|
Have you been Napstered...........?
This white paper exclusively published at;
by
Explores the risks associated with
"FILE SHARING".
| AUDITORS - take
note of this QUOTE!
"The illegitimate use of the Web and the
personal use of e-mail by employees have become commonplace.
When the boss is not around, improper use of the Web is normal."
-- Michael Erbschloe, vice president of research
at Computer Economics, Carlsbad, California. http://www.infoworld.com/articles/ca/xml/01/02/26/010226cacop.xml?0227tueb
|
NAPSTER
If you haven't heard of Napster by now
then you haven't been reading the paper, listening to TV,
radio or other
forms of media. or maybe you've just got back from an interplanetary
trip.......
It's been the hottest news on the Internet
for some time now and the usage rates for this very popular
free software
utility exclusively designed for sharing music files over the Internet is
reported to be in
excess of 60 million users. Napster was
founded by Shawn Fanning in 1999.
|
Master
Key Download details from
ZDNET data since 27th December 2000 for
this version only - there have
been many prior versions!
|
Napster v2.0 beta 9.6 - Finds and
download MP3 and WMA files -
FREE
Version: 2.0 beta 9.6 Size: 1.76 MB Downloads: 974,562
Windows 9x, NT, or 2000 |
Napster is designed to let end-users search for MP3 music
files on the computers of other users
online and download the tracks they
want directly from those users, bypassing any central servers,
a technique
called peer-to-peer computing. The lack of central servers in the system is
at the heart of
Napster's approach as it argues that no copyright infringing
material resides on an organisations servers.
FILE SHARING is the new buzz word
You've heard of Application Service Providers (ASP's).
Whilst the big vendors have been trying to work
out the distribution model
that would make them lots of revenue over the web with the "remote
serving of
applications to your desktop for a fee", the underground WWW
community has been very pro-active in
coming up with a model based on
Napster that works for them.
It's FREE. It's FAIRGAME, and it
gets them what they want - FREE latest version software. Software
that you
may have already paid for that they then copy from your systems to theirs
then crack the serial
number issue via crackz and serialz lists FREELY
available to underground participants!
They have come up with the word FILESHARING as a means of
legitimising (in their minds) software
swapping and sharing across the WWW.
BE READY FOR IT, IT IS HAPPENING RIGHT
UNDER YOUR NOSES ALREADY!
Whether you like it or not, you may have already been NAPSTERED!
It is highly likely that within your own
organisation in government or the private sector there are avid
listeners to
MP3 and other sound files sitting on the desktop that have been downloaded
to your systems,
using your internet time, using your assets, just so the
desktop user can enjoy the benefit of listening to
music. It's like
"sharing a tape or a CD with friends" is what the avid enthusiast
will say. "Besides, why
shouldn't we share these sorts of files, its
purely for listening pleasure" is another common quote.
This may mean that you have on your PC
based systems large numbers of Napster files that have been
acquired
illegally and downloaded to your systems. The interesting legal question
this will pose for
auditors is - "Does this also put you and your
organisation in breach of copyright?'.
It probably does, as the act of
copying and distributing music may well be in violation
of the Digital
Millennium Copyright Act. and several other copyright acts
For additional information see
http://lcweb.loc.gov/copyright/legislation/dmca.pdf
and for the No Electronic Theft Law (NET Act) http://thomas.loc.gov/cgi-bin/bdquery/z?d105:HR02265:@@@L
and the Audio Home Recording
Act at http://www4.law.cornell.edu/uscode/17/ch10.text.html
Other ways you may have
been Napstered...........
- waste of enormous amounts
of hard disk space
- using company resources
for private use
- excessive bandwidth usage
thus resulting in excessive telephone costs, ISP costs and
storage costs
of data downloaded
- un-necessary waste of
consumables (backup tapes) backing up "data files' that are sound
files
- loss of productivity when
performing this sort of activity in YOUR time
Napster is about to be outlawed and banned
The Ninth Circuit of the U.S. Court of Appeals has recently ruled that Napster
infringes on record company
copyrights through the operation of its music
file-trading service. This was a direct result of appeals by the
Recording
Industry Association of America (RIAA) who are
concerned about copyright infringement and
royalty payments to artists who
are "dipping out", by the file sharing services offered by Napster.
The
RIIA raised the issue in the courts through a lawsuit on
behalf of the five major record labels--BMG
Entertainment, Warner
Bros. Music Group, EMI
Group, Sony
Music Entertainment, and
Universal
Music Group--in December 1999.
Napster of course is fighting for it's life BUT the music
industry has expanded its lobbying campaign
(through the RIAA) in an
attempt to counter pushes by Napster and other products offering similar
file
sharing techniques.
BREAKING NEWS - as we are writing this article
these news feeds came in.......
From www.napster.com
"At
a hearing in federal District Court on Friday, March 3, 2001 Napster
proposed to carry out the February 12th Court of Appeals ruling by blocking
the sharing of file
names submitted to Napster by copyright holders. In
contrast, the injunction proposed by the
recording industry would force
Napster to shut down entirely. The judge has not yet ruled, but we
are
hopeful that the court’s injunction, when it is issued, will allow the
Napster community to
operate while we continue to seek an agreement with the
recording industry and transition to a
membership-based service."
"Earlier today, Napster announced its plans to block
access to individual files--including around 5,600
songs submitted to the
music-swapping service by each of the major record labels. Likely go into
effect
this weekend, the voluntary decision to filter out copyrighted
material is clearly intended to soften the
blow of Napster's impending court
order".
See:http://one.digital.cnet.com/cgi-bin1/flo?y=eBjm0PDqu0u0fTKp
"Napster members this weekend may be unable to find
thousands of songs over the file-swapping service,
as the company
voluntarily implements content filters in anticipation of a court order that
may demand
even stronger remedies. Napster announced the filtering plans for
specific song titles at a court hearing
Friday, where attorneys for the
company and record labels presented arguments regarding how to police
alleged copyright violations on the service. March 2, 2001, 11:45 a.m.
PT"
http://two.digital.cnet.com/cgi-bin2/flo?y=eBYv0HoiI0U0amPJ
NOTE: There are many Napster clones
and other file sharing tools already springing up on the Internet
daily. See
http://www.pcprofile.com/fslists.htm
WHAT RISK DOES FILE SHARING PRESENT?
The actual risk of any given file depends on what sites a
person has visited and what level of security
those sites maintain.
File sharing or file swapping using web based networks
such as Napster, Scour, Gnutella and others
coming on to the market
daily may mean that the end user shares much more than they realise.
There is the risk that sensitive data files could expose
people, accounts, user names, passwords and other
file details on local PC's
that may lead to fraud and theft. This can come partly through the use
of cookies,
left automatically on local computers through Web browsers.
Computing managers will tell you that with firewall's this
sort of thing can't happen and that systems are
secure!
BUT the larger majority of senior executives use
notebook computers and these whilst connected through
the organisation
firewall when at work, often work in standalone mode via the Net overnight
and when
away from the office. These senior exec corporate notebooks will
typically have significant corporate data
and secrets installed on them and
these can be exposed if detected at random via products like
Sharesniffer
It's your corporate data that is AT RISK!
VIRUS SHARING TOO!
File sharing has now opened up a whole new world of virus
potential! It's already happened in late
Feb 2001. See press snippets below.
"Gnutella worm finds new way to squirm into PCs see
news.cnet.com/news/0-1003-201-4954849-0.html
FILE-SWAPPING ON THE Internet hit a sour note with the appearance of a
virus that attacks users of the
Gnutella file-sharing service, and several
anti-virus vendors say it is the first virus to affect peer-to-peer
communications."
"Named W32/Gnuman.worm, or by the alias Mandragore, the malicious
file poses as an ordinary, requested
media file. This masked file,
however, is actually an .exe file that infects a user's computer once the
program is
run, according to statements from a variety of anti-virus
software vendors. For the full story: http://www.infoworld.com/articles/hn/xml/01/02/27/010227hnp2pvirus.xml?0228weam"
BUT THE RISKS ARE GROWING DAILY!
THE BIGGEST RISK AREA HAS JUST EMERGED!
ShareSniffer is a VERY BIG RISK to your organisation and has burst onto
the scene in the last few months!
According to ShareSniffer there are tens of thousands of computers
worldwide that are sharing files
deliberately with the Internet
requiring no password and no special software other than the Microsoft
Windows operating system.
In testing ShareSniffer, they have discovered files of all types available for
copying, viewing or even
execution.
They have based their product to use your own Microsoft Windows operating
system to navigate other
computers that have been voluntarily exposed to the
Internet using the ease of viewing a list of files in
Windows Explorer. Using
the computers IP address (Internet Protocol Address) they have developed
software that increase the hit rate of detecting open IP addresses so that
you can access shared files on
another computer connected to the
Internet anywhere in the world with a simple two-step process: How?
Step 1: Make sure you are using Client for Microsoft
Networks and TCP/IP as your networking protocols.
Step 2: Open Windows Explorer (by double-clicking My Computer) and replace
the contents of the Address box
at the top with two backslashes and the IP
address you want to navigate. (You can do this also in Microsoft
Internet
Explorer) For example, if the IP address you want to navigate is
123.123.123.123, you will type:
\\123.123.123.123
For this to work you must have enables Windows File and Printer Sharing
Microsoft Windows® Windows File and Printer Sharing (WFPS) is used to
locate the shared resources available
on the Internet. In order to utilize
ShareSniffer, it must be activated on your system.
- ShareSniffer offers these tips on how to activate
your Windows File & Print Sharing (WFSP) Consult
the sites listed here - NOTE they are mostly university sites - no
surprises here!.
- http://www.hawaii.edu/its/micro/pc/fps9x.html
- http://www.uga.edu/ucns/lans/docs/win95doc/sharing/msshare.html
- http://helpdesk.uvic.ca/hownote/1998/ht98033.html
- http://web66.umn.edu/WinNT/CookBook/Win95Client/Sharing/Default.html
- http://www.2kweb.com/support/virt-serv/ftp-fetch/windows-fileshare.html
When you try the above on a guess basis of other IP addresses you may get
responses such as;
BUT a successful hit will show the following OPEN
share's on PC's;
Once you can see an OPEN share then it is only a question
of then pasting the IP address straight to Windows Explorer and you can then
see, copy, download, execute direct to/from the other users PC!
- NEED WE SAY ANYMORE ABOUT THE THREAT
-
THIS SORT OF SOFTWARE TOOL POSES?
- Repeat;
- .............you can then COPY,
DOWNLOAD, EXECUTE files when
- you can get access to the Explorer Window! Now
you should see
- what risk this poses!
What should you be doing as an AUDITOR?
- talk to your computing management
about just how secure the firewall is in
your organisation
- if they say it's "all under
control" make sure you CHECK that it is!
- you have no firewall? then make sure
all the shares are REMOVED when
connecting to the Internet.
- start examining WHAT is installed on
your PC's i.e.; is it authorised, legal
and the sort of software tools
you want installed on your PC's
- increase your vigilance over
software auditing and desktop management
- re-inforce desktop compliance
policies over software downloading and use
of unauthorised/illegal
software
- conduct spot raids to ensure
software compliance
- repeat the audit cycle on a regular
basis
If you need help then we can assist with
our CDROM based Software
Compliance Auditors Toolkit!

We also offer FREE audit software tools at the following page links;
1. SNAPSHOT can be a very good barometer of fraudulent activity PC
by PC!
http://www.pcprofile.com/Snapshot_Auditing.htm
2. In terms of checking the existence of sound files (MP3 and
others) and image files
(pornographic issues) on your systems try the FREE
tools we offer at AUDIT-SOUNDS and
AUDIT-IMAGES at; http://www.pcprofile.com/free_pc_audit_software.htm
3. Why not send an OUTLOOK TASK e-mail message to the
desktop user and get them
involved in the audit! It works! http://www.pcprofile.com/New_Outlook.htm
DON'T FORGET YOU ALSO NEED TO CHECK FOR ILLEGAL AND UN-
AUTHORISED
SOFTWARE as these carry VERY SIGNIFICANT LEGAL
PENALTIES if you are caught
with these loaded to your systems.
- See here for more info on anti-piracy activity!
- Check
Your Post Box!
- Imagine
If ....-
- BUSTED
- Anti-Piracy news you NEED to hear!
- "One
in 3" - Software Management Issues
- 16
Steps to Software Compliance
- Other
PC Auditing Articles
- Site Contents Copyright © 2001 Rob Harmer
Consulting Services Pty Ltd - e-mail
Last revised:
January 31, 2010
|
PCProfile PC audit software tools provide software
compliance solutions for management and auditors. Our flagship product -
AUDIT-Baseline allows for a software audit and a "differential"
audit to be taken at any time to identify additions, changes and deletions
since the last audit! We specialise in PC Audit Software, Software
Compliance, PC Auditing, Software Inventory and Licence Management, and PC
Desktop Asset Management and have significant management experience in the
issues and problems faced by organisations (large and small) when trying to
conduct desktop hardware and software audits, software inventory and asset
creation.
AUDIT-Baseline, AUDIT-Manager,
AUDIT-Images, AUDIT-Sounds, AUDIT-Compare, Software Compliance Auditors
Toolkit, and Software Inventory System Copyright 1999-2001(C) Rob
Harmer Consulting Services Pty Ltd All rights reserved Worldwide
- Article written exclusively for AUDITNET.ORG
by: Rob Harmer Consulting
Services Pty Ltd
|