In a major victory for the music industry, a New York federal judge has ordered embattled P2P software maker LimeWire to immediately and permanently stop distributing and supporting its file-sharing software.
In a rare break for LimeWire, the Federal Trade Commission (FTC) last week decided to drop its investigation into the embattled software company's controversial Peer-to-Peer file sharing software.
Even after cutting a damages award in a file-sharing case to one-tenth the original sum, a judge said Friday the new fine was still excessive.
One of the most popular engines for searching for movies and music distributed via BitTorrent has been ordered to remove links to illegally shared content, marking a victory for the entertainment industry.
Irish ISP Eircom launched a three-month pilot program on Monday that will see those who repeatedly share files under copyright cut off from their Internet service.
The Dropbox file-synchronisation service lets you access your files from anywhere, not just your computer, smartphone, and tablet, but also any Web browser. Here are five of our favourite ways to use it.
The demise of the Gnutella client, LimeWire (a study in 2008 showed it was still the number one peer-to-peer client eight years after was first released!), has us reminiscing about some of the popular file sharing applications of the past, which open...
Lime Group Chairman Mark Gorton found himself in the hot seat last week during a hearing on the problem of inadvertent data leaks on peer-to-peer (P2P) networks including his company's, LimeWire. The hearing was held by the House Oversight and Govern...
Stephane Herry says that he founded his private file-sharing network GigaTribe out of frustration at not being able to share files with his friends on Kazaa. Every time he searched for a file that he knew a friend had uploaded, he saw only similar fi...
Whitepapers about file sharing
This whitepaper provides provides a global view into enterprise application usage and the associated threats by summarizing network traffic assessments conducted in 3,056 organizations worldwide in 2012. The application and threat patterns discussed within this report dispel the position that social networking, filesharing and video applications are the most common threat vectors, while reaffirming that internal applications are highly prized targets.
Most Popular Reviews
- 1 Synology DiskStation DS215j NAS device
- 2 Fitbit Charge wireless activity tracker
- 3 HP Stream 11 laptop
- 4 B&O BeoPlay A2 portable Bluetooth speaker
- 5 Acer Chromebook 11 (CB3-111)
Best Deals on GoodGearGuide
Latest News Articles
- Kevlar could keep lithium-ion batteries from catching fire
- Microsoft previews free, updated Power BI business intelligence tool
- Microsoft's stream processing engine boosts Bing, Azure services
- Snapchat and Twitter violate each other's personal space
- Sony Mobile said to be planning 1000 more job cuts
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.