[Last Call] Learn how to a build a cloud-first strategyRegister Now


EMULE and LAN risks

Posted on 2007-09-27
Medium Priority
Last Modified: 2008-01-09

During routine inspection of my users PC's, I found that one of them had eMule installed.

I know that there are risks associated to eMule, but how risky is this program ?? I removed the program but the user wants it installed again.

His answer was: nothing happened so far....

Thanks in advance,

Question by:ERNIE25
  • 2
  • 2

Expert Comment

ID: 19975310
eMule is a pretty stable/safe application. It has been out for years now, and since it is an open-source project - every single bug gets fixed almost immediately.

Anyway, back to the point. The are 2 potential threats that eMule can impose:

1) User can allow sharing of valuable information (done manually by user).

2) User can download malicious files onto the computer (done manually by user).

So here you go, if you trust your users, and they do have experience in computers, then with a descent ante-virus eMule is not a threat to your computer.
LVL 11

Accepted Solution

tvman_od earned 500 total points
ID: 19975809
If it's a company computer there is one more threat, legal. If user shares or downloads copyrighted work such as music,movies or books and somehow it will be traced by FBI or similar authorities to your network, make a wild gues what's going to happen. eMule by itself is a good application and if you use it wisely nothing wrong is going to happen.

Expert Comment

ID: 19980375
Strange, I didn't get any points... Even though I provided 2/3 of the answer.
LVL 11

Expert Comment

ID: 19980866
den4b, yeah, sometimes it's strange how people aword points. Some times I'm working with a user and after 10-15 answers on the problem someone pops up with a minor comment and gets all the points.

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
This Micro Tutorial will teach you how to add a cinematic look to any film or video out there. There are very few simple steps that you will follow to do so. This will be demonstrated using Adobe Premiere Pro CS6.
Look below the covers at a subform control , and the form that is inside it. Explore properties and see how easy it is to aggregate, get statistics, and synchronize results for your data. A Microsoft Access subform is used to show relevant calcul…
Suggested Courses

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question