answersLogoWhite

0

Are you using Torrent software? Nocus Network LLC are found on popular ipblocklists, so if you are using PeerBlock software (as any Torrent user should be) then any traffic between your pc and their server will be stopped. They are known to engage in anti-p2p activities.

That is not exactly true, this company has been attacking one of my servers steady for a few days and they are systematically testing it trying to gain access. I host business websites and there is no activity on the server to suggest they should be doing this. Their actions are focused and YES you should be concerned.

The original answer was exactly true, but perhaps not the entire story. The company, based in Pheonix, Arizona, are a little mysterious and publish no information about themselves whatsoever, so are assumed to be some kind of "industry police" paid for by companies interested in protecting intellectual property rights. Probing systems is what they do. Probing is not illegal. Gaining unauthorized access is illegal. Certainly their actions are focused and you should be concerned. You cannot stop them doing what they do, but you can block their attempts to access your machine. Information leakage is what they are looking for and it is up to you to prevent that leakage. Naturally, if you have nothing to hide then you have nothing to fear - let them have a good look and verify you as "clean" if you wish. Personally I hate spies.

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What are symptoms of duodenal obstruction?

Vomiting is the constant symptom of duodenal obstruction. It may be preceded by indigestion and nausea as the stomach attempts


What are the future challenges of computer networks?

Computer networking is a burgeoning field that is constantly trying to add more capability to present infrastructure. Category 6 and 6A copper cables, while expensive, are able to carry heavier loads than previous models. Port density is another part of the spectrum of constant improvement.


What is a computer language constant?

A constant is a primitive or complex object that does not vary. That is, once instantiated, its immutable members cannot be changed.


What is a constant in computer?

In computer terms (especially in programming), a constant is a piece of data that has a set value which cannot be changed. For example, 1 and 3 are constants - they will always equal their respective values. Constants can also be set, so you could make: piValue a constant equal to 3.14.


What do you do if Constant red led light on my computer tower?

i would try to shut down as many as possible processes which are not necessary for the computer


What do you mean by thrashing?

With regards to computers, thrashing refers to a computer's virtual memory being in the constant state of paging. Thrashing will cause the computer to perform poorly.


The computer goes through machine cycles at a steady and constant pace This pace is known as?

clock speed


When the monitor does not switch on?

You should leave it for at least an hour and make sure that the battery finishes turn it back on and it will work if yours is constant(laptop or computer) take it to a computer scientist


How do you use the electric battery these days?

To start my car To keep constant power to my computer To use my cell phone


How much juice is your computer using at night?

It is recommended to turn off a computer at night. It depends on the amount of constant running programs and the type of computer how much power it uses at night. In most computer settings there is a gauge that allows someone to view their power usage.


What are the Limitations of computer network?

Limitations of Computer NetworksFollowing are some of the major limitations of computer networks.Security Issues: One of the major drawbacks of computer networks is the security issues involved. If a computer is a standalone, physical access becomes necessary for any kind of data theft. However, if a computer is on a network, a computer hacker can get unauthorized access by using different tools. In case of big organizations, various network security software are used to prevent the theft of any confidential and classified data.Rapid Spread of Computer Viruses: If any computer system in a network gets affected by computer virus, there is a possible threat of other systems getting affected too. Viruses get spread on a network easily because of the interconnectivity of workstations. Such spread can be dangerous if the computers have important database which can get corrupted by the virus.Expensive Set Up: The initial set up cost of a computer network can be high depending on the number of computers to be connected. Costly devices like routers, switches, hubs, etc., can add up to the bills of a person trying to install a computer network. He will also have to buy NICs (Network Interface Cards) for each of the workstations, in case they are not inbuilt.Dependency on the Main File Server: In case the main File Server of a computer network breaks down, the system becomes useless. In case of big networks, the File Server should be a powerful computer, which often makes it expensive.


What are some good dedicated servers in the USA?

Good dedicated servers in the United States of America are: LeaseWeb, GigaPros, Hosting and Designs, Arvixe, Superb-net, Limestone Networks and constant-com