Help2Go
Free Computer Help.
Powered by Volunteers.




Which P2P Application Should I Use?

by whoozhe
July 29, 2006

Every so often a question pops up that has an answer that involves P2P software. For those not familiar with P2P it stands for Peer to Peer, a method of sharing files between computers on the internet. Even though the P2P is used for illegal purposes such as sharing prirated music, movies and software, it does have legitimate uses as well. The most common reason for seeing the term P2P in topics is when it relates to a user with a spyware, adware, or virus problem. Most of the time it is suggested that the user read the excellent tutorials on security in the Help2Go tutorials section. Not all the bad stuff comes from the actual downloaded file. Often it is the very P2P program that saturates a computer with it's own junk.





The Bad P2P clients

Below is a list of P2P application to avoid. At the time of writing these applications did deposite malicious files on an unsuspected downloader. If you have any the following install remove them now and do what is suggested in the tutorials. You will be infected. I have included those that add any type of toolbar to browsers.

(NLD mean No Longer Developed but may still work)

  • Audiogalaxy Satellite(NLD)
  • BearShare
  • Bittorrent Ultra
  • Blubster
  • eDonkey2000
  • Filecroc
  • Freewire Kazaa
  • Kiwi Alpha
  • Morpheus
  • NeoNapster
  • OneMX
  • Piolet
  • Warez P2P

 

The Good P2P clients

So the question is which ones are safe. Remember that things can change rapidly. What is innocent this week may not be so the next so always be careful. The following were clean at the date of writing this article. But remember - even if the P2P program itself is clean, you can still download harmful software through their networks.

  • Ares
  • Azureus
  • BearShareLite
  • BitComet
  • Bittorrent
  • Computwin / FileNavigator (NLD)
  • Crazaa DC
  • E-Mule
  • eXeem(NLD)
  • Frostwire
  • Gnucleus
  • iMesh
  • Limewire
  • P2P ShareSpy
  • Phex
  • Shareaza
  • Soulseek
  • µTorrent
  • Xolox
The method of spreading malware through what appears to be a legitimate program is not held exclusive to the P2P world. There are now dozens of so called spyware scanners that actually place there own spyware on a system. An updated list of the ones to avoid is kept at http://www.spywarewarrior.com/rogue_anti-spyware.htm The rule here is never jump into what seems good on the surface. The waters may be murky. Always do a search on the application. If it is bad you can guarantee plenty of people will have writen about it. 

Have a question? Need help? Get free, friendly person-to-person help with your computer questions or spyware questions in our help forums!

Creative Commons License

(C) 2008 Help2Go - Contact Us