House votes to lock out P2P threat

Thursday, 9 October 2003, 2:17 PM EST

U.S. government agencies that use such decentralized networks to exchange data would have to ensure they do not accidentally expose classified material or allow hackers into their systems under the bill, which passed by voice vote.

Peer-to-peer networks such as Kazaa and Grokster allow users to copy music and other material directly from each others' hard drives, drawing millions of enthusiastic users and the legal wrath of the recording industry.

Federal agencies have begun to use peer-to-peer technology as well. The www.fedstats.gov page, for example, uses peer-to-peer techniques to pull statistics and information from computers in more than 100 different U.S. government agencies.

But if configured improperly, peer-to-peer networks can expose tax returns, medical records and other sensitive documents that users do not want to share. Worms and viruses can spread through the networks, and some also contain hidden "spyware" to track users' activities, according to testimony at a committee hearing earlier this year.

[ Read more ]




Spotlight

Successful strategies to avoid frequent password changes

Posted on 19 August 2014.  |  After a widespread, nonspecific data breach, the conventional wisdom is that people should change all their passwords. But, there’s a better way.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Aug 20th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //