First rule I can suggest to you, don't be afraid to be rude if you know what you are talking about is right.
Everything this man has said I agree with, he's probably not lying even though I have not found such results from searches like this. Yet, I also joined these boards because I felt compelled to suggest exactly the same thing he is suggesting for an option in Limewire.
I received a virus (Trojan) that was embedded as an wma file just 20 minutes ago. The scripts were stopped before the file had finished downloading, both Limewire and my Anti-Virus did a good job of that. Yet, I figured, hell is that enough ?! Why not be able to log all corrupt file events and log such info such as:
> Hosted IP Addresses
> Usernames
> Other info
Depending on the severity of the Log event, such as a virus or child pornography, it would perform instructions such as:
> Send Email Warning - This would state that YOU the user are hosting a corrupted file that could and is assumed to be a virus, your IP and username have been recorded in violation of secure and proper use of the Gnutella networks and are formely warned to remove set instance of file:
"C:\Users\*******\Downloads\Music\a perfect circle - Emotive.wma"
If you are caught in violation again after 2 days, your account and IP will be suspended from all network activity there after.
A beautifully ingenious network like Gnutella will eat itself out from the inside if it allows people who are actually hosting viruses, spyware and other malicious files to continue to do so.
Another thing it could do is script a dummy user to download the file from the host and perform a complete data scan and analysis using some online virus application, then decide based on report statistic's what to do next. Hell, if someone was smart enough, they could track down every last instance of the file on the network and wipe it out completely...Now hows that for a public safety service !!
==RenegadeWolf== |