Full access to Entrepreneur for $5
Subscribe

Wreck-Ware

P2P exposes you to attack from hackers looking to filch files. Here's how to avoid a swap-and-run.

By
This story appears in the September 2002 issue of Entrepreneur. Subscribe »

"Dad, mind if i borrow the keys to the network tonight? I'll be real careful. I'm just going to swap files with millions of strangers, maybe accidentally download a Trojan or two, and leave a truck-sized hole in our firewall."

It's rarely put to you that way-at home or at work. But that's the likely outcome if an employee installs a peer-to-peer (P2P) file-swapping program on one of your PCs. Hackers may be already using your network as if it were their own. In fact, developers of these programs may be using your computing resources as their own as well.

Continue reading this article -- and everything on Entrepreneur!

Become a member to get unlimited access and support the voices you want to hear more from. Get full access to Entrepreneur for just $5!