473,403 Members | 2,284 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,403 software developers and data experts.

Security and Peer to Peer Networks

Do file-sharing (Kazaa) and/or instant-messaging (Skype) applications which
rely on peer to peer networks threaten the security of MS-SQL data when they
are running on a machine with a connection to the Server, as with, for
example, an Access ADP?

I do not use such applications, but a client wants an opinion. My opinion,
which is - don't touch a peer to peer network with a ten foot pole -, is
purely personal opinion and has no basis in fact.

What's your opinion, with or with out facts?

--
Lyle
--
use iso date format: yyyy-mm-dd
http://www.w3.org/QA/Tips/iso-date
--
The e-mail address isn't, but you could use it to find one.
Nov 13 '05 #1
3 1448
Opinion: This is a "work place" computer. It is for "work place" items. It
was purchased by the "work place". If they want to file share, do it at home
on the computer THEY purchased. An email or two is one thing, but the size
of files (hard drive space) and network bandwidth that these things can take
up very quickly becomes intolerable.

I've had to repair several computers for folks that have had this sort of
software installed. The TCP/IP stack gets messed up and has to be
reinstalled before the networking will work.

--
Wayne Morgan
MS Access MVP
"Lyle Fairfield" <Lo******@FFDBA.Com> wrote in message
news:Xn*******************@130.133.1.4...
Do file-sharing (Kazaa) and/or instant-messaging (Skype) applications
which
rely on peer to peer networks threaten the security of MS-SQL data when
they
are running on a machine with a connection to the Server, as with, for
example, an Access ADP?

I do not use such applications, but a client wants an opinion. My opinion,
which is - don't touch a peer to peer network with a ten foot pole -, is
purely personal opinion and has no basis in fact.

What's your opinion, with or with out facts?

--
Lyle
--
use iso date format: yyyy-mm-dd
http://www.w3.org/QA/Tips/iso-date
--
The e-mail address isn't, but you could use it to find one.

Nov 13 '05 #2

"Lyle Fairfield" <Lo******@FFDBA.Com> wrote in message
news:Xn*******************@130.133.1.4...
Do file-sharing (Kazaa) and/or instant-messaging (Skype) applications
which
rely on peer to peer networks threaten the security of MS-SQL data when
they
are running on a machine with a connection to the Server, as with, for
example, an Access ADP?

I do not use such applications, but a client wants an opinion. My opinion,
which is - don't touch a peer to peer network with a ten foot pole -, is
purely personal opinion and has no basis in fact.

What's your opinion, with or with out facts?

--
Lyle
--
use iso date format: yyyy-mm-dd
http://www.w3.org/QA/Tips/iso-date
--
The e-mail address isn't, but you could use it to find one.


is fact bad things follow wire to all places!

***Sherwood Wang MVP***
Nov 13 '05 #3
Lyle Fairfield <Lo******@FFDBA.Com> wrote in message news:<Xn*******************@130.133.1.4>...
Do file-sharing (Kazaa) and/or instant-messaging (Skype) applications which
rely on peer to peer networks threaten the security of MS-SQL data when they
are running on a machine with a connection to the Server, as with, for
example, an Access ADP?

I do not use such applications, but a client wants an opinion. My opinion,
which is - don't touch a peer to peer network with a ten foot pole -, is
purely personal opinion and has no basis in fact.

What's your opinion, with or with out facts?


Besides the potential prospect of the install process for these
programs installing malware, there are a wide range of potential
problems ranging from registry mis-configuration to denial of service
exploits. Some reading material:

http://www.itsecurity.com/papers/iss7.htm
http://www.unwantedlinks.com/Guntella-alert.htm

Unless there is a substantial business justification to use this I'd
certainly recommend that it isn't worth the risk.

'-----------------------------
' John Mishefske
'-----------------------------
Nov 13 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

12
by: Angelos Karantzalis | last post by:
Is there a way to set Permissions based on user roles by using some configuration file for my application ? I'm coming from a Java background, where that could very easily be accomplished but...
116
by: Mike MacSween | last post by:
S**t for brains strikes again! Why did I do that? When I met the clients and at some point they vaguely asked whether eventually would it be possible to have some people who could read the data...
0
by: David Pendrey | last post by:
Greetings everyone, I am currently making a program which will need a peer to peer service but I have no idea how to make it work with the modern networks. Getting a peer to peer network on a...
1
by: EoRaptor013 | last post by:
We have a situation almost exactly like that in the MS documentation vis a vis peer-to-peer replication. We have three servers and three user groups, one each in Chicago, New York, and Bermuda....
0
by: masterjuan | last post by:
Networks Hacking (hack C:/ drives, severs...)and security holes all on my website & hacking commands and I explain ways of erasing your tracks so you dont get caught doing "bad" things... What do...
8
by: Matt Kruse | last post by:
http://news.zdnet.com/2100-1009_22-6121608.html Hackers claim zero-day flaw in Firefox 09 / 30 / 06 | By Joris Evers SAN DIEGO--The open-source Firefox Web browser is critically flawed in...
2
by: MikeC | last post by:
I helped a friend setup an Access database which is accessed from two computers on a 3-PC peer-to-peer network. On the 2nd PC there is a shortcut on the desktop that points to the database on the...
0
by: srinivas srinivas | last post by:
Hi, I am developing simple peer-peer RTC application for monitoring the SDP packets and i need to set the TLS security for the transport. But iam struggling to achieving this. Iam using IP...
10
by: iheartvba | last post by:
Hi, I hatve 2 peer to peer networks which I am triying to connect via the Windows XP VPN application. I have achieved the following: 1. Connect to Remote Office 2. Ping all Computer IP...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.