TITLE

Stay Safe Online

PUB. DATE
March 2015
SOURCE
Web User;3/25/2015, Issue 367, p12
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article offers news briefs along with two questions and answers related to computer security measures as of Mrach-April 2015. Topics discussed include installation of Epic Scale, a program that can turn computer into a "Bitcoin miner," from BitTorrent, a protocol for peer-to-peer file sharing, mailboxes being hit by spam emails that spread the CryptoWall file-encrypting ransomware program, and features in free security software.
ACCESSION #
101705622

 

Related Articles

  • Hijacking the Vuze BitTorrent network: all your hop are belong to us. Chan-Tin, Eric; Heorhiadi, Victor; Hopper, Nicholas; Yongdae Kim // IET Information Security;2015, Vol. 9 Issue 4, p203 

    Vuze is a popular file-sharing client. When looking for content, Vuze selects from its list of neighbours, a set of 20 nodes to be contacted; the selection is performed such that the neighbours closest to the content in terms of Vuze ID are contacted first. To improve efficiency of its searches,...

  • WHAT YOU MUST NOT DOWNLOAD IN 2016. Williams, Wayne // Web User;12/30/2015, Issue 387, p38 

    The article reviews several free downloadable programs in 2016 including uTorrent at utorrent.com, PC Matic system tool at www.pcpitstop.com, and Advanced SystemCare 9 at www.iobit.com.

  • Methodology and implementation for tracking the file sharers using BitTorrent. Park, Sooyoung; Chung, Hyunji; Lee, Changhoon; Lee, Sangjin; Lee, Kyungho // Multimedia Tools & Applications;Jan2015, Vol. 74 Issue 1, p271 

    Sharing copyright protected content without the copyright holder's permission is illegal in many countries. Regardless, the number of illegal file sharing using BitTorrent continues to grow and most of file sharers and downloader are unconcerned legal action to transfer copywrite-protected...

  • Efficient and reliable network tomography in heterogeneous networks using BitTorrent broadcasts and clustering algorithms. Dichev, Kiril; Reid, Fergal; Lastovetsky, Alexey // Scientific Programming;2013, Vol. 21 Issue 3, p79 

    In the area of network performance and discovery, network tomography focuses on reconstructing network properties using only end-to-end measurements at the application layer. One challenging problem in network tomography is reconstructing available bandwidth along all links during multiple...

  • Chimera Ransomware Uses Peer-to-Peer for Decryption. Lemos, Robert // eWeek;11/22/2015, p1 

    The article evaluates the Chimera Ransomware that uses peer-to-peer for decryption.

  • On the Mobility Scenario Implementation Using a Graphical P2P Discrete Event Simulator for the Bittorrent Protocol. Charalambous, Marios; Mavromoustakis, Constandinos X.; Violaris, George C.; Yassein, Muneer Bani // Journal of Algorithms & Computational Technology;Dec2013, Vol. 7 Issue 4, p449 

    Peer-to-Peer computing is nowadays the application platform which utilizes a novel distributed computing paradigm. It allows any number of participants to exchange and coordinate their resources with minimum overhead through centralized servers/services. This paradigm is also gaining ground in...

  • A Measurement Study on Resource Popularity and Swarm Evolution of BitTorrent System. Majing Su; Hongli Zhang; Binxing Fang; Lin Ye // International Journal of Communications, Network & System Scienc;Jun2013, Vol. 6 Issue 6, p300 

    Analyzing and modeling of the BitTorrent (BT) resource popularity and swarm evolution is important for better understanding current BT system and designing accurate BT simulators. Although lots of measurement studies on BT almost cover each important aspect, little work reflects the recent...

  • iRep: indirect reciprocity reputation based efficient content delivery in BT-like systems. Wei, Xianglin; Chen, Ming; Tang, Chaogang; Bai, Huali; Zhang, Guomin; Wang, Zhanfeng // Telecommunication Systems;Sep2013, Vol. 54 Issue 1, p47 

    Delivering content efficiently through biased neighbor selection has attracted a lot of researchers' attention in recent years. Meanwhile, how to help peers understand each other is a crucial precondition of biased neighbor selection in distributed P2P context. Recent researches have showed that...

  • ON CLIENT'S INTERACTIVE BEHAVIOUR TO DESIGN PEER SELECTION POLICIES FOR BITTORRENT-LIKE PROTOCOLS. Rocha, Marcus V. M.; da S. Rodrigues, Carlo Kleber // International Journal of Computer Networks & Communications;Sep2013, Vol. 5 Issue 5, p141 

    Peer-to-peer swarming protocols have been proven to be very efficient for content replication over Internet. This fact has certainly motivated proposals to adapt these protocols to meet the requirements of on-demand streaming system. The vast majority of these proposals focus on modifying the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics