− | {{Term|FILE SHARING|File sharing refers to the public and private sharing of computer files or data in a network, with varying levels of access privileges assigned. Typically file sharing requires users to upload files and download files from a server. Peer-to-peer (P2P) file-sharing, however, does not follow the traditional model of uploading and downloading files from a Web site. Instead, files are shared directly from personal computer to personal computer with no intermediate server — it is thus, peer to peer. File sharing allows a number of people to access one file, being able to do some combinations of reading, writing or modifying, copying and printing. In order to share files, a file transfer system called the File Transfer Protocol (FTP) has become widely-used. FTP can be used to access (read and possibly write to) files shared among a particular set of users with a password.<ref>http://searchcio-midmarket.techtarget.com/definition/file-sharing (26 September 2011), http://www.bsacybersafety.com/threat/p2p.cfm (26 September 2011)</ref>}} | + | {{Term|FILE SHARING|File sharing refers to the public and private sharing of computer files or data in a network, with varying levels of access privileges assigned. Typically file sharing requires users to upload and download files from a server. Peer-to-peer (P2P) file-sharing, however, does not follow the traditional model of uploading and downloading files from a Web site. Instead, files are shared directly from personal computer to personal computer with no intermediate server — it is thus, peer to peer. File sharing allows a number of people to access one file, being able to do some combinations of reading, writing or modifying, copying and printing. In order to share files, a file transfer system called the File Transfer Protocol (FTP) has become widely-used. FTP can be used to access (read and possibly write to) files shared among a particular set of users with a password.<ref>http://searchcio-midmarket.techtarget.com/definition/file-sharing (26 September 2011), http://www.bsacybersafety.com/threat/p2p.cfm (26 September 2011)</ref>}} |