{"id":81,"date":"2012-03-13T10:08:29","date_gmt":"2012-03-13T14:08:29","guid":{"rendered":"http:\/\/blog.computerworksmi.com\/?p=81"},"modified":"2012-02-27T15:59:39","modified_gmt":"2012-02-27T20:59:39","slug":"infections-in-the-real-world-part-4","status":"publish","type":"post","link":"https:\/\/blog.computerworksmi.com\/?p=81","title":{"rendered":"Infections in the Real World, Part 4"},"content":{"rendered":"<p>We\u2019ve talked about infections many times, at our location, in our newsletters, and here on this blog. But you might be asking yourself, just how do real infections act in the real world, without being filtered through a maze of possibilities and opinions that each infection seems to have.<\/p>\n<p><em>Part 4: The Unruly Application<\/em><\/p>\n<p><strong>What Is an Unruly Application?<\/strong><\/p>\n<p>Many people use applications (programs) that can be easily used for purposes they were not intended to be used for. For example, instant messaging programs and peer-to-peer (P2P) programs can be used to transfer files from one location to another. While that feature is potentially useful, it can pose a security risk if someone compromises that person\u2019s account and sends a file that may potentially be infected. Some examples of potentially unruly applications are instant messaging programs, peer-to-peer programs (usually used to download \u201cfree\u201d music), social networking sites, games, and voice over IP (VoIP) programs.<\/p>\n<p><strong>The Real Life Example<\/strong><\/p>\n<p>In 2010, the United States Federal Trade Commission informed close to 100 organizations and individuals that their personal information \u2013 including sensitive data about customers and employees \u2013 had accidentally leaked onto peer-to-peer networks due to the P2P software not being configured correctly.<\/p>\n<p><strong>How Do I Protect Myself?<\/strong><\/p>\n<p>Be very mindful when installing and configuring programs on your computer, especially programs that have the potential to send or receive information. An incorrectly installed P2P program can and will expose everything on your computer to the World Wide Web. If you find that you\u2019re unsure how to set up the program correctly, you may want to either contact someone familiar with the program or just not install the program at all.<\/p>\n<h6>Computer Works would like to thank Sophos for information used to write this article.<\/h6>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve talked about infections many times, at our location, in our newsletters, and here on this blog. But you might be asking yourself, just how do real infections act in the real world, without being filtered through a maze of &hellip; <a href=\"https:\/\/blog.computerworksmi.com\/?p=81\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[9],"class_list":["post-81","post","type-post","status-publish","format-standard","hentry","category-onlinesafety","tag-virusesmalwarespyware"],"_links":{"self":[{"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/posts\/81","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=81"}],"version-history":[{"count":1,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/posts\/81\/revisions"}],"predecessor-version":[{"id":82,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=\/wp\/v2\/posts\/81\/revisions\/82"}],"wp:attachment":[{"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=81"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=81"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.computerworksmi.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=81"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}