043
CHECK POINT 2013 SECURITY REPORT
B
APPENDIX B: TOP HIGH-
RISK APPL ICAT IONS
This appendix provides further information related to
the top high-risk applications found in our research.
Check Point’s full application database is available at
appwiki.checkpoint.com
Anonymizers
Tor
is an application intended to enable online anonymity.
Tor client software directs internet traffic through a
worldwide volunteer network of servers to conceal a
user’s location or usage from anyone conducting network
surveillance or traffic analysis. Using Tor makes it more
difficult to trace Internet activity such as website visits,
online posts, instant messages and other communication
forms, back to the user.
CGI-Proxy
is a Common Gateway Interface software
package. It appears to a user as a web page that allows access
to a different site. Supported protocols include HTTP,
FTP and SSL.
Hopster
is an application for bypassing firewalls and proxy
server, allowing anonymous browsing and chatting.
Hide My Ass
is a free web proxy service that masks
IP addresses enabling users to connect to websites
anonymously.
Hamachi
is a virtual private network (VPN) shareware
application. It is used for establishing a connection over
the internet that emulates the connection over a local
area network (LAN).
Ultrasurf
is a free proxy tool that enables users to
circumvent firewalls and Internet content blocking
software.
OpenVPN
is a free open source software application that
implements virtual private network (VPN) techniques for
creating secure point-to-point or site-to-site connections in
routed or bridged configurations and remote access facilities.
P2P file sharing
BitTorrent
is a peer-to-peer file sharing P2P
communication protocol. It is a method of distributing
large amounts of data widely without the original
distributor incurring the entire costs of hardware,
hosting, and bandwidth resources. Instead, when data is
distributed using the BitTorrent protocol, each recipient
supplies portions of the data to newer recipients,
reducing the cost and burden on any given individual
source, providing redundancy against system problems,
and reducing dependence on the original distributor.
There are numerous compatible BitTorrent clients,
written in a variety of programming languages, and
running on a variety of computing platforms.
eMule
is a peer-to-peer file sharing application that
connects to the eDonkey network and the Kad network.
The software provides direct exchange of sources
between client nodes, recovery of corrupted downloads
and the use of a credit system to reward frequent
uploaders. eMule transmits data in zlib-compressed
form for bandwidth efficiency.
Soulseek
is a peer-to-peer file sharing application. It is
used mostly to exchange music, although users are able
to use it to share a variety of other files.
Gnutella
is a popular file sharing network, and one
of the most popular peer-to-peer protocols, used by
applications such as BearShare, Shareaza, Morpheus
and iMesh. It is commonly used to exchange MP3 music
files, videos, applications, and documents.
Sopcast
is a media streaming application which allows
media streaming via P2P networks. Sopcast allows users
to broadcast media to other users or watch streams
broadcasted by other users.