


In some cases a user has to know which files to remove, which registry entries to edit, and which configuration files need modification. Once installed, these applications are hard to remove. Some of the P2P programs themselves contain “spyware” that allows the author of the program, and other network users, to see what you’re doing, where you’re going on the Internet, and even use your computer’s resources without your knowledge. Computers running this software will be busy exchanging files whenever the machine is turned on. Much of the P2P activity is automatic and its use is unmonitored. Having represented a large number of clients in this position we would strongly advise everybody (with the exception of the most computer savvy individuals) against the use of such programs for the following reasons: only to receive a knock on the door by police due to illegal indecent images being downloaded by the P2P software without their knowledge. movies, mp3s, legal adult pornography etc. Many of our client’s have downloaded programs like Limewire, Shareaza, eMule, Kazaa or others in order to download what they believed to be legal material e.g. A significant proportion of the cases that we deal with involve clients who have downloaded some form of Peer-to-Peer (P2P) software.
