


{"id":107,"date":"2014-10-21T14:54:17","date_gmt":"2014-10-21T05:54:17","guid":{"rendered":"http:\/\/www.cc.tsukuba.ac.jp\/wp_e\/?page_id=107"},"modified":"2020-04-13T14:02:49","modified_gmt":"2020-04-13T05:02:49","slug":"p2p","status":"publish","type":"page","link":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/service\/notice\/p2p\/","title":{"rendered":"List of Peer-to-Peer (P2P) File Sharing Applications"},"content":{"rendered":"<p>List of Peer-to-Peer (P2P) File Sharing Applications<\/p>\n<p>The following are examples of forbidden P2P file exchange software programs (this list is not exhaustive):<\/p>\n<ul>\n<li>Xunlei<\/li>\n<li>Bittorrent, uTorrent, BitComet, Vuze and Transmission<\/li>\n<li>Azureus<\/li>\n<li>Emule and eDonkey<\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Gnutella, LimeWire and Cabos<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">WinMX<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Share<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Winny<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>100bao<\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Allpeers<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Ants<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">AppleJuice<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Ares<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Fasttrack<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Fileguri<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Fileswire<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Flashget<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Foxy<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Gnunet<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Goboogy<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Google Talk (file-transfer)<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Imesh<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Kazaa<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Kugoo<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Manolito<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Msn (file-transfer)<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Mute<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Neonet<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Openft<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Pando<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Peerenabler<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Perfect-dark<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Poco<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Soribada<\/span><\/li>\n<li><span style=\"font-size: 1.2em; line-height: 1.7;\">Soulseek<\/span><\/li>\n<li>Tesla<\/li>\n<li>Thecircle<\/li>\n<li>Totodisk<\/li>\n<li>Warez<\/li>\n<li>Yahoo-IM (file-transfer)<\/li>\n<\/ul>\n<p>From the website below, you can find out more about information security, including the University\u2019s official list of prohibited P2P file exchange software programs.<\/p>\n<ul>\n<li><a href=\"https:\/\/oii.tsukuba.ac.jp\/en\/oii-security-2\/\">Safe and Secure Use of the Information Systems<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>List of Peer-to-Peer (P2P) File Sharing Applications The following are examples of forbidden P2P file exchange software programs (this list is not exhaustive): Xunlei Bittorrent, uTorrent, BitComet, Vuze and Transmission Azureus Emule and eDonkey Gnutella, LimeWire and Cabos WinMX Share &hellip; <a href=\"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/service\/notice\/p2p\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":11,"featured_media":0,"parent":516,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-107","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"publishpress_future_action":{"enabled":false,"date":"2026-05-01 01:35:21","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/pages\/107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/comments?post=107"}],"version-history":[{"count":10,"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/pages\/107\/revisions"}],"predecessor-version":[{"id":2752,"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/pages\/107\/revisions\/2752"}],"up":[{"embeddable":true,"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/pages\/516"}],"wp:attachment":[{"href":"https:\/\/www.cc.tsukuba.ac.jp\/wp_e\/wp-json\/wp\/v2\/media?parent=107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}