Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Security Awareness 9 10 09 V4 Peer
1. P2P file-sharing programs frequently contain spyware and infect computers with malware. Examples include Lime Wire, e-Donkey, and BitTorrent. Peer to Peer (P2P)
2. The Dangers of Peer to Peer (P2P) Section: Peer to Peer often used to download illegal copies of copyrighted materials a wrong configuration of the file-sharing program can put Sensitive Information on your computer at risk use of P2P programs on the University network is prohibited in some departments Check with your IT support office or contact the ITS Help Desk at(919.962. HELP) to make sure your information is not at risk.
3. Learning Point # 13 Section: Peer to Peer You recently installed BitTorrent on your computer to download some open source software. You leave BitTorrent running on your computer since you did nothing illegal and it poses no danger. Right? Wrong! While it is true that BitTorrent is a legal software, running BitTorrent after you are done downloading legal material could allow other users to access Sensitive Information on your computer. Any filesharing software should always be turned off when the download is complete.
4. Learning Point # 14 Section: Peer to Peer A friend, who shares my love of classic James Bond movies, recommends a Web site for downloading “Goldfinger”. If I am not certain about whether downloading “Goldfinger” on to my personal laptop is legal, I can always call 919.962.HELP and find out. Right? Right! Everyone affiliated with UNC-Chapel Hill can always call 919.962.HELP with any questions regarding computer use.