Hi, everyone!
I would like to weigh in on this subject, if I may. I realize that I am a new member, but this is a subject I know a little about.
First of all, dark146, file sharing is not, in an of itself, illegal. This is especially true of fake files and spam, which are files that are themselves illicit. Peer-to-peer file sharing does have legitimate uses: I host nearly 1,500 files for sharing that are either in the public domain or identified by their copyright-holders as shareable. Yes, it is illegal to share copyrighted files that the copyright holder would not want to be shared -- but your post seems to suggest that this illicit activity is file-sharing's only purpose, and I am living proof that this is not so.
Cyko makes an excellent point about eMule/eDonkey servers: many of them are fake, and only (1) serve up fake, likely infected files, or (2) serve up no useful search results at all. There are very few legitimate eMule servers on the network -- less than ten, I think. You need to block the fake servers: then your eDonkey search results will be better.
There are also plenty of Gnutella-1 and Gnutella-2 hosts whose only reason for being is to host or index fake files.
One would think that the best way to stop fake files from showing up in your search window would be to block the IP numbers of the miscreants hosting those bad files, and this is an important tool, but those IP numbers keep changing, so it's impossible for IP-based filters to totally fix the problem. Since blocking IP numbers is a vital tool, however, I recommend PeerBlock, which is effective and compatible with Vista. You can find it at
http://www.peerblock.com/. The blocklists that will make this security tool work can be found at Bluetack,
http://www.bluetack.co.uk/forums/index.php. PeerBlock also has ready-made links to blocklist downloads to make it work effectively.
In addition, I have embarked upon a new project to try to help Shareaza users reduce the appearance of fake files in their search results, by blocking the file hashes associated with those files. Now, I have been told that this effort is futile because all the fake-file creators have to do is change one byte in their fake files, causing the files to have a whole new file hash, to circumvent my filter -- but that has yet to be demonstrated. The fake-file purveyors are using this one-byte method already, so what do we have to lose by trying? If you're interested, you can find the experimental Shareaza fake-files filter here:
http://www.bluetack.co.uk/forums/index.php?showtopic=20428.
I naturally am terribly interested in any comments anyone might have about what I've posted here, good or bad!
Sincerely,
Richard