Computer Technos

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 9 May 2011

Banning BitTorrent

Posted on 11:15 by Unknown
I rent out my room to a lodger and would like to give him access to my wireless internet connection. I'm worried that he might download illegal material, and that I'll run into problems after he's gone. Is there any way to give him access while at same time preventing illegal activity?

I presume you're referring to file-sharing. After all, if you're concerned about your lodger engaging in other sorts of "illegal activity" then you shouldn't have him living in your house!

With regard to copyright infringement, your legal position should actually be quite strong: a recent court ruling found that the law doesn't hold broadband subscribers liable for uploads and downloads that they haven't explicitly authorized. This isn't a binding judgment, though, so for now it's understandable that you'd wish to err on the side of caution.

Unfortunately, there isn't much you can practically do to prevent your lodger from sharing copyright material, should he so wish. Normally, internet filtering would be a job for parental control software, but such tools run locally on the PC, and I doubt your lodger would take kindly to your installing a website blocker on his laptop.

Depending on what sort of router you have, it might have an option to block BitTorrent transfers. Such settings aren't foolproof: if someone is determined to share files, they can use encryption and tunneling to sneak their traffic through. But if your router has such an option then it would do no harm to enable it. Doing so would send a message that you don't endorse file-sharing, and if it prompted your lodger to use encryption then that would at least reduce the likelihood of him being caught.

If you really want to lock down your internet connection, you'll need more sophisticated hardware. If you have a spare PC, for example, you could install the free IPCop Linux firewall on it (www. ipcop.org) and use it in conjunction with the free L7 Filter that identifies and blocks peer-to-peer traffic (http:// l7- filter.sourceforge.n et). Clearly, though, this is a big, complex project.

Source of Information :  PC Pro -April 2011
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Internet | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 7 Shortcut Keys
    Longtime users of Windows have probably grown accustomed to navigating around the Windows user interface using the keyboard. This especially...
  • Windows on Mac: Virtualization Solutions
    If you’d prefer to join the ever-increasing ranks of Mac switchers—you traitor, you—you can still run Windows and, more important, Windows a...
  • Customizing Library Folders in Windows 7
    In your library folders, you can customize view options based on the contents. In the toolbar of the Pictures and Music library folders, Win...
  • Windows 7 BitLocker Drive Encryption
    In Windows Vista, you had the BitLocker Drive Encryption feature that allowed you to encrypt the content of entire volumes. In Windows 7, Mi...
  • Using Windows 7’s Performance Options
    While all the performance tools are available individually throughout the system, Windows 7 introduces a nice list of available tools, if yo...
  • Windows 7 - Installing and Configuring a Printer
    If your printer is already installed and operational at this point, you can skip this section and skim ahead for others that may be of inter...
  • Considering Centralized versus Group Sharing
    One of the most important preparation steps for your server is determining how to store the data you create. The two common methods are cent...
  • Berkeley Motes
    The Berkeley motes are a family of embedded sensor nodes sharing roughly the same architecture. Let us take the MICA mote as an example. The...
  • Using Windows 7 Ease of Access Tools
    If you have difficulty using a mouse or typing, have slightly impaired vision, or are deaf or hard of hearing, you can adjust the appearance...
  • Troubleshooting Boot and Startup Problems - Driver Loading in Safe Mode
    How does Windows know which device drivers and services are part of standard and networking-enabled safe mode? The answer lies in the HKLM\S...

Categories

  • Access 2010
  • BlackBerr
  • BlackBerry
  • Computer Science
  • Cyber Security
  • Exchange Server 2010
  • File Utilities
  • Foursquare
  • Google
  • Hardware
  • Internet
  • iPad
  • Linux
  • Lync Server
  • Microsoft Virtualization
  • Mobile Web
  • Networking
  • News
  • Security
  • Server Architectures
  • Smartphone
  • Ubuntu Linux
  • Windows
  • Windows 7
  • Windows Home Server
  • Windows Security
  • Windows Server 2008
  • Windows Server 2008 Hyper-V
  • Windows XP
  • Wireless

Blog Archive

  • ►  2012 (66)
    • ►  August (5)
    • ►  July (9)
    • ►  June (9)
    • ►  May (8)
    • ►  April (9)
    • ►  March (9)
    • ►  February (8)
    • ►  January (9)
  • ▼  2011 (85)
    • ►  December (5)
    • ►  November (6)
    • ►  October (7)
    • ►  September (8)
    • ►  August (9)
    • ►  July (9)
    • ►  June (7)
    • ▼  May (7)
      • Survey: Smartphones Rule Over Other Gadgets
      • Mobile Transactions Popular – Minus the Fees
      • Social Gamers Go Mobile
      • Checking In with Foursquare
      • Banning BitTorrent
      • Running WEP and WPA2 in parallel is problematic, a...
      • THE UBUNTU FILE SYSTEM
    • ►  April (4)
    • ►  March (6)
    • ►  February (8)
    • ►  January (9)
  • ►  2010 (230)
    • ►  December (13)
    • ►  November (3)
    • ►  October (2)
    • ►  September (10)
    • ►  August (31)
    • ►  July (32)
    • ►  June (23)
    • ►  May (2)
    • ►  April (21)
    • ►  March (32)
    • ►  February (28)
    • ►  January (33)
  • ►  2009 (119)
    • ►  December (33)
    • ►  November (31)
    • ►  October (35)
    • ►  September (20)
Powered by Blogger.

About Me

Unknown
View my complete profile