In a major victory for the music industry, a New York federal judge has ordered embattled P2P software maker LimeWire to immediately and permanently stop distributing and supporting its file-sharing software.
In a rare break for LimeWire, the Federal Trade Commission (FTC) last week decided to drop its investigation into the embattled software company's controversial Peer-to-Peer file sharing software.
Even after cutting a damages award in a file-sharing case to one-tenth the original sum, a judge said Friday the new fine was still excessive.
One of the most popular engines for searching for movies and music distributed via BitTorrent has been ordered to remove links to illegally shared content, marking a victory for the entertainment industry.
Irish ISP Eircom launched a three-month pilot program on Monday that will see those who repeatedly share files under copyright cut off from their Internet service.
The Dropbox file-synchronisation service lets you access your files from anywhere, not just your computer, smartphone, and tablet, but also any Web browser. Here are five of our favourite ways to use it.
The demise of the Gnutella client, LimeWire (a study in 2008 showed it was still the number one peer-to-peer client eight years after was first released!), has us reminiscing about some of the popular file sharing applications of the past, which open...
Lime Group Chairman Mark Gorton found himself in the hot seat last week during a hearing on the problem of inadvertent data leaks on peer-to-peer (P2P) networks including his company's, LimeWire. The hearing was held by the House Oversight and Govern...
Stephane Herry says that he founded his private file-sharing network GigaTribe out of frustration at not being able to share files with his friends on Kazaa. Every time he searched for a file that he knew a friend had uploaded, he saw only similar fi...
Whitepapers about file sharing
This whitepaper provides provides a global view into enterprise application usage and the associated threats by summarizing network traffic assessments conducted in 3,056 organizations worldwide in 2012. The application and threat patterns discussed within this report dispel the position that social networking, filesharing and video applications are the most common threat vectors, while reaffirming that internal applications are highly prized targets.
Most Popular Reviews
- 1 HTC One Mini 2 android smartphone
- 2 Microsoft Surface Pro 3 Windows 8.1 tablet
- 3 Medion Akoya E4110 (MD 8239) desktop PC
- 4 Samsung Galaxy Tab S (10.5) 4G review
- 5 Dell Inspiron 11 3000 Series convertible laptop
Best Deals on GoodGearGuide
Latest News Articles
- Apple Watch under scrutiny for privacy by Connecticut attorney general
- 'Tiny banker' malware targets US financial institutions
- Data loss detection tool mines the ephemeral world of 'pastes'
- Wi-Fi group acts to simplify peer-to-peer video, printing and other tasks
- Facebook open sources its mcrouter data-caching tool
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.