By using this site, you agree to our updated Privacy Policy and our Terms of Use. Manage your Cookies Settings.
435,377 Members | 3,052 Online
Bytes IT Community
+ Ask a Question
Need help? Post your question and get tips & solutions from a community of 435,377 IT Pros & Developers. It's quick & easy.

Security and Peer to Peer Networks

P: n/a
Do file-sharing (Kazaa) and/or instant-messaging (Skype) applications which
rely on peer to peer networks threaten the security of MS-SQL data when they
are running on a machine with a connection to the Server, as with, for
example, an Access ADP?

I do not use such applications, but a client wants an opinion. My opinion,
which is - don't touch a peer to peer network with a ten foot pole -, is
purely personal opinion and has no basis in fact.

What's your opinion, with or with out facts?

--
Lyle
--
use iso date format: yyyy-mm-dd
http://www.w3.org/QA/Tips/iso-date
--
The e-mail address isn't, but you could use it to find one.
Nov 13 '05 #1
Share this Question
Share on Google+
3 Replies


P: n/a
Opinion: This is a "work place" computer. It is for "work place" items. It
was purchased by the "work place". If they want to file share, do it at home
on the computer THEY purchased. An email or two is one thing, but the size
of files (hard drive space) and network bandwidth that these things can take
up very quickly becomes intolerable.

I've had to repair several computers for folks that have had this sort of
software installed. The TCP/IP stack gets messed up and has to be
reinstalled before the networking will work.

--
Wayne Morgan
MS Access MVP
"Lyle Fairfield" <Lo******@FFDBA.Com> wrote in message
news:Xn*******************@130.133.1.4...
Do file-sharing (Kazaa) and/or instant-messaging (Skype) applications
which
rely on peer to peer networks threaten the security of MS-SQL data when
they
are running on a machine with a connection to the Server, as with, for
example, an Access ADP?

I do not use such applications, but a client wants an opinion. My opinion,
which is - don't touch a peer to peer network with a ten foot pole -, is
purely personal opinion and has no basis in fact.

What's your opinion, with or with out facts?

--
Lyle
--
use iso date format: yyyy-mm-dd
http://www.w3.org/QA/Tips/iso-date
--
The e-mail address isn't, but you could use it to find one.

Nov 13 '05 #2

P: n/a

"Lyle Fairfield" <Lo******@FFDBA.Com> wrote in message
news:Xn*******************@130.133.1.4...
Do file-sharing (Kazaa) and/or instant-messaging (Skype) applications
which
rely on peer to peer networks threaten the security of MS-SQL data when
they
are running on a machine with a connection to the Server, as with, for
example, an Access ADP?

I do not use such applications, but a client wants an opinion. My opinion,
which is - don't touch a peer to peer network with a ten foot pole -, is
purely personal opinion and has no basis in fact.

What's your opinion, with or with out facts?

--
Lyle
--
use iso date format: yyyy-mm-dd
http://www.w3.org/QA/Tips/iso-date
--
The e-mail address isn't, but you could use it to find one.


is fact bad things follow wire to all places!

***Sherwood Wang MVP***
Nov 13 '05 #3

P: n/a
Lyle Fairfield <Lo******@FFDBA.Com> wrote in message news:<Xn*******************@130.133.1.4>...
Do file-sharing (Kazaa) and/or instant-messaging (Skype) applications which
rely on peer to peer networks threaten the security of MS-SQL data when they
are running on a machine with a connection to the Server, as with, for
example, an Access ADP?

I do not use such applications, but a client wants an opinion. My opinion,
which is - don't touch a peer to peer network with a ten foot pole -, is
purely personal opinion and has no basis in fact.

What's your opinion, with or with out facts?


Besides the potential prospect of the install process for these
programs installing malware, there are a wide range of potential
problems ranging from registry mis-configuration to denial of service
exploits. Some reading material:

http://www.itsecurity.com/papers/iss7.htm
http://www.unwantedlinks.com/Guntella-alert.htm

Unless there is a substantial business justification to use this I'd
certainly recommend that it isn't worth the risk.

'-----------------------------
' John Mishefske
'-----------------------------
Nov 13 '05 #4

This discussion thread is closed

Replies have been disabled for this discussion.