043
CHECK POINT 2013 SECURITY REPORT
B
APPENDIX B: TOP HIGH
RISK APPL ICAT IONS
This appendix provides provide further information related to
the top applications found in our research. Check Point’s full
application database is available at appwiki.checkpoint.com
Anonymizers
Tor
is an application intended to enable online anonymity.
Tor client software directs internet traffic through a
worldwide volunteer network of servers to conceal a
user‘s location or usage from anyone conducting network
surveillance or traffic analysis. Using Tor makes it more
difficult to trace Internet activity, including „visits to
Web sites, online posts, instant messages and other
communication forms“, back to the user.
CGI-Proxy
is a Common Gateway Interface software
package. It appears to a user as a web page that allows access
to a different site. Supported protocols include HTTP,
FTP and SSL.
Hopster
is an application for bypassing firewalls and proxy
server, allowing anonymous browsing and chatting.
Hide My Ass
is a free web proxy service that masks
IP addresses enabling users to connect to websites
anonymously.
Hamachi
is a virtual private network (VPN) shareware
application. It is used for establishing a connection over
the internet that emulates the connection over a local
area network (LAN).
Ultrasurf
is a free proxy tool that enables users
tocircumvent firewalls and Internet content blocking
software.
OpenVPN
is a free open source software application that
implements virtual private network (VPN) techniques for
creating secure point to point or site to site connections
in routed or bridged configurations and remote access
facilities.
P2P file sharing
BitTorrent
is a peer-to-peer file sharing P2P
communication protocol. It is a method of distributing
large amounts of data widely without the original
distributor incurring the entire costs of hardware,
hosting, and bandwidth resources. Instead, when data is
distributed using the BitTorrent protocol, each recipient
supplies pieces of the data to newer recipients, reducing
the cost and burden on any given individual source,
providing redundancy against system problems, and
reducing dependence on the original distributor. There
are numerous compatible BitTorrent clients, written in
a variety of programming languages, and running on a
variety of computing platforms.
eMule
is a peer-to-peer file sharing application that
connects to the eDonkey network and the Kad network.
The software provides direct exchange of sources
between client nodes, recovery of corrupted downloads
and the use of a credit system to reward frequent
uploaders. eMule transmits data in zlib-compressed
form for bandwidth saving.
Soulseek
is a peer-to-peer file sharing application. It is
used mostly to exchange music, although users are able
to share a variety of files.
Gnutella
is a popular file sharing network, and one
of the most popular Peer-to-Peer protocols, used by
applications such as BearShare, Shareaza, Morpheus
and iMesh. It is commonly used to exchange MP3 music
files, videos, applications, and documents.
Sopcast
is a media streaming application which allows
media streaming via P2P networks. Sopcast allows users
to broadcast media to other users or watch streams
broadcasted by other users.
1...,32,33,34,35,36,37,38,39,40,41 43,44,45,46,47,48,49,50