[p2prg] (no subject)

b7uR <cool_mc_3@yahoo.com> Sun, 15 July 2012 14:06 UTC

Return-Path: <cool_mc_3@yahoo.com>
X-Original-To: p2prg@ietfa.amsl.com
Delivered-To: p2prg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A43E21F8639 for <p2prg@ietfa.amsl.com>; Sun, 15 Jul 2012 07:06:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.578
X-Spam-Level: *
X-Spam-Status: No, score=1.578 tagged_above=-999 required=5 tests=[BAYES_40=-0.185, HTML_MESSAGE=0.001, MISSING_SUBJECT=1.762]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zTF9mgE+dNie for <p2prg@ietfa.amsl.com>; Sun, 15 Jul 2012 07:06:36 -0700 (PDT)
Received: from nm5-vm0.bullet.mail.bf1.yahoo.com (nm5-vm0.bullet.mail.bf1.yahoo.com [98.139.213.150]) by ietfa.amsl.com (Postfix) with SMTP id B51B021F8637 for <p2prg@irtf.org>; Sun, 15 Jul 2012 07:06:36 -0700 (PDT)
Received: from [98.139.212.153] by nm5.bullet.mail.bf1.yahoo.com with NNFMP; 15 Jul 2012 14:07:18 -0000
Received: from [98.139.215.252] by tm10.bullet.mail.bf1.yahoo.com with NNFMP; 15 Jul 2012 14:07:17 -0000
Received: from [127.0.0.1] by omp1065.mail.bf1.yahoo.com with NNFMP; 15 Jul 2012 14:07:17 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 982155.43894.bm@omp1065.mail.bf1.yahoo.com
Received: (qmail 98425 invoked by uid 60001); 15 Jul 2012 14:07:17 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1342361237; bh=cWQz2OrLvVzsehxmQ/zdmCSXkPwNq/9WlExAWHsenzM=; h=X-YMail-OSG:Received:X-Mailer:Message-ID:Date:From:Reply-To:To:MIME-Version:Content-Type; b=065H2LOllKnC0i/eFW3Y23rpYurU7zKBOSwrNm1mqjuMzpJX6qoNiawjn6WQU2MJyZJFGp0n7XWtw88XqFS5dpDOmkQ5+h+Ztc0MCnjwbH0Wj+i8HIvmw+1TOPFT4+6wQAZcRMpSpOcCeBoN+et+DEFHf95uDxVq28aYqrRpbMc=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=X-YMail-OSG:Received:X-Mailer:Message-ID:Date:From:Reply-To:To:MIME-Version:Content-Type; b=1tb+zDZdcfzorsTseAjVcAhbb+6Jzj9kV65ydAW2TjSByroAUt46Xwozhy96TjpEJow3CJFl1ds2iJFNOUlZoBHV4FI0Z3h5BXFXHXW6vmqGSSNbNH2wcc1malrFYT+h9cR2fGQVbFzeOML+rAlsNJqQDNhcVkKp6hkWpzzcc54=;
X-YMail-OSG: eB4cagMVM1m.rMpUoyQjJYYXtod350EEfWeKY_2zW1Qongh IhTJoV7iQxN_1h_4fITJ0Vn_sgA8s7kxOMGf1snIOOEEXpw0aF1QTA4NOSiq nweSDgfZ5oPD3TH5M7vhjIXarYsatxhwzvRahbQXoH7bemcZNxRk15Z1fMct eA0obftSs_hG3vRfAyydB.dppfSyVh4WvpNUD.xtbILqMj5rLCgGCW15Aeuk N3sxKVmH7y0DMt2ZEnxgXnU7_ayqAIhEU_Uat25yUpTu_0pqCF73nFX4TskB HjAcr4k9lVXc.RSgI8ESMvMg9Ci2PI.LFBHWptAXbXbgZwlUp1OGBsuCpO5S tmYdCnqQK1O__PDsT7r6ngTBpKdiS0M57Goc0J96XeZ2Omkojv.1bF9_4WSE KxvdAeO8ka.pukCn7J0ebY6ihFPaPimf.D37jADnwzifrFDOyF_2.SnelvLJ e_tUGH3DQ4.KGaGC3fwnkJTRYmex569X3peLkn9U-
Received: from [218.111.20.2] by web142503.mail.bf1.yahoo.com via HTTP; Sun, 15 Jul 2012 07:07:17 PDT
X-Mailer: YahooMailWebService/0.8.120.356233
Message-ID: <1342361237.93893.YahooMailNeo@web142503.mail.bf1.yahoo.com>
Date: Sun, 15 Jul 2012 07:07:17 -0700
From: b7uR <cool_mc_3@yahoo.com>
To: "p2prg@irtf.org" <p2prg@irtf.org>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="-127571234-539904776-1342361237=:93893"
Subject: [p2prg] (no subject)
X-BeenThere: p2prg@irtf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: b7uR <#1@company.co.uk>
List-Id: Peer-to-Peer Research Group <p2prg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/p2prg>, <mailto:p2prg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/p2prg>
List-Post: <mailto:p2prg@irtf.org>
List-Help: <mailto:p2prg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/p2prg>, <mailto:p2prg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sun, 15 Jul 2012 14:06:37 -0000

Disadvantages of a peer to peer network: 
	* the system is not centralised, making administration difficult 
	* lack of security 
	* no computer in the network is reliable 
Therefore, peer-to-peer networks are only useful for a small number of 
computers (generally about 10), and only suitable for applications that 
do not require a high level of security (it is not advisable in a 
business network containing sensitive data).

how to overcome this disadvantage and how about the security?because when the user using p2p network, the security level is very low compare to ethernet network. During the file is transferring (p2p network), any hackers can hack the user and crash or do something wrong to the file and especially virus. Can this problem be solve? Thank you.