File Sharing

Posted on 2003-03-06
Medium Priority
Last Modified: 2010-04-03
I am thinking about installing a file sharing software systems.  For example, Imesh, KaZaa Lite, or eDonkey, to name a few.  (These are the ones that I know of, I am sure there are more?)
1. Which is the best choice out of all of them?    
2. What are some of the things that I should be concerned about?  
3. Are they hard to use?
My main concern is causing harm to my computer?
Question by:Page7
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 10

Expert Comment

ID: 8085690
do you want to install it on your LAN or planning to use it for internet???
i am using KaZaa Lite...it works fine on internet.
if you want to use it over just your lan, it wont work probabaly as it requires a server to login.
its not much hard to use.
ya but it might have legal implications if u download copyrighted stuff.

Accepted Solution

WasteofSpace earned 400 total points
ID: 8085886
1. Which is the best choice out of all of them?  

> It really depends on what you intend to retrieve from these services. Kazaa has a huge network presence, heavily involved in transfers of copywrited music/video, Imesh seems to revolve around distributing copywrited software.  

2. What are some of the things that I should be concerned about?  

> My concerns would be in abusing copywrite regulations, which could end up with legal concerns, the spread of viruses and internet worms, and the use of spyware in the P2P software installations.

3. Are they hard to use?

> Generally the interfaces are simple to use, just search for what you wish using keywords and categories (software, music, etc) double click and the file will commence downloads.

If you intend to use this software in a business sense be prepared that it will probably flood your internet bandwidth on a regular basis.

Expert Comment

ID: 8086687
My concern would be safety, regardles which program you want to use.
Take care of the following things:
1. get an os with file protection (in MS it is Windows NT, Windows XP, and use NTFS partition). In this way you can regulate access to your files beyond the program.
2. get a firewall program (like Norton Personal Firewall / Internet Protect). Keep an eye who wants to access your pc and where.

There are not all good guys on the internet. Mutalated files and crashing systems are more common these days.
LVL 14

Expert Comment

ID: 8093061
most of these come packaged with all kinds of junk, from bonzi buddy to gator/gain, date/time manager and newdotnet. stay away from these (unless you like a slow bogged down system and lots of popups). you can normally do a custom install and deselect this crap. (or find a 3rd party repackaged version such as kazaa 'lite').

keep your antivirus up to date. if you're concerned about people potentially getting into your computer from the outside. get a firewall. software firewalls aren't the greatest, but my pick is kerio personal firewall (free for home use). if you're on a high speed connection, pick up a broadband router (linksys, dlink, netgear, etc).

as far as which is best.. i have friends who swear by edonkey, however kazaa is quite simple to use.


kerio personal firewall:


if you use a software firewall, read this:
especially this bit:


Author Comment

ID: 8094413
I for the answers.  I don't think I will chance it.  My computer cost way to much.

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is an update and follow-up of my previous article:   Storage 101: common concepts in the IT enterprise storage This time, I expand on more frequently used storage concepts.
Finding original email is quite difficult due to their duplicates. From this article, you will come to know why multiple duplicates of same emails appear and how to delete duplicate emails from Outlook securely and instantly while vital emails remai…
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question