Know More about Foxy

  • Case 1: Another data leak prompts security vow, 9 May 2008
  • Case 2: Covert cops hit by leaks, 27 May2008
  1. It is a kind of Peer-to-peer (P2P) software to facilitate file sharing, like BitTorrent and eMule.
  2. It supports mainly two functions which are ‘search’ and ‘download’.
  3. Its user interface is in Traditional Chinese and is famous to be user friendly
  4. It is popular in Hong Kong, Mainland and Taiwan.
  1. How can I know if my computer has Foxy installed?
    A: If Foxy has been installed in your computer, you will find:
    I. The Foxy icon tipsfoxy clip image002 from Windows Program list and in the program bar
    II. An installation directory C: \Program Files\Foxy
  2. How to uninstall Foxy?
    A.: Follow the following 3 Steps:
    Step 1: Click ‘Uninstall Foxy’ in the program bar.
    Step 2: Erase the directory and all files under the installation directory C:\Program Files\Foxy
    Step 3: Remove all entries added by Foxy in the exception list of Windows Firewall.
  3. Once a file is shared, can it be stopped?
    No, it can’t be stopped.? The file would be copied to the requestors’ computer afterdownload and you won’t know who the requester is.
  4. Can owner of a file be identified and traced?
    No, Foxy won’t show the identity of the source who shares the file.
  1. Installing Foxy from an unofficial website.
    Some unofficial websites claim that they had “enhanced” version Foxy which supports faster downloading speed. However, this “enhanced” version of Foxy may contain backdoors inserted by hackers to share all files in your computer automatically without your notice.
  2. Misconfiguration
    1. Some cases of unintentional file sharing are due to the following unaware features of Foxy:

      Features Implication
      Auto-startup By default, Foxy starts up automatically after login.
      Download folder The “Download folder” is compulsorily shared.
      Share folder By default, all sub-folders and files under “Share Folder” are shared.

    2. Inherited setting: The Foxy settings are inherited to users sharing the same computer and this may lead to unintentional information leakage. For example, your kid at home may set to share the music files in a USB drive through Foxy and this setting would inherit to you when you use the same computer. So, when you plug in your USB drive to read sensitive files inside, Foxy will share these files to others without your awareness.
  3. Infection of virus or worm.
    If your computer is infected by virus or worm, the Foxy settings could be changed without your notice. The following are two popular P2P software worms and their effects:

    Virus / Worm Effect
    TROJ_GNUTELMAN.A Inflected computers easily become overloaded.
    PE_POLIP.A
    • It consumes a large amount of system resources and causes the victim’s computer to become noticeably sluggish and unreliable.

  1. Follow the good practice:
    1. Uninstall software if you don’t need it.
    2. Turn off unnecessary software like Foxy after use.
    3. Check and make sure the Foxy is not running before you use the computer.
    4. Never share a pluggable drive because you may not aware what you have shared next time when you plug another drive to your computer.
    5. Don’t save sensitive and restricted files in local computer or any removable media. However, if it is necessary, please do
      • Encryption
      • Configure your computer carefully and make sure not to share any sensitive and restricted files.
    6. Scan all downloaded filed by antivirus and antispyware before use.
    7. Install security software with update security patches and scan the computer regularly.
  2. Download Foxy from the official site.
    1. If Foxy is needed, make sure you download Foxy from the official website.
    2. If you are not sure whether the Foxy in your computer is downloaded from the official website, you should uninstall it.
  3. Separate user accounts in a shared computer.
    Separate user accounts in a shared computer and assign no administrator right to the accounts. Although this cannot completely solve the problem of inherited settings, this can create a more personalized environment for creating personal folders for downloading and sharing files. This can lower the risk of information leakage.
  4. Use anti-virus and anti-spyware to scan and remove inflected files
  5. Configure Foxy properly – If you’ve installed Foxy from the official website, you should configure it properly
    1. Folder setting: Assuming that you have opened separate user accounts in a shared computer, it is suggested to create three directories specifically for Foxy under each user’s “My Documents”

      Directory Suggested location How to apply this setting
      Share My Documents \Foxy\Foxy_Share Select the folder under the tab of 共享
      Download My Documents\Foxy\Foxy_download Select 下載資料夾 under 選項
      Temporary My Documents\Foxy\Foxy_temp Select 暫存資料夾 under 選項

    2. Program setting: Disable automatic startup by unchecking ‘開機時啟動’ under the icon of 選項