vicomsoft top banner
Instant Messaging & Peer-to-Peer
Peer to peer networking presents a serious threat in all its forms. These include all types of Instant Messaging, file sharing and Internet telephony. Most users are unaware of the risks posed by these technologies.
  • Take file sharing for example:
    Even if the apparent use seems innocuous, such as sharing music files or looking for extraterrestrial life, the user is granting unauthorized access to their computer and its resources to one or more unknown entities.
  • Instant Messaging creates a hole,
    or tunnel through the network's firewall, and uses it to transport text to another computer somewhere, and to receive text from unknown sources. At the time of this writing, most IM communication is unencrypted, although there seems to be a trend toward encryption. Should an IM application have security vulnerabilities, it would be possible for a remote hacker to gain access to the computer, or send an infected file.
  • Internet telephony creates interest because of the obvious cost savings.
    For this reason it is also viewed as a Good Thing, and avoids scrutiny. However, it uses up large amounts of bandwidth. Worse, it uses bandwidth not only for the user's own voice, but may effectively hijack their computer and use it as a telephone router for other calls. This abuse of bandwidth taxes network resources and costs everyone. Further, many network administrators do not like the idea of encrypted data running over their network with no idea of the source, destination, or contents.
  • Loss of Productivity.
    Chatting to friends or downloading software, music of videos can lead to lost productivity and legal liability.
IM application running on LAN with remote hacker gaining access
page base
Home| Products| Downloads| Company| Support| Contact us| Library| Channels| Privacy| Ts&Cs
Content of this page in its entirety is protected by US & UK Copyright © 2009 Vicomsoft Ltd.
Reproduction in electronic and written form is expressly forbidden except for personal use.
Anti Spam| Antispam| Anti-spam| Content Filter| Content Filtering| Email Filter| E-mail Filter| Email Filtering| E-mail Filtering| Email Filtering Software| Employee Monitoring| Filtering Software| Internet Abuse| Internet Content Filter| Internet Filter| Internet Filtering| Internet Filters| Internet Management| Internet Monitor| Internet Monitoring| Phishing| Porn Filter| Porn Filters| Spam| Spam Filter| Spam Filtering| Spyware| Web Filter| Web Filtering| Web Filters| Instant Messaging| AIM| AOL Instant Messenger| ICQ| Yahoo Messenger| MSN Messenger| Peer-to Peer| P2P| eDonkey| Emule| Kademlia| BitTorrent| Gnutella| Morpheus| LimeWire| Kazaa| Internet telephony| Skype