Posts tagged with ‘peer to peer’

sunfoundation:

ZeroAccess: A look at just how big a botnet can get

Sometimes it’s hard to imagine just how contagious a botnet can be, and then sometimes you see them from space. Security researchers at F-Secure created this look at ZeroAccess botnet infections today, across the United States and the world.


FJP: ZeroAccess turns a computer into a peer-to-peer hub that then downloads more malware and waits for further commands. Via Sophos:

ZeroAccess uses a peer-to-peer network to download plugin files which carry out various tasks designed to generate revenue for the botnet owners. Our researchers monitored this network for a period of two months to discover where in the world the peers were located and what kind of files the botnet was being instructed to download.
We found the IP addresses of infected machines from a total of 198 countries ranging from the tiny island nation of Kiribati to the Himalayan Kingdom of Bhutan.

sunfoundation:

ZeroAccess: A look at just how big a botnet can get

Sometimes it’s hard to imagine just how contagious a botnet can be, and then sometimes you see them from space. Security researchers at F-Secure created this look at ZeroAccess botnet infections today, across the United States and the world.

FJP: ZeroAccess turns a computer into a peer-to-peer hub that then downloads more malware and waits for further commands. Via Sophos:

ZeroAccess uses a peer-to-peer network to download plugin files which carry out various tasks designed to generate revenue for the botnet owners. Our researchers monitored this network for a period of two months to discover where in the world the peers were located and what kind of files the botnet was being instructed to download.

We found the IP addresses of infected machines from a total of 198 countries ranging from the tiny island nation of Kiribati to the Himalayan Kingdom of Bhutan.

Just like I told a French journalist and to the lady at the Washington Post, pirates are thieves and they do steal. Yeah yeah, “when I steal your DVD, you have no DVD, but when I copy a file, you still have a file” – I get that BS. We all know that it’s BS too. However, SOPAs and PIPAs create tyranny. If given the choice between thieves and tyranny, I’d rather stay with the thieves.

Suren Ter, creator of YouHaveDownloaded.com to Privacy Online News.

You Have Downloaded indexes IP addresses that have been used to download torrent files. If you visit the site, it will display what files have been downloaded on your network. 

The site, says Ter, is a proof of concept to show visitors what the entertainment industry might see as it tracks downloads across peer-to-peer networks.

H/T: Slashdot.

Free the Network

Via Vice:

[H]ere’s a teaser peak at our latest feature documentary, Free the Network, which looks at how DIY hack-tech is changing the discourse of modern day protests. Our story follows the trials of a pair of college dropouts who head up the Free Network Foundation, a peer-to-peer communications initiative seeking to liberate the global Internet from corporate clutches by building their own decentralized, cooperatively owned, free network, one wifi hotspot at a time.