<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Anti-Virus Company Says PeerGuardian is Malware</title>
	<atom:link href="https://torrentfreak.com/peerguardian-malware-080224/feed/" rel="self" type="application/rss+xml" />
	<link>https://torrentfreak.com/peerguardian-malware-080224/</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Wed, 29 Oct 2014 08:19:54 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>By: nofile404</title>
		<link>/peerguardian-malware-080224/#comment-436535</link>
		<dc:creator><![CDATA[nofile404]]></dc:creator>
		<pubDate>Mon, 30 Jun 2008 16:40:38 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/peerguardian-malware-080224/#comment-436535</guid>
		<description><![CDATA[Sounds like a pissing match to me.]]></description>
		<content:encoded><![CDATA[<p>Sounds like a pissing match to me.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: The Mechanic</title>
		<link>/peerguardian-malware-080224/#comment-419190</link>
		<dc:creator><![CDATA[The Mechanic]]></dc:creator>
		<pubDate>Sun, 15 Jun 2008 01:56:10 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/peerguardian-malware-080224/#comment-419190</guid>
		<description><![CDATA[I personally will never use ESET! It has a bad habit of opening ports about every 15 minutes or so. And how do I know this, Simply because I use PG2 and PROTOWALL.

Bluetack has ALWAYS been straight with everyone. Just the CORPs dont like it when they are caught with pants down.

ASK ESET for the Source and see what reply you get :) ROFL..]]></description>
		<content:encoded><![CDATA[<p>I personally will never use ESET! It has a bad habit of opening ports about every 15 minutes or so. And how do I know this, Simply because I use PG2 and PROTOWALL.</p>
<p>Bluetack has ALWAYS been straight with everyone. Just the CORPs dont like it when they are caught with pants down.</p>
<p>ASK ESET for the Source and see what reply you get :) ROFL..</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: PC Security</title>
		<link>/peerguardian-malware-080224/#comment-411321</link>
		<dc:creator><![CDATA[PC Security]]></dc:creator>
		<pubDate>Sat, 07 Jun 2008 13:00:15 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/peerguardian-malware-080224/#comment-411321</guid>
		<description><![CDATA[If your looking for even more information on PC security then I would head over here as they have plenty of stuff on identity theft, antivirus software etc.]]></description>
		<content:encoded><![CDATA[<p>If your looking for even more information on PC security then I would head over here as they have plenty of stuff on identity theft, antivirus software etc.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Free PC Security Tips</title>
		<link>/peerguardian-malware-080224/#comment-408392</link>
		<dc:creator><![CDATA[Free PC Security Tips]]></dc:creator>
		<pubDate>Thu, 05 Jun 2008 03:49:50 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/peerguardian-malware-080224/#comment-408392</guid>
		<description><![CDATA[If your looking for even more information on PC security then I would head over here as they have plenty of stuff on identity theft, antivirus software etc.]]></description>
		<content:encoded><![CDATA[<p>If your looking for even more information on PC security then I would head over here as they have plenty of stuff on identity theft, antivirus software etc.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ben Jones</title>
		<link>/peerguardian-malware-080224/#comment-402206</link>
		<dc:creator><![CDATA[Ben Jones]]></dc:creator>
		<pubDate>Sat, 31 May 2008 01:01:07 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/peerguardian-malware-080224/#comment-402206</guid>
		<description><![CDATA[&quot;What was ESET doing connecting to a private tracker? I really doubt it was some employee looking for britney&#039;s latest flop..&quot;

As was written above, it wasn&#039;t a &#039;britney flop&#039;, it was a movie. LAst time I checked, ESET didn&#039;t own the copyrights on any movies, thus it was an act of infringement.

Contrary to what many (well Ok, Bluetack) would have you believe, you can&#039;t infringe copyright to &#039;protect&#039; someone elses, even if you make a financial gain from copyrighted material. If that were the case, us at TorrentFreak could download all we wanted, and if we were caught, point to the copyrights here, from which a small amount of money is made (a financial gain) and claim we were &#039;protecting it&#039;. It sounds absurd, yet that is the picture you, and bluetack, attempt to portray this in.

&quot;dding PG2 to the definitions list, even as a &quot;potentially unwanted program&quot; was an extremelu childish, unprofessional, unwarranted and IRRESPONSIBLE thing for a security company to do.&quot;
ACtually, I think you&#039;ll find its a pretty much standard thing for any antivirus company to do, to a program that then prevents, or severely restricts, the software from updating. I mean, we have a program that protects tens of thousands of people every day, and then there&#039;s peerguardian, with no actual effective use ever proven. Or, put another way - Has nod32 ever removed a virus, YES. Has nod32 prevented a virus from getting on people&#039;s systems, YES. Has PG2 ever prevented antip2p from connecting to people&#039;s systems, maybe but no way to tell. Has PG2 ever actually had a solid verifyable case of actually doing what is claimed? Has anyone actually said &quot;we tried to connect to them, but they were running a blocklist so we couldn&#039;t&quot; NO. 

By the way, when it came to nod32 blocking PG2, I&#039;ll leave you with the standard reply for when PG2 blocks things &quot;just put it in your exception list&quot; - or it it not a valid solution when it hits you? 

I still have tremendous dificulty believing there are people out there that have such a poor grasp of the very basics of logic, have no ability to process common sense, and no aspect of free thought, that they can&#039;t take independant facts, or even the facts given by groups like bluetack, and see the errors. Worse, I can&#039;t believe they&#039;ve never actually thought of how difficult these lists are to circumvent. Again, 
1) there&#039;s no law saying they have to use a corporate network to log you. 
2) There&#039;s no way to tell if a client is logging you. 
3) they don&#039;t have to act in any way different to a normal client, and that includes uploading - they after all, are authorised to distribute (ie, upload), you are not.]]></description>
		<content:encoded><![CDATA[<p>&#8220;What was ESET doing connecting to a private tracker? I really doubt it was some employee looking for britney&#8217;s latest flop..&#8221;</p>
<p>As was written above, it wasn&#8217;t a &#8216;britney flop&#8217;, it was a movie. LAst time I checked, ESET didn&#8217;t own the copyrights on any movies, thus it was an act of infringement.</p>
<p>Contrary to what many (well Ok, Bluetack) would have you believe, you can&#8217;t infringe copyright to &#8216;protect&#8217; someone elses, even if you make a financial gain from copyrighted material. If that were the case, us at TorrentFreak could download all we wanted, and if we were caught, point to the copyrights here, from which a small amount of money is made (a financial gain) and claim we were &#8216;protecting it&#8217;. It sounds absurd, yet that is the picture you, and bluetack, attempt to portray this in.</p>
<p>&#8220;dding PG2 to the definitions list, even as a &#8220;potentially unwanted program&#8221; was an extremelu childish, unprofessional, unwarranted and IRRESPONSIBLE thing for a security company to do.&#8221;<br />
ACtually, I think you&#8217;ll find its a pretty much standard thing for any antivirus company to do, to a program that then prevents, or severely restricts, the software from updating. I mean, we have a program that protects tens of thousands of people every day, and then there&#8217;s peerguardian, with no actual effective use ever proven. Or, put another way &#8211; Has nod32 ever removed a virus, YES. Has nod32 prevented a virus from getting on people&#8217;s systems, YES. Has PG2 ever prevented antip2p from connecting to people&#8217;s systems, maybe but no way to tell. Has PG2 ever actually had a solid verifyable case of actually doing what is claimed? Has anyone actually said &#8220;we tried to connect to them, but they were running a blocklist so we couldn&#8217;t&#8221; NO. </p>
<p>By the way, when it came to nod32 blocking PG2, I&#8217;ll leave you with the standard reply for when PG2 blocks things &#8220;just put it in your exception list&#8221; &#8211; or it it not a valid solution when it hits you? </p>
<p>I still have tremendous dificulty believing there are people out there that have such a poor grasp of the very basics of logic, have no ability to process common sense, and no aspect of free thought, that they can&#8217;t take independant facts, or even the facts given by groups like bluetack, and see the errors. Worse, I can&#8217;t believe they&#8217;ve never actually thought of how difficult these lists are to circumvent. Again,<br />
1) there&#8217;s no law saying they have to use a corporate network to log you.<br />
2) There&#8217;s no way to tell if a client is logging you.<br />
3) they don&#8217;t have to act in any way different to a normal client, and that includes uploading &#8211; they after all, are authorised to distribute (ie, upload), you are not.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: DoobyDoobyDoo</title>
		<link>/peerguardian-malware-080224/#comment-402187</link>
		<dc:creator><![CDATA[DoobyDoobyDoo]]></dc:creator>
		<pubDate>Sat, 31 May 2008 00:23:23 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/peerguardian-malware-080224/#comment-402187</guid>
		<description><![CDATA[As has been pointed out.. What was ESET doing connecting to a private tracker?  I really doubt it was some employee looking for britney&#039;s latest flop..

As for the whole &quot;Americans = fear mongering&quot; crap that some idiot posted   somewhere in the sea of responses;  get a clue.    The police won&#039;t knock on your door because they don&#039;t have probable cause?   And how do you think they OBTAIN the probable cause to come knock on your door and take your PC away?

Oh yeah.. They go onto a tracker and get your IP, then subpoena your ISP  for your name, address &amp; other personal info.  Get a warrant and come to your house.  Knock on your door, PUSH you aside and take your PC then arrest your ass if your crime was serious enough in scope.
 
PG2 will not prevent that 100% of the time for 100% of users, but it can help lower the risk by blocking some random task force&#039;s rookie attempt at nailing people.

That being said there is a very key difference in position here..  PG2 is a freely available program.  It allows you to manually add or remove  IP&#039;s from your block list, and any standard user of PG2 should already know this, and know how to deal with ESET being blocked by themself; assuming they have a brain.

ESET on the other hand is not just some free IP blocking product provider.  They provide a computer security product for a nominal fee, designed to detect and alert the user to SERIOUS threats from malicious program code and viruses.  ESET is in a position of authority far exceeding PG2 and the users trusts this company to keep their PC safe from REAL dangerous programs.

PG2 is not malicious code. It does not infect your PC to make it destroy data or do other things you don&#039;t intend to happen.  Adding PG2 to the definitions list, even as a &quot;potentially unwanted program&quot; was an extremelu childish, unprofessional, unwarranted and IRRESPONSIBLE thing for a security company to do.  They abused their position of TRUST &amp; AUTHORITY on their users&#039; personal computers, to achieve a means to an end in a childish rivalry situation.

If this were any other software, not PG2 adding ESET to the list for being seen on a torrent tracker, ESET would have at LEAST released a new item for their customers, making a big precautionary deal out of it, saying that PG2 may prevent ESET products from updating, and that they should either disable PG2 when attempting to update, or &quot;Take the following steps&quot; to add  ESET update servers to PG2&#039;s  white list features.

THAT would have been the mature, responsible, and appropriate thing to do.    If this were a government agency, or Norton or some other hated entity doing something like this, it would be front page news bashing them for abusing their trust and power over their users&#039; systems in such a way..  Just like Sony with the root kit scandal.

But this is all about an anti-peer-2-peer agenda, and the bias is so thick all over that you need a MACHETE to cut through it]]></description>
		<content:encoded><![CDATA[<p>As has been pointed out.. What was ESET doing connecting to a private tracker?  I really doubt it was some employee looking for britney&#8217;s latest flop..</p>
<p>As for the whole &#8220;Americans = fear mongering&#8221; crap that some idiot posted   somewhere in the sea of responses;  get a clue.    The police won&#8217;t knock on your door because they don&#8217;t have probable cause?   And how do you think they OBTAIN the probable cause to come knock on your door and take your PC away?</p>
<p>Oh yeah.. They go onto a tracker and get your IP, then subpoena your ISP  for your name, address &amp; other personal info.  Get a warrant and come to your house.  Knock on your door, PUSH you aside and take your PC then arrest your ass if your crime was serious enough in scope.</p>
<p>PG2 will not prevent that 100% of the time for 100% of users, but it can help lower the risk by blocking some random task force&#8217;s rookie attempt at nailing people.</p>
<p>That being said there is a very key difference in position here..  PG2 is a freely available program.  It allows you to manually add or remove  IP&#8217;s from your block list, and any standard user of PG2 should already know this, and know how to deal with ESET being blocked by themself; assuming they have a brain.</p>
<p>ESET on the other hand is not just some free IP blocking product provider.  They provide a computer security product for a nominal fee, designed to detect and alert the user to SERIOUS threats from malicious program code and viruses.  ESET is in a position of authority far exceeding PG2 and the users trusts this company to keep their PC safe from REAL dangerous programs.</p>
<p>PG2 is not malicious code. It does not infect your PC to make it destroy data or do other things you don&#8217;t intend to happen.  Adding PG2 to the definitions list, even as a &#8220;potentially unwanted program&#8221; was an extremelu childish, unprofessional, unwarranted and IRRESPONSIBLE thing for a security company to do.  They abused their position of TRUST &amp; AUTHORITY on their users&#8217; personal computers, to achieve a means to an end in a childish rivalry situation.</p>
<p>If this were any other software, not PG2 adding ESET to the list for being seen on a torrent tracker, ESET would have at LEAST released a new item for their customers, making a big precautionary deal out of it, saying that PG2 may prevent ESET products from updating, and that they should either disable PG2 when attempting to update, or &#8220;Take the following steps&#8221; to add  ESET update servers to PG2&#8242;s  white list features.</p>
<p>THAT would have been the mature, responsible, and appropriate thing to do.    If this were a government agency, or Norton or some other hated entity doing something like this, it would be front page news bashing them for abusing their trust and power over their users&#8217; systems in such a way..  Just like Sony with the root kit scandal.</p>
<p>But this is all about an anti-peer-2-peer agenda, and the bias is so thick all over that you need a MACHETE to cut through it</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ok so police visited yesterday.. this is what happened - Page 4 - Pay Per Install</title>
		<link>/peerguardian-malware-080224/#comment-390604</link>
		<dc:creator><![CDATA[Ok so police visited yesterday.. this is what happened - Page 4 - Pay Per Install]]></dc:creator>
		<pubDate>Wed, 21 May 2008 16:36:50 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/peerguardian-malware-080224/#comment-390604</guid>
		<description><![CDATA[[...] Peerguardian is not shit Ape--check wikipedia. It&#039;s not wonderful, but it is something.    N2N News Anti-Virus Company Says PeerGuardian is Malware &#124; TorrentFreak  Keep yapping.  [...]]]></description>
		<content:encoded><![CDATA[<p>[...] Peerguardian is not shit Ape&#8211;check wikipedia. It&#8217;s not wonderful, but it is something.    N2N News Anti-Virus Company Says PeerGuardian is Malware | TorrentFreak  Keep yapping.  [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Q</title>
		<link>/peerguardian-malware-080224/#comment-363553</link>
		<dc:creator><![CDATA[Q]]></dc:creator>
		<pubDate>Wed, 30 Apr 2008 02:29:30 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/peerguardian-malware-080224/#comment-363553</guid>
		<description><![CDATA[@17 DEMONOID IS BAC! ^__^]]></description>
		<content:encoded><![CDATA[<p>@17 DEMONOID IS BAC! ^__^</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Everglade</title>
		<link>/peerguardian-malware-080224/#comment-339415</link>
		<dc:creator><![CDATA[Everglade]]></dc:creator>
		<pubDate>Thu, 10 Apr 2008 00:42:18 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/peerguardian-malware-080224/#comment-339415</guid>
		<description><![CDATA[Some hacker had attached NetTool.Portscan.c to my peerguardian lists, So peerguardian is obviously under attack, I really believe that there are certain people i dont know exactly who they are but, they seem to attack the computers that have peergaurdian installed on them. Softwares like peergaurdian, Norton antivirus etc, will always get criticized because they protect you from alot of the bad guys.]]></description>
		<content:encoded><![CDATA[<p>Some hacker had attached NetTool.Portscan.c to my peerguardian lists, So peerguardian is obviously under attack, I really believe that there are certain people i dont know exactly who they are but, they seem to attack the computers that have peergaurdian installed on them. Softwares like peergaurdian, Norton antivirus etc, will always get criticized because they protect you from alot of the bad guys.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Cardinal Felchboi</title>
		<link>/peerguardian-malware-080224/#comment-331831</link>
		<dc:creator><![CDATA[Cardinal Felchboi]]></dc:creator>
		<pubDate>Sat, 05 Apr 2008 07:25:45 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/peerguardian-malware-080224/#comment-331831</guid>
		<description><![CDATA[What has yet to come to light - &amp; sadly probably _never_ will: what the hell was ESET
doing connectiong to a pvt tracker? Am I the only one still keen to glean that datum?

And now for that time once again: 

DADA-DA-DADA-DA-DAAAAA!!!

It&#039;s: &quot;My tuppence worth:&quot;

PG _is_ a great app &amp; BISS _are_ b0rking it. They need to audit that enormous list AT LEAST once a month - once a week would be better (when was the last time a full-scale IP-Addr. check was performed on it, if ever?). After all, thay&#039;re always banging on about what a great community they have; then put the peons to work - anyone below the set poast-count, perhaps? 

P.S. It&#039;s obvious from even a short visit to BISS&#039; fora that the tweenies have taken over. The unneccesarily abusive power-tripping really IS something to behold.

P.P.S. I trust Ben Jones (who &quot;used to work in copyright enforcement&quot;)  about as far as I could throw his fat, pimply ass.]]></description>
		<content:encoded><![CDATA[<p>What has yet to come to light &#8211; &amp; sadly probably _never_ will: what the hell was ESET<br />
doing connectiong to a pvt tracker? Am I the only one still keen to glean that datum?</p>
<p>And now for that time once again: </p>
<p>DADA-DA-DADA-DA-DAAAAA!!!</p>
<p>It&#8217;s: &#8220;My tuppence worth:&#8221;</p>
<p>PG _is_ a great app &amp; BISS _are_ b0rking it. They need to audit that enormous list AT LEAST once a month &#8211; once a week would be better (when was the last time a full-scale IP-Addr. check was performed on it, if ever?). After all, thay&#8217;re always banging on about what a great community they have; then put the peons to work &#8211; anyone below the set poast-count, perhaps? </p>
<p>P.S. It&#8217;s obvious from even a short visit to BISS&#8217; fora that the tweenies have taken over. The unneccesarily abusive power-tripping really IS something to behold.</p>
<p>P.P.S. I trust Ben Jones (who &#8220;used to work in copyright enforcement&#8221;)  about as far as I could throw his fat, pimply ass.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
