Friday, April 18, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
HTC Hired Ex-Samsung Marketing Officer
Xbox One Wolrdwide Sales Cross 5 million
Samsung Works With GLOBALFOUNDRIES On 14 nm FinFET Offering
Facebook To Find Nearby Friends
Console Sales Lift AMD's First Quarter Results
LG Expands 'Second Screen' TV Ecosystem With Open-Source SDK
Amazon Announces Kindle Service For Samsung Devices
Nokia Halts Sales Of Lumia 2520 Tablet
Active Discussions
help questions structure DVDR
Made video, won't play back easily
Questions durability monitor LCD
Questions fungus CD/DVD Media, Some expert engineer in optical media can help me?
CD, DVD and Blu-ray burning for Android in development
IBM supercharges Power servers with graphics chips
Werner Vogels: four cloud computing trends for 2014
Video editing software.
 Home > News > General Computing > Securit...
Last 7 Days News : SU MO TU WE TH FR SA All News

Friday, November 26, 2004
Security experts trash Kazaa


Peer-to-peer program Kazaa is the number one spyware threat on the internet, according to Computer Associates.

According to the company's Pest Patrol research, Kazaa created a greater threat than other programs in its top five spyware list because of its widespread popularity. Kazaa claims that its sofware has been downloaded 214 million times.

CA gave Kazaa a high 'clot factor', its measure of how much a program slows a machine by adding uncessary registry entries and directories. However, classifying a popular application like Kazaa as spyware is a delicate matter, and CA admits this create difficulties in labelling them.

"Kazaa does something useful," said Simon Perry, vice-president of security strategy for Computer Associates. "I'm not going to say that it doesn't. But turn that around ? you're allowing millions of strangers onto your machine. [Kazaa] is number one because of the amount if copies it's got out there."

The company said that any other peer-to-peer file exchange programs, such as Blubster, E-Mule, Gnucleus and WinMX, could also degrade network performance and consume storage space because they are bundled with adware or spyware.

Adware program Ezula came second in the company's top five, beating adopt.hotbar.com and GameSpy Arcade.

Perry said the difficulty in exactly defining spyware was one reason why the company often referred to certain programs as pests. He said that while the definition of a virus was clear today, spyware was a fuzzy area and that the top five probably wouldn't change much because the programs had a much longer lifespan than viruses.

He added that CA used the term 'pests' as an umbrella phrase to cover around 30 types of annoying programs.

"Pest is a broader category. It includes spyware, adware and browser help objects. One of the things virus writers don't try is to come and sue you. Some of the producers of spyware we detect say to us 'Why are you claiming my software has any malicious intent?'"


Previous
Next
ATI and Qualcomm join forces to improve mobile graphics        All News        Philips launches PCs, after a decade
Asustek aims to ship 600,000 LCD monitors, 800,000 systems in 2005     General Computing News      Philips launches PCs, after a decade

Source Link Get RSS feed Easy Print E-Mail this Message

Related News
France Proposes Tougher Anti-Piracy Laws
Copyright Alert System Set to Begin in The U.S.
British Music Industry To Block More BitTorrent Sites
CCI To Dealy 'Six-strike' Anti-piracy Campaign Until 2013
U.S. Copyright Surveillance Machine About To Be Switched On
Megaupload To Launch Again next Year
Torque Brings BitTorrent To The Browser
BitTorrent Lauches Paid Version Of µTorrent
New EU Law Precludes ISPs To Be Forced to Monitor P2P Users
BitTorrent Launches μTorrent 3.0
BitTorrent Updated With Personal Content Channels
The Pirate Bay Becomes Research Bay

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .