https://tech.churchofjesuschrist.org/wiki/File_%26_music_sharing_(Family_Safety)?action=history&feed=atom&File & music sharing (Family Safety) - Revision history2024-03-28T13:14:08ZRevision history for this page on the wikiMediaWiki 1.39.6https://tech.churchofjesuschrist.org/wiki/index.php?title=File_%26_music_sharing_(Family_Safety)&diff=37510&oldid=prevW.king.ii: /* Tips & Suggestions */2012-07-01T22:32:56Z<p><span dir="auto"><span class="autocomment">Tips & Suggestions</span></span></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 22:32, 1 July 2012</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l26">Line 26:</td>
<td colspan="2" class="diff-lineno">Line 26:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* You could also close down the ports on the local firewall (most have the ability to be configured at the port level). Unless you are familiar with this technology, it is not suggested to attempt this yourself. However, you could find a friend, neighbor, or local computer store personnel who might be able to help you get this configured.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* You could also close down the ports on the local firewall (most have the ability to be configured at the port level). Unless you are familiar with this technology, it is not suggested to attempt this yourself. However, you could find a friend, neighbor, or local computer store personnel who might be able to help you get this configured.</div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">* Be aware that the ports used to download the files can usually be changed within the software. This may mean that you need to check what ports are being used by the software, to ensure that those ports are being blocked. The way you do this will depend on what P2P software you are using.</ins></div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* Finally, if you do allow P2P applications on your computer, keep an eye on the application’s download directory. P2P applications have a cache directory in which they store all of their downloaded videos and music files. The cache directory is usually configured within the P2P application, itself, so you can set it to whatever location you want on your computer. You can then check that location regularly to see what has been downloaded. While this is not the best method for keeping track of what comes onto your machine, it is better than having free, unrestricted, unmonitored access to all of the content on P2P systems.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* Finally, if you do allow P2P applications on your computer, keep an eye on the application’s download directory. P2P applications have a cache directory in which they store all of their downloaded videos and music files. The cache directory is usually configured within the P2P application, itself, so you can set it to whatever location you want on your computer. You can then check that location regularly to see what has been downloaded. While this is not the best method for keeping track of what comes onto your machine, it is better than having free, unrestricted, unmonitored access to all of the content on P2P systems.</div></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;"></del></div></td><td colspan="2" class="diff-side-added"></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">* Be aware that the ports used to download the files can usually be changed within the software. This may mean that you need to check what ports are being used by the software, to ensure that those ports are being blocked. The way you do this will depend on what P2P software you are using.</del></div></td><td colspan="2" class="diff-side-added"></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Additional Resources ==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Additional Resources ==</div></td></tr>
</table>W.king.iihttps://tech.churchofjesuschrist.org/wiki/index.php?title=File_%26_music_sharing_(Family_Safety)&diff=37509&oldid=prevW.king.ii: /* Peer-to-Peer Technology and Security */2012-07-01T22:31:01Z<p><span dir="auto"><span class="autocomment">Peer-to-Peer Technology and Security</span></span></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 22:31, 1 July 2012</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l13">Line 13:</td>
<td colspan="2" class="diff-lineno">Line 13:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>These applications are designed to provide a direct pathway into your computer from other computers on the Internet. The protocols that are used might not be monitored by your security or filter applications. By using a P2P application, you are downloading files provided by strangers with no guarantee of their validity or authenticity. Many times files which appear legitimate on peer-to-peer networks are, in fact, [[malicious software]] which can compromise your computer and cause it to give away your [[sensitive information]].</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>These applications are designed to provide a direct pathway into your computer from other computers on the Internet. The protocols that are used might not be monitored by your security or filter applications. By using a P2P application, you are downloading files provided by strangers with no guarantee of their validity or authenticity. Many times files which appear legitimate on peer-to-peer networks are, in fact, [[malicious software]] which can compromise your computer and cause it to give away your [[sensitive information]].</div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">If you do decide to use P2P software for any executable files (programs, scripts, add-ons, etc.), make sure you use a md5, sha1, or similar hash (basically a digital fingerprint) from a reputable source for the file. This will allow you to verify that the file is probably not tampered with, reducing the risk of executing malware on your computer.</ins></div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Tips & Suggestions ==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Tips & Suggestions ==</div></td></tr>
</table>W.king.iihttps://tech.churchofjesuschrist.org/wiki/index.php?title=File_%26_music_sharing_(Family_Safety)&diff=37508&oldid=prevW.king.ii: /* Tips & Suggestions */2012-07-01T22:23:57Z<p><span dir="auto"><span class="autocomment">Tips & Suggestions</span></span></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 22:23, 1 July 2012</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l26">Line 26:</td>
<td colspan="2" class="diff-lineno">Line 26:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* Finally, if you do allow P2P applications on your computer, keep an eye on the application’s download directory. P2P applications have a cache directory in which they store all of their downloaded videos and music files. The cache directory is usually configured within the P2P application, itself, so you can set it to whatever location you want on your computer. You can then check that location regularly to see what has been downloaded. While this is not the best method for keeping track of what comes onto your machine, it is better than having free, unrestricted, unmonitored access to all of the content on P2P systems.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>* Finally, if you do allow P2P applications on your computer, keep an eye on the application’s download directory. P2P applications have a cache directory in which they store all of their downloaded videos and music files. The cache directory is usually configured within the P2P application, itself, so you can set it to whatever location you want on your computer. You can then check that location regularly to see what has been downloaded. While this is not the best method for keeping track of what comes onto your machine, it is better than having free, unrestricted, unmonitored access to all of the content on P2P systems.</div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">* Be aware that the ports used to download the files can usually be changed within the software. This may mean that you need to check what ports are being used by the software, to ensure that those ports are being blocked. The way you do this will depend on what P2P software you are using.</ins></div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Additional Resources ==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Additional Resources ==</div></td></tr>
</table>W.king.iihttps://tech.churchofjesuschrist.org/wiki/index.php?title=File_%26_music_sharing_(Family_Safety)&diff=33206&oldid=prevTimRiker: /* Peer-to-Peer Technology and Copyright laws */2012-04-18T22:38:16Z<p><span dir="auto"><span class="autocomment">Peer-to-Peer Technology and Copyright laws</span></span></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 22:38, 18 April 2012</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l5">Line 5:</td>
<td colspan="2" class="diff-lineno">Line 5:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>From a security and safety standpoint, there are several areas of concern surrounding P2P applications. Of course, there are also the legal issues, since copyright laws can be easily ignored and bypassed using these applications. One of the first P2P applications, Napster, was forced to close down operations due to copyright infringement allegations. However, Napster is operating again, now within the bounds of the current copyright laws. This does not mean, however, that copyrighted material is no longer being shared illegally; it simply means that these companies are not liable for possible infringements by the users of those applications because of the way that the application operates. There are some subtle legal issues regarding copyright liability which can be easily addressed by the developers and operators of these applications to allow them to operate within the legal boundaries.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>From a security and safety standpoint, there are several areas of concern surrounding P2P applications. Of course, there are also the legal issues, since copyright laws can be easily ignored and bypassed using these applications. One of the first P2P applications, Napster, was forced to close down operations due to copyright infringement allegations. However, Napster is operating again, now within the bounds of the current copyright laws. This does not mean, however, that copyrighted material is no longer being shared illegally; it simply means that these companies are not liable for possible infringements by the users of those applications because of the way that the application operates. There are some subtle legal issues regarding copyright liability which can be easily addressed by the developers and operators of these applications to allow them to operate within the legal boundaries.</div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;"></ins></div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">P2P software is also used to share files that are licensed for free distribution. P2P software may well be the fastest way to obtain these files. The license requirements of files on P2P networks is not always clear. You may be held responsible for knowing the licensing requirements of any files you download or share. If you are not sure of the license implications, the best route may be to avoid P2P software completely.</ins></div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Peer-to-Peer Technology and Security ==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Peer-to-Peer Technology and Security ==</div></td></tr>
</table>TimRikerhttps://tech.churchofjesuschrist.org/wiki/index.php?title=File_%26_music_sharing_(Family_Safety)&diff=33205&oldid=prevTimRiker: /* Peer-to-Peer Technology and Security */2012-04-18T22:33:21Z<p><span dir="auto"><span class="autocomment">Peer-to-Peer Technology and Security</span></span></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 22:33, 18 April 2012</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l10">Line 10:</td>
<td colspan="2" class="diff-lineno">Line 10:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Apart from the legal issues surrounding P2P applications, there may be significant security concerns. Peer-to-peer applications may be able to bypass the security measures that are put in place to protect your computer and family.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Apart from the legal issues surrounding P2P applications, there may be significant security concerns. Peer-to-peer applications may be able to bypass the security measures that are put in place to protect your computer and family.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>These applications are designed to provide a direct pathway into your computer from <del style="font-weight: bold; text-decoration: none;">any </del>other <del style="font-weight: bold; text-decoration: none;">computer in </del>the <del style="font-weight: bold; text-decoration: none;">world</del>. The protocols that are used might not be monitored by your security or filter applications. By using a P2P application, you are downloading files provided by strangers with no guarantee of their validity or authenticity. Many times files which appear legitimate on peer-to-peer networks are, in fact, [[malicious software]] which can compromise your computer and cause it to give away your [[sensitive information]].</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>These applications are designed to provide a direct pathway into your computer from other <ins style="font-weight: bold; text-decoration: none;">computers on </ins>the <ins style="font-weight: bold; text-decoration: none;">Internet</ins>. The protocols that are used might not be monitored by your security or filter applications. By using a P2P application, you are downloading files provided by strangers with no guarantee of their validity or authenticity. Many times files which appear legitimate on peer-to-peer networks are, in fact, [[malicious software]] which can compromise your computer and cause it to give away your [[sensitive information]].</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Tips & Suggestions ==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Tips & Suggestions ==</div></td></tr>
</table>TimRikerhttps://tech.churchofjesuschrist.org/wiki/index.php?title=File_%26_music_sharing_(Family_Safety)&diff=33204&oldid=prevTimRiker: tone it down a bit2012-04-18T22:31:58Z<p>tone it down a bit</p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 22:31, 18 April 2012</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l8">Line 8:</td>
<td colspan="2" class="diff-lineno">Line 8:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Peer-to-Peer Technology and Security ==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Peer-to-Peer Technology and Security ==</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Apart from the legal issues surrounding P2P applications, there <del style="font-weight: bold; text-decoration: none;">are </del>significant security concerns. Peer-to-peer applications <del style="font-weight: bold; text-decoration: none;">an effective way </del>to bypass the security measures that are put in place to protect your computer and family.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Apart from the legal issues surrounding P2P applications, there <ins style="font-weight: bold; text-decoration: none;">may be </ins>significant security concerns. Peer-to-peer applications <ins style="font-weight: bold; text-decoration: none;">may be able </ins>to bypass the security measures that are put in place to protect your computer and family.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>These applications are <del style="font-weight: bold; text-decoration: none;">architected </del>to provide a direct pathway into your computer from any other computer in the world. The protocols that are used <del style="font-weight: bold; text-decoration: none;">are </del>not <del style="font-weight: bold; text-decoration: none;">normally </del>monitored by <del style="font-weight: bold; text-decoration: none;">any of the </del>security or filter applications. By using a P2P application, you are downloading files provided by <del style="font-weight: bold; text-decoration: none;">complete </del>strangers with no guarantee of their validity or authenticity. Many times files which appear legitimate on peer-to-peer networks are, in fact, [[malicious software]] which can compromise your computer and cause it to give away your [[sensitive information]].</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>These applications are <ins style="font-weight: bold; text-decoration: none;">designed </ins>to provide a direct pathway into your computer from any other computer in the world. The protocols that are used <ins style="font-weight: bold; text-decoration: none;">might </ins>not <ins style="font-weight: bold; text-decoration: none;">be </ins>monitored by <ins style="font-weight: bold; text-decoration: none;">your </ins>security or filter applications. By using a P2P application, you are downloading files provided by strangers with no guarantee of their validity or authenticity. Many times files which appear legitimate on peer-to-peer networks are, in fact, [[malicious software]] which can compromise your computer and cause it to give away your [[sensitive information]].</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Tips & Suggestions ==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Tips & Suggestions ==</div></td></tr>
</table>TimRikerhttps://tech.churchofjesuschrist.org/wiki/index.php?title=File_%26_music_sharing_(Family_Safety)&diff=33200&oldid=prevAebrown: Undo revision 33184 by Arizonat (Talk) -- inappropriate changes2012-04-18T19:16:36Z<p>Undo revision 33184 by <a href="/wiki/Special:Contributions/Arizonat" title="Special:Contributions/Arizonat">Arizonat</a> (<a href="/wiki/User_talk:Arizonat/edit?redlink=1" class="new" title="User talk:Arizonat (page does not exist)">Talk</a>) -- inappropriate changes</p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 19:16, 18 April 2012</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l8">Line 8:</td>
<td colspan="2" class="diff-lineno">Line 8:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Peer-to-Peer Technology and Security ==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Peer-to-Peer Technology and Security ==</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">There are no </del>legal issues surrounding P2P applications<del style="font-weight: bold; text-decoration: none;">; </del>there are <del style="font-weight: bold; text-decoration: none;">only legal issues surrounding downloading of illegal content (which you can do in any number of ways). There are also no </del>significant security concerns<del style="font-weight: bold; text-decoration: none;">, beyond the normal precautions one should take when downloading files from the internet</del>. <del style="font-weight: bold; text-decoration: none;">You might have heard someone say "</del>Peer-to-peer applications an effective way to bypass the security measures that are put in place to protect your computer and family<del style="font-weight: bold; text-decoration: none;">.", but that is complete horseshit</del>.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">Apart from the </ins>legal issues surrounding P2P applications<ins style="font-weight: bold; text-decoration: none;">, </ins>there are significant security concerns. Peer-to-peer applications an effective way to bypass the security measures that are put in place to protect your computer and family.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>These applications are architected to provide a direct pathway into your computer from any other computer in the world <del style="font-weight: bold; text-decoration: none;">(except this sentence is completely untrue)</del>. The protocols that are used are not normally monitored by any of the security or filter applications <del style="font-weight: bold; text-decoration: none;">(except this sentence is also pretty completely untrue)</del>. By using a P2P application, you are downloading files provided by complete strangers with no guarantee of their validity or authenticity <del style="font-weight: bold; text-decoration: none;">(except, as you might have guessed, this is not true</del>. <del style="font-weight: bold; text-decoration: none;"> There are ways to find out, with a reasonable degree of certainty, whether a given file (or "torrent") is legitimate). </del>Many times files which appear legitimate on peer-to-peer networks are, in fact, [[malicious software]] which can compromise your computer and cause it to give away your [[sensitive information]] <del style="font-weight: bold; text-decoration: none;">(hey! this is actually true. But if you take reasonable precautions, just like you should when downloading anything in any manner, you will be ok.</del></div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>These applications are architected to provide a direct pathway into your computer from any other computer in the world. The protocols that are used are not normally monitored by any of the security or filter applications. By using a P2P application, you are downloading files provided by complete strangers with no guarantee of their validity or authenticity. Many times files which appear legitimate on peer-to-peer networks are, in fact, [[malicious software]] which can compromise your computer and cause it to give away your [[sensitive information]].</div></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div> </div></td><td colspan="2" class="diff-side-added"></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">Many modern P2P applications are brilliantly designed, and can help both consumers and producers of information in innumerable ways. For example, producers of content may not have the bandwidth available to distribute their works to all who are interested. Technologies such as BitTorrent can allow massive-scale distribution without incurring any significant requirements on the original distributor, since the content can be sourced from other downloaders. Many companies, such as Blizzard Entertainment, distribute software and software updates using BitTorrent networks. Universities use BitTorrent to distribute very large data sets from scientific research. Protocols such as BitTorrent are also useful in helping to gain access to content, such as General Conference videos, while under an oppressive government which otherwise would not allow access to that content.</del></div></td><td colspan="2" class="diff-side-added"></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div> </div></td><td colspan="2" class="diff-side-added"></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">P2P applications can also be used in illegal or nefarious ways, just as with any technology. Users are encouraged to make decisions on their own about how to use them</del>.</div></td><td colspan="2" class="diff-side-added"></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Tips & Suggestions ==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Tips & Suggestions ==</div></td></tr>
</table>Aebrownhttps://tech.churchofjesuschrist.org/wiki/index.php?title=File_%26_music_sharing_(Family_Safety)&diff=33184&oldid=prevArizonat: /* Peer-to-Peer Technology and Security */ fighting for truth, justice, and the American way2012-04-18T18:11:56Z<p><span dir="auto"><span class="autocomment">Peer-to-Peer Technology and Security: </span> fighting for truth, justice, and the American way</span></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 18:11, 18 April 2012</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l8">Line 8:</td>
<td colspan="2" class="diff-lineno">Line 8:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Peer-to-Peer Technology and Security ==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Peer-to-Peer Technology and Security ==</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;">Apart from the </del>legal issues surrounding P2P applications<del style="font-weight: bold; text-decoration: none;">, </del>there are significant security concerns. Peer-to-peer applications an effective way to bypass the security measures that are put in place to protect your computer and family.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">There are no </ins>legal issues surrounding P2P applications<ins style="font-weight: bold; text-decoration: none;">; </ins>there are <ins style="font-weight: bold; text-decoration: none;">only legal issues surrounding downloading of illegal content (which you can do in any number of ways). There are also no </ins>significant security concerns<ins style="font-weight: bold; text-decoration: none;">, beyond the normal precautions one should take when downloading files from the internet</ins>. <ins style="font-weight: bold; text-decoration: none;">You might have heard someone say "</ins>Peer-to-peer applications an effective way to bypass the security measures that are put in place to protect your computer and family<ins style="font-weight: bold; text-decoration: none;">.", but that is complete horseshit</ins>.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>These applications are architected to provide a direct pathway into your computer from any other computer in the world. The protocols that are used are not normally monitored by any of the security or filter applications. By using a P2P application, you are downloading files provided by complete strangers with no guarantee of their validity or authenticity. Many times files which appear legitimate on peer-to-peer networks are, in fact, [[malicious software]] which can compromise your computer and cause it to give away your [[sensitive information]].</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>These applications are architected to provide a direct pathway into your computer from any other computer in the world <ins style="font-weight: bold; text-decoration: none;">(except this sentence is completely untrue)</ins>. The protocols that are used are not normally monitored by any of the security or filter applications <ins style="font-weight: bold; text-decoration: none;">(except this sentence is also pretty completely untrue)</ins>. By using a P2P application, you are downloading files provided by complete strangers with no guarantee of their validity or authenticity <ins style="font-weight: bold; text-decoration: none;">(except, as you might have guessed, this is not true</ins>. <ins style="font-weight: bold; text-decoration: none;"> There are ways to find out, with a reasonable degree of certainty, whether a given file (or "torrent") is legitimate). </ins>Many times files which appear legitimate on peer-to-peer networks are, in fact, [[malicious software]] which can compromise your computer and cause it to give away your [[sensitive information]] <ins style="font-weight: bold; text-decoration: none;">(hey! this is actually true. But if you take reasonable precautions, just like you should when downloading anything in any manner, you will be ok.</ins></div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div> </div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">Many modern P2P applications are brilliantly designed, and can help both consumers and producers of information in innumerable ways. For example, producers of content may not have the bandwidth available to distribute their works to all who are interested. Technologies such as BitTorrent can allow massive-scale distribution without incurring any significant requirements on the original distributor, since the content can be sourced from other downloaders. Many companies, such as Blizzard Entertainment, distribute software and software updates using BitTorrent networks. Universities use BitTorrent to distribute very large data sets from scientific research. Protocols such as BitTorrent are also useful in helping to gain access to content, such as General Conference videos, while under an oppressive government which otherwise would not allow access to that content.</ins></div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div> </div></td></tr>
<tr><td colspan="2" class="diff-side-deleted"></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">P2P applications can also be used in illegal or nefarious ways, just as with any technology. Users are encouraged to make decisions on their own about how to use them</ins>.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Tips & Suggestions ==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Tips & Suggestions ==</div></td></tr>
</table>Arizonathttps://tech.churchofjesuschrist.org/wiki/index.php?title=File_%26_music_sharing_(Family_Safety)&diff=33182&oldid=prevBjhomer84: P2P applications do not allow unauthorized individuals to push files onto your system. They only let you actively pull files from others' systems. This paragraph was just completely wrong.2012-04-18T17:40:30Z<p>P2P applications do not allow unauthorized individuals to push files onto your system. They only let you actively pull files from others' systems. This paragraph was just completely wrong.</p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 17:40, 18 April 2012</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l10">Line 10:</td>
<td colspan="2" class="diff-lineno">Line 10:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Apart from the legal issues surrounding P2P applications, there are significant security concerns. Peer-to-peer applications an effective way to bypass the security measures that are put in place to protect your computer and family.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Apart from the legal issues surrounding P2P applications, there are significant security concerns. Peer-to-peer applications an effective way to bypass the security measures that are put in place to protect your computer and family.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>These applications are architected to provide a direct pathway into your computer from any other computer in the world. The protocols that are used are not normally monitored by any of the security or filter applications<del style="font-weight: bold; text-decoration: none;">, which means that by </del>using a P2P application you are <del style="font-weight: bold; text-decoration: none;">opening your computer, and your home, to </del>complete strangers <del style="font-weight: bold; text-decoration: none;">and allowing them to directly place anything they want on your system</del>.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>These applications are architected to provide a direct pathway into your computer from any other computer in the world. The protocols that are used are not normally monitored by any of the security or filter applications<ins style="font-weight: bold; text-decoration: none;">. By </ins>using a P2P application<ins style="font-weight: bold; text-decoration: none;">, </ins>you are <ins style="font-weight: bold; text-decoration: none;">downloading files provided by </ins>complete strangers <ins style="font-weight: bold; text-decoration: none;">with no guarantee of their validity or authenticity</ins>. Many times files which appear legitimate on peer-to-peer networks are, in fact, [[malicious software]] which can compromise your computer and cause it to give away your [[sensitive information]].</div></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div> </div></td><td colspan="2" class="diff-side-added"></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Many times files which appear legitimate on peer-to-peer networks are, in fact, [[malicious software]] which can compromise your computer and cause it to give away your [[sensitive information]].</div></td><td colspan="2" class="diff-side-added"></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Tips & Suggestions ==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Tips & Suggestions ==</div></td></tr>
</table>Bjhomer84https://tech.churchofjesuschrist.org/wiki/index.php?title=File_%26_music_sharing_(Family_Safety)&diff=22799&oldid=prevDavebailey: /* Peer-to-Peer Technology and Security */2011-04-11T20:28:46Z<p><span dir="auto"><span class="autocomment">Peer-to-Peer Technology and Security</span></span></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 20:28, 11 April 2011</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l12">Line 12:</td>
<td colspan="2" class="diff-lineno">Line 12:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>These applications are architected to provide a direct pathway into your computer from any other computer in the world. The protocols that are used are not normally monitored by any of the security or filter applications, which means that by using a P2P application you are opening your computer, and your home, to complete strangers and allowing them to directly place anything they want on your system.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>These applications are architected to provide a direct pathway into your computer from any other computer in the world. The protocols that are used are not normally monitored by any of the security or filter applications, which means that by using a P2P application you are opening your computer, and your home, to complete strangers and allowing them to directly place anything they want on your system.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Many times files which appear legitimate are, in fact, [[malicious software]] which can compromise your computer and cause it to give away your [[sensitive information]].</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Many times files which appear legitimate <ins style="font-weight: bold; text-decoration: none;">on peer-to-peer networks </ins>are, in fact, [[malicious software]] which can compromise your computer and cause it to give away your [[sensitive information]].</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Tips & Suggestions ==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>== Tips & Suggestions ==</div></td></tr>
</table>Davebailey