Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Re: security in P2P
Jul 29 2012 11:52PM
Mike S (mikeofmany gmail com)
So if this is a private network, upon submitting the file for
tracking, one can setup the hash of the file. Then if the file is
modified, that hash can be compared against the modified file, to me
this seems like the only way to have a detection based on anomaly.
Otherwise, If it is my network, and...
[ more ]
Copyright 2010, SecurityFocus