{"id":1269,"date":"2008-01-19T16:24:07","date_gmt":"2008-01-19T16:24:07","guid":{"rendered":"http:\/\/www.surfnetkids.com\/go\/safety\/2008\/01\/19\/common-risks-of-file-sharing-on-peer-to-peer-networks\/"},"modified":"2008-01-19T16:24:07","modified_gmt":"2008-01-19T16:24:07","slug":"common-risks-of-file-sharing-on-peer-to-peer-networks","status":"publish","type":"post","link":"https:\/\/www.surfnetkids.com\/tech\/1269\/common-risks-of-file-sharing-on-peer-to-peer-networks\/","title":{"rendered":"Common Risks of File Sharing on Peer to Peer Networks"},"content":{"rendered":"<p>Sharing files over peer to peer networks has many risks. Let&#8217;s take a look at the more common ones:<\/p>\n<p><strong>Malware and Spyware:<\/strong><\/p>\n<p>Some file-sharing software comes bundled with malware such as spyware, viruses, adware, or otherwise privacy-invasive software. Usually you are not aware of this, but the problem is that sometimes this unwanted software remains installed on the system even if the original file-sharing software is removed. Usually such software is very difficult to eliminate. However, it is not impossible, but if you do not know about it, how can you get rid of it?<\/p>\n<p><strong>Poor computer operation:<\/strong><\/p>\n<p>In many cases P2P networks install malware and spyware on your computer, as mentioned above, however besides the privacy issues of this such malware can interfere with the correct operation of web browsers, anti-virus software, anti-spyware and software firewalls. It can also lead to degraded performance on affected systems. So not only do you get compromised privacy and security, but a slower computer that does not run as well. Often times the sneaking extras that come with downloading file sharing programs hamper other programs ability to run.<\/p>\n<p><strong>Pornography and illegal materials:<\/strong><\/p>\n<p>Many P2P file-sharing systems are used to distribute adult pornography to children, child pornography to anyone, inflammatory literature, and illegal or &#8220;unpopular&#8221; material. This means if you do not know what networks are safe to use, you put yourself at risk for such downloads. Also, many times files being shared might be copyrighted, or be illegally obtained, such as pirated video. Just because you do not know how the items were obtained does not mean you are not liable if you download them. So, if you share with users you do not know, you put yourself at risk for being liable for pirating, breaking copyright laws, etc.<\/p>\n<p><strong>Malicious Code:<\/strong><\/p>\n<p>Obviously one of the biggest risks with file sharing is the exposure to and accidental installation of malicious code. When you use P2P applications, it is difficult, if not impossible, to verify that the source of the files is trustworthy. Many people who think it is fun to attack computer systems with viruses etc. use these P2P systems to spread malicious code. Attackers may incorporate spyware, viruses, Trojan horses, or worms into the files that they are sharing, and thus, if you download the files, your computer becomes infected. So, the only way to really protect yourself from this is to never download anything, but that sort of defeats the purpose. However, just be aware that even the best virus protection programs do not catch everything, so only download from trusted users.<\/p>\n<p><strong>Personal information compromised:<\/strong><\/p>\n<p>Many times using P2P networks inadvertently compromises personal information. It might be the information you enter into the profile, or it might be that files you are sharing open portals to your computer where personal information may be viewed. This is often a way that identity is stolen, so be careful about what information you enter, and what is accessible from your computer.<\/p>\n<p>These are the common risks of file sharing over peer to peer networks. There are probably many other risks as well, however, these affect the most people. Protect yourself by having a good virus protection program installed, by enabling your firewall, and by being careful and selective about what you download and from whom.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sharing files over peer to peer networks has many risks. Let&#8217;s take a look at the more common ones: Malware and Spyware: Some file-sharing software comes bundled with malware such as spyware, viruses, adware, or otherwise privacy-invasive software. Usually you &#8230;<a href=\"https:\/\/www.surfnetkids.com\/tech\/1269\/common-risks-of-file-sharing-on-peer-to-peer-networks\/\">[Continue]<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[28,45,550,574],"tags":[287,665,1179,1180,1181,1182,559],"class_list":{"0":"post-1269","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-privacy","7":"category-security","8":"category-teens","9":"category-viruses-and-spyware","10":"tag-file-sharing","11":"tag-malware","12":"tag-networks","13":"tag-p2p","14":"tag-peer-to-peer","15":"tag-risks","16":"tag-spyware-2","17":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Common Risks of File Sharing on Peer to Peer Networks &#187; Tech Tips \u00bb Surfnetkids<\/title>\n<meta name=\"description\" content=\"Sharing files over peer to peer networks has many risks. Let&#039;s take a look at the more common ones:Malware and Spyware:Some file-sharing software comes\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.surfnetkids.com\/tech\/1269\/common-risks-of-file-sharing-on-peer-to-peer-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Common Risks of File Sharing on Peer to Peer Networks &#187; Tech Tips \u00bb Surfnetkids\" \/>\n<meta property=\"og:description\" content=\"Sharing files over peer to peer networks has many risks. Let&#039;s take a look at the more common ones:Malware and Spyware:Some file-sharing software comes\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.surfnetkids.com\/tech\/1269\/common-risks-of-file-sharing-on-peer-to-peer-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"Tech Tips \u00bb Surfnetkids\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/surfnetkids\/\" \/>\n<meta property=\"article:published_time\" content=\"2008-01-19T16:24:07+00:00\" \/>\n<meta name=\"author\" content=\"Barbara J. Feldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@barbarafeldman\" \/>\n<meta name=\"twitter:site\" content=\"@barbarafeldman\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Barbara J. Feldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/1269\\\/common-risks-of-file-sharing-on-peer-to-peer-networks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/1269\\\/common-risks-of-file-sharing-on-peer-to-peer-networks\\\/\"},\"author\":{\"name\":\"Barbara J. Feldman\",\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/#\\\/schema\\\/person\\\/cdb196c6a51c0f75efece9d1acfc200a\"},\"headline\":\"Common Risks of File Sharing on Peer to Peer Networks\",\"datePublished\":\"2008-01-19T16:24:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/1269\\\/common-risks-of-file-sharing-on-peer-to-peer-networks\\\/\"},\"wordCount\":565,\"commentCount\":0,\"keywords\":[\"File Sharing\",\"malware\",\"networks\",\"P2P\",\"peer to peer\",\"risks\",\"spyware\"],\"articleSection\":[\"Privacy\",\"Security\",\"Teens\",\"Viruses and Spyware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/1269\\\/common-risks-of-file-sharing-on-peer-to-peer-networks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/1269\\\/common-risks-of-file-sharing-on-peer-to-peer-networks\\\/\",\"url\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/1269\\\/common-risks-of-file-sharing-on-peer-to-peer-networks\\\/\",\"name\":\"Common Risks of File Sharing on Peer to Peer Networks &#187; Tech Tips \u00bb Surfnetkids\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/#website\"},\"datePublished\":\"2008-01-19T16:24:07+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/#\\\/schema\\\/person\\\/cdb196c6a51c0f75efece9d1acfc200a\"},\"description\":\"Sharing files over peer to peer networks has many risks. Let's take a look at the more common ones:Malware and Spyware:Some file-sharing software comes\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/1269\\\/common-risks-of-file-sharing-on-peer-to-peer-networks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/1269\\\/common-risks-of-file-sharing-on-peer-to-peer-networks\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/1269\\\/common-risks-of-file-sharing-on-peer-to-peer-networks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Tech Tips\",\"item\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy\",\"item\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/category\\\/privacy\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Common Risks of File Sharing on Peer to Peer Networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/#website\",\"url\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/\",\"name\":\"Tech Tips \u00bb Surfnetkids\",\"description\":\"for families and classrooms from Surfnetkids.com\",\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/#\\\/schema\\\/person\\\/cdb196c6a51c0f75efece9d1acfc200a\",\"name\":\"Barbara J. Feldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f6e46f3b8086ff1944261ad7589f4953e61a09467d9352840df2b96d32ad45bb?s=96&d=wavatar&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f6e46f3b8086ff1944261ad7589f4953e61a09467d9352840df2b96d32ad45bb?s=96&d=wavatar&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f6e46f3b8086ff1944261ad7589f4953e61a09467d9352840df2b96d32ad45bb?s=96&d=wavatar&r=g\",\"caption\":\"Barbara J. Feldman\"},\"description\":\"Barbara J. Feldman is a syndicated columnist and online publisher at Feldman Publishing. She has a computer science degree from University of California, Irvine, and has been a nerd for more than forty years. Follow Barbara Feldman\",\"sameAs\":[\"http:\\\/\\\/www.barbarafeldman.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Common Risks of File Sharing on Peer to Peer Networks &#187; Tech Tips \u00bb Surfnetkids","description":"Sharing files over peer to peer networks has many risks. Let's take a look at the more common ones:Malware and Spyware:Some file-sharing software comes","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.surfnetkids.com\/tech\/1269\/common-risks-of-file-sharing-on-peer-to-peer-networks\/","og_locale":"en_US","og_type":"article","og_title":"Common Risks of File Sharing on Peer to Peer Networks &#187; Tech Tips \u00bb Surfnetkids","og_description":"Sharing files over peer to peer networks has many risks. Let's take a look at the more common ones:Malware and Spyware:Some file-sharing software comes","og_url":"https:\/\/www.surfnetkids.com\/tech\/1269\/common-risks-of-file-sharing-on-peer-to-peer-networks\/","og_site_name":"Tech Tips \u00bb Surfnetkids","article_publisher":"https:\/\/www.facebook.com\/surfnetkids\/","article_published_time":"2008-01-19T16:24:07+00:00","author":"Barbara J. Feldman","twitter_card":"summary_large_image","twitter_creator":"@barbarafeldman","twitter_site":"@barbarafeldman","twitter_misc":{"Written by":"Barbara J. Feldman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.surfnetkids.com\/tech\/1269\/common-risks-of-file-sharing-on-peer-to-peer-networks\/#article","isPartOf":{"@id":"https:\/\/www.surfnetkids.com\/tech\/1269\/common-risks-of-file-sharing-on-peer-to-peer-networks\/"},"author":{"name":"Barbara J. Feldman","@id":"https:\/\/www.surfnetkids.com\/tech\/#\/schema\/person\/cdb196c6a51c0f75efece9d1acfc200a"},"headline":"Common Risks of File Sharing on Peer to Peer Networks","datePublished":"2008-01-19T16:24:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.surfnetkids.com\/tech\/1269\/common-risks-of-file-sharing-on-peer-to-peer-networks\/"},"wordCount":565,"commentCount":0,"keywords":["File Sharing","malware","networks","P2P","peer to peer","risks","spyware"],"articleSection":["Privacy","Security","Teens","Viruses and Spyware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.surfnetkids.com\/tech\/1269\/common-risks-of-file-sharing-on-peer-to-peer-networks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.surfnetkids.com\/tech\/1269\/common-risks-of-file-sharing-on-peer-to-peer-networks\/","url":"https:\/\/www.surfnetkids.com\/tech\/1269\/common-risks-of-file-sharing-on-peer-to-peer-networks\/","name":"Common Risks of File Sharing on Peer to Peer Networks &#187; Tech Tips \u00bb Surfnetkids","isPartOf":{"@id":"https:\/\/www.surfnetkids.com\/tech\/#website"},"datePublished":"2008-01-19T16:24:07+00:00","author":{"@id":"https:\/\/www.surfnetkids.com\/tech\/#\/schema\/person\/cdb196c6a51c0f75efece9d1acfc200a"},"description":"Sharing files over peer to peer networks has many risks. Let's take a look at the more common ones:Malware and Spyware:Some file-sharing software comes","breadcrumb":{"@id":"https:\/\/www.surfnetkids.com\/tech\/1269\/common-risks-of-file-sharing-on-peer-to-peer-networks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.surfnetkids.com\/tech\/1269\/common-risks-of-file-sharing-on-peer-to-peer-networks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.surfnetkids.com\/tech\/1269\/common-risks-of-file-sharing-on-peer-to-peer-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Tech Tips","item":"https:\/\/www.surfnetkids.com\/tech\/"},{"@type":"ListItem","position":2,"name":"Privacy","item":"https:\/\/www.surfnetkids.com\/tech\/category\/privacy\/"},{"@type":"ListItem","position":3,"name":"Common Risks of File Sharing on Peer to Peer Networks"}]},{"@type":"WebSite","@id":"https:\/\/www.surfnetkids.com\/tech\/#website","url":"https:\/\/www.surfnetkids.com\/tech\/","name":"Tech Tips \u00bb Surfnetkids","description":"for families and classrooms from Surfnetkids.com","inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.surfnetkids.com\/tech\/#\/schema\/person\/cdb196c6a51c0f75efece9d1acfc200a","name":"Barbara J. Feldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f6e46f3b8086ff1944261ad7589f4953e61a09467d9352840df2b96d32ad45bb?s=96&d=wavatar&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f6e46f3b8086ff1944261ad7589f4953e61a09467d9352840df2b96d32ad45bb?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f6e46f3b8086ff1944261ad7589f4953e61a09467d9352840df2b96d32ad45bb?s=96&d=wavatar&r=g","caption":"Barbara J. Feldman"},"description":"Barbara J. Feldman is a syndicated columnist and online publisher at Feldman Publishing. She has a computer science degree from University of California, Irvine, and has been a nerd for more than forty years. Follow Barbara Feldman","sameAs":["http:\/\/www.barbarafeldman.com"]}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.surfnetkids.com\/tech\/wp-json\/wp\/v2\/posts\/1269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.surfnetkids.com\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.surfnetkids.com\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.surfnetkids.com\/tech\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.surfnetkids.com\/tech\/wp-json\/wp\/v2\/comments?post=1269"}],"version-history":[{"count":0,"href":"https:\/\/www.surfnetkids.com\/tech\/wp-json\/wp\/v2\/posts\/1269\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.surfnetkids.com\/tech\/wp-json\/wp\/v2\/media?parent=1269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.surfnetkids.com\/tech\/wp-json\/wp\/v2\/categories?post=1269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.surfnetkids.com\/tech\/wp-json\/wp\/v2\/tags?post=1269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}