one 5 GIG encrypted mountable container. Inside is the one you might share if the feds come knocking. (family pics), the other is your 4.9 GB hidden part.
You know, the part with all the "other stuff" LOL. Whatever that may be.

5) Now, when you mount the container with BC control panel, it will prompt you for a password. You either enter the short one for family pics, or the longer one for the good stuff.

6) Enter the password for the hidden part. BC will respond that you have entered the password for the hidden part and now you can browse it like another hard drive.
Install Kazaa or whatever other file sharing program you have onto this mounted HIDDEN PART! Make sure ALL settings are set to use a directory located on this hidden section.
READ: ALL TEMP FILES, SHARED FOLDERS, MY KAZAA FOLDER, etc. Also, install any software that you will use to manipulate anything in there, onto the hidden part as well.
Otherwise it will surely make temp files that are not encrypted elsewhere on your computer.

7) Ok, so the retards at RIAA subpoena you for sharing 100 copyrighted songs, and your ISP sells you out. LOL LMMFAO!!!! FU!!!!!
When they come to your house to search your computer and can't find anything but do find a BEST Crypt container and ask you what’s in the BC container. . . you say. . .Oh,
nothing. . . just some family photos. They say, "Can we have the password?" You say sure thing! Give it to them, they open it and all they can find is pics of mom and dad, you and
sis etc. They will never see the other container, and they will NEVER be able to detect/prove that there ever was one.

You just play dumb. Now of course they may open your registry and see that Kazaa was installed to *:\ but you can tell them that was old and you uninstalled it
months ago. They will be left holding their nuts.

If you are careful setting your software up inside your hidden container such that it doesn't write any files to your unprotected hard drive/s this will never fail you.
BC also has a swap file encryption until as well so. . . there you have it. Not an ad for BC, but a sure fire way to protect yourself from anyone looking for anything
Illegal.

Have phun!

ESAD
hidden encrypted areas on your hard disk...hmmm
__________________

i beat the internet
- the end boss is hard
multi is offline   Reply With Quote
Old 01-08-03, 08:28 AM   #3
sith
Dark Lord
 
sith's Avatar
 
Join Date: Jun 2003
Posts: 10
Default

thanx, thats what i have been looking for
sith is offline   Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump






All times are GMT -6. The time now is 02:44 AM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
© www.p2p-zone.com - Napsterites - 2000 - 2024 (Contact grm1@iinet.net.au for all admin enquiries)