NetFort Advertising

A look at the BitTorrent protocol, part 3: Detecting

26 March 2012 NetFort Blog By: Darragh Delaney

Part 2 of my blog post series on the BitTorrent protocol takes a look at how to detect its use on a computer network. If you want to do this without having to deploy agents or software on end-user systems, network traffic analysis is a viable alternative. You can read the full post on my ComputerWorld blog – BitTorrent protocol primer, part 3: Detecting