|Register||FAQ||The Twelve Commandments||Members List||Calendar||Arcade||Search||Today's Posts||Mark Forums Read|
|Gnucleus (Windows) For assistance for users with the Gnucleus program. Important links: Updated Gnucleus 220.127.116.11 Installer! and also Updated Connection Caches for Gnucleus!|
| Welcome To Gnutella Forums |
You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content, fun aspects such as the image caption contest and play in the arcade, and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! (click here)
If you have any problems with the Gnutella Forum registration process or your Gnutella Forum account login, please contact us (this is not for program use questions.) Your email address must be legitimate and verified before becoming a full member of the forums. Please be sure to disable any spam filters you may have for our website, so that email messages can reach you.
Note: Any other issue with registration, etc., send a Personal Message (PM) to one of the active Administrators: Lord of the Rings or Birdy.
Once registered but before posting, members MUST READ the FORUM RULES (click here) and members should include System details - help us to help you (click on blue link) in their posts if their problem relates to using the program. Whilst forum helpers are happy to help where they can, without these system details your post might be ignored. And wise to read How to create a New Thread
If you are a Spammer click here.
This is not a business advertising forum, all member profiles with business advertising will be banned, all their posts removed. Guests and search engines cannot view member profiles.
Hilfe in Deutsch, . Ayuda en español, . Aide en français . et . LimeWire en français, . Hulp in het Nederlands
Before you post to one of the specific Client Help and Support Conferences in Gnutella Client Forums please look through other threads and Stickies that may answer your questions. Most problems are not new. The Search function is most useful. Also the red Stickies have answers to the most commonly asked questions. (over 90 percent).
If your problem is not resolved by a search of the forums, please take the next step and post in the appropriate forum. There are many members who will be glad to help.
If you are new to the world of file sharing please do not be shy! Everyone was ‘new’ when they first started.
When posting, please include details for:
Your Operating System ....... Your version of your Gnutella Client (* this is important for helping solve problems) ....... Your Internet connection (56K, Cable, DSL) ....... The exact error message, if one pops up
Any other relevant information that you think may help ....... Try to make your post descriptive, specific, and clear so members can quickly and efficiently help you. To aid helpers in solving download/upload problems, LimeWire and Frostwire users must specify whether they are downloading a torrent file or a file from the Gnutella network.
Members need to supply these details >>> System details - help us to help you (click on blue link)
There are senior members on the forums who serve as Moderators. These volunteers keep the board organized and moving.
Moderators are authorized to: (in order of increasing severity)
Move posts to the correct forums. Many times, members post in the wrong forum. These off-topic posts may impede the normal operation of the forum.
Edit posts. Moderators will edit posts that are offensive or break any of the House Rules.
Delete posts. Posts that cannot be edited to comply with the House Rules will be deleted.
Restrict members. This is one of the last punishments before a member is banned. Restrictions may include placing all new posts in a moderation queue or temporarily banning the offender.
Ban members. The most severe punishment. Three or more moderators or administrators must agree to the ban for this action to occur. Banning is reserved for very severe offenses and members who, after many warnings, fail to comply with the House Rules. Banning is permanent. Bans cannot be removed by the moderators and probably won't be removed by the administration.
1. Warez, copyright violation, or any other illegal activity may NOT be linked or expressed in any form. Topics discussing techniques for violating these laws and messages containing locations of web sites or other servers hosting illegal content will be silently removed. Multiple offenses will result in consequences. File names are not required to discuss your issues. If filenames are copyright then do not belong on these forums & will be edited out or post removed. Picture sample attachments in posts must not include copyright infringement.
2. Spamming and excessive advertising will not be tolerated. Commercial advertising is not allowed in any form, including using in signatures.
3. There will be no excessive use of profanity in any forum.
4. There will be no racial, ethnic, or gender based insults, or any other personal attacks.
5. Pictures may be attached to posts and signatures if they are not sexually explicit or offensive. Picture sample attachments in posts must not include copyright infringement.
6. Remember to post in the correct forum. Take your time to look at other threads and see where your post will go. If your post is placed in the wrong forum it will be moved by a moderator. There are specific Gnutella Client sections for LimeWire, Phex, FrostWire, BearShare, Gnucleus, Morpheus, and many more. Please choose the correct section for your problem.
7. If you see a post in the wrong forum or in violation of the House Rules, please contact a moderator via Private Message or the "Report this post to a moderator" link at the bottom of every post. Please do not respond directly to the member - a moderator will do what is required.
8. Any impersonation of a forum member in any mode of communication is strictly prohibited and will result in banning.
9. Multiple copies of the same post will not be tolerated. Post your question, comment, or complaint only once. There is no need to express yourself more than once. Duplicate posts will be deleted with little or no warning. Keep in mind a forum censor may temporarily automatically hold up your post, if you do not see your post, do not post again, it will be dealt with by a moderator within a reasonable time. Authors of multiple copies of same post may be dealt with by moderators within their discrete judgment at the time which may result in warning or infraction points, depending on severity as adjudged by the moderators online.
10. Posts should have descriptive topics. Vague titles such as "Help!", "Why?", and the like may not get enough attention to the contents.
11. Do not divulge anyone's personal information in the forum, not even your own. This includes e-mail addresses, IP addresses, age, house address, and any other distinguishing information. Don´t use eMail addresses in your nick. Reiterating, do not post your email address in posts. This is for your own protection.
12. Signatures may be used as long as they are not offensive or sexually explicit or used for commercial advertising. Commercial weblinks cannot be used under any circumstances and will result in an immediate ban.
13. Failure to show that you have read the forum rules may result in forum rules breach infraction points or warnings awarded against you which may later total up to an automatic temporary or permanent ban. Supplying system details is a prerequisite in most cases, particularly with connection or installation issues.
Violation of any of these rules will bring consequences, determined on a case-by-case basis.
Thank You! Thanks for taking the time to read these forum guidelines. We hope your visit is helpful and mutually beneficial to the entire community.
| ||LinkBack||Thread Tools||Display Modes|
Well, you have a point there. To be honest, I don't spend very much time paying attention to this stuff. Certainly not to the point where I know every type of file-sharing system that exists and what type of technology it uses. I wasn't aware that those (eDonkey, WinMX) were distinct filesharing networks. I thought they were just different clients or something.
Whatever. This is getting silly. I don't want to argue semantics or talk politics. I just wanted to find out what was going on with these weird hits I was getting. And I was surprised that spammers had already devised a way to bend "peer-to-peer file-sharing technology" (to use the technically correct, inclusive term) to their own slimy ends. That's all.
Ok, this is a really old thread so I guess I can use it to follow the suggestion that I post to freshen-up my activity here ("Hello cnshht it appears that you have not posted on our forums in several weeks, why not take a few moments to ask a question, help provide a solution or just engage in a conversation with another member in any one of our forums?")
Due to the nature of my connectivity, I've been unwilling to risk sharing my files for quite a while, thus endangering my associates, here in the USA where legal threats from large corporations and their sponsored organizations.... I thus felt like a leech and my P2P activity was minimized. I was away for a while....
I came back and found the above-described phenomenon in full force. Valid search results were deeply immersed in trash, to the point where my searches were sometimes completely futile. My theory is similar to that above. Certain corporate interests are funding a deliberate spoiling of P2P by intercepting search queries, generating matching trash files, and quickly sharing them. I was able to wade through the trash by using careful queries and avoiding the "matches" described above. But it quickly occurs to me that a well-funded group employing script-writers and programmers can cripple P2P with ever-more complex routines that basically result in ever-increasing denial-of-service....
And public discussion of the phenomenon might even help those spoilers, so I feel gagged by my own preference for filesharing freedom. If anyone sees this and wants to offer a peptalk or a few links to help me fight the spoilers in my spare time, ...that would be welcome.
Well cnshht (how do you pronounce that name?)
You've summed up the current and ongoing problem with the gnutella network, not to mention the planted viruses and booby trapped software.
However, your idea of fighting this problem is somewhat surprising considering that you have large companies, major western government organisations all trying to stop their computer users from using P2P apps and facilities by whatever means.
Consequently, I do strongly disagree when you said:
But saying all that, once using the P2P stop being fun then, I guess, most people, like myself, will just stop using it.
Sure there's hope....
As a relatively ignorant end-user (who can't get i2Phex to install) I do have vague hopes that P2P client developers will feel intrigued by the challenge of defeating Megacorporate programmer-goons, and pass along to me the fruits of their efforts at some point. I'm historically a Phex-user (came here looking for clues to this conundrum) and I see signs of an adaptive move toward private networks, etc. I hope to study it in the future. You bet I'd like to see P2P evolve into something that makes those media conglomerates who are funding denial-of-service efforts wish they'd never screwed with P2P.
Could blacklisting be refined by a dynamic service that works within our client programs, so that when we send a query and shortly afterward receive garbage results that contain our exact string, those hosts are filtered or auto-blocked...?
Beyond that, ...would it be possible for a script or program/module to be written that would identify/track-back the hosts of the spoilers, and target THEM with enough retaliatory traffic that their own rotten activity becomes untenable? They are doing something that no public-minded P2P user would engage in. Can their activity can be used to dynamically and automatically identify them and retalitate? Can we respectful users, in our greater numbers, with the help of those developers who don't like seeing the fruits of their previous labor spoiled... ...can we all run a program that identifies the garbage-spewers and targets them with noise, denying THEM the ability to deny service to others?
Surely we are as free to do that, as they are to do what they do. I for one would be happy to host an add-on module or program that gives them a dose of their own poison....
Wow, I have never seen a thread as dead as this one brought back to life before. Did I really post here 8 YEARS ago?! Sheesh...
Cnshht, it's been a long time since I fired up Gnucleus, so maybe I'm out of the loop, but why do you assume its "Certain corporate interests are funding a deliberate spoiling of P2P by intercepting search queries, generating matching trash files, and quickly sharing them" with Ukbobboy chiming in about "large companies, major western government organisations all trying to stop their computer users from using P2P apps and facilities by whatever means."
It sounds like you think this is some kind of conspiracy to destroy P2P. But an equally good explanation is that it's just the usual crop of small-time, quasi-crooked spammers up to their usual tricks trying to make a buck. In fact, it seems a lot more likely to me.
Perhaps both sorts of spoilers are "out there." But my experience is that the "trash files" are tiny in size, and when I have attempted out of curiosity to download them, they don't move. When I said "quickly sharing them," I was maybe a bit unclear. I meant their scripts/programs/bots broadcast the files as "shared" search results. Not that they are actually "sharing", i.e. that P2P users are actually downloading the sham files in all their multiples. The hosts do not at all seem to be trying to get P2P users to download a spam/advert in any form. I have yet to see any spam-like adverts, messages or commercial content at all behind the mechanism I've observed, where search queries are used to generate fake results. So how does anyone "make a buck" doing it? They're just jamming the protocol so it can't be used. It seems specifically designed as a denial-of-service activity. Therefore it seems most likely to me that the sponsors of this activity are those who feel they are losing profits because of file sharing. i.e. large recording/media companies and their industry associations.
Cloudwatcher, have you downloaded a search result that mimics your query turns out to be a file trying to sell you ******? Or to sell you anything? Or direct you to a website that does try to? I haven't. There's nothing there. It's just electronic jamming of search activity. High volume. Many many hosts. Has the appearance of an organized, targeted effort.
|Thread||Thread Starter||Forum||Replies||Last Post|
|***Virus Searches and Downloads That Don't Work ***||marchend||Open Discussion topics||3||January 9th, 2006 09:10 AM|
|Gnutella W32.Alcra.B Virus/Trojan Migration||erikinlongbeach||General Gnutella / Gnutella Network Discussion||2||December 19th, 2005 01:20 PM|
|More virus found on Gnutella network||shanojkk||Download/Upload||0||October 16th, 2005 01:56 PM|
|Should Gnutella developers work on measures to achieve anonymity on Gnutella?||Joakim Agren||General Gnutella / Gnutella Network Discussion||23||August 27th, 2003 08:18 AM|
|Virus??? Please ALL Gnutella users check this!!||klauspendolo||General Gnutella / Gnutella Network Discussion||1||February 18th, 2003 09:12 AM|