background preloader

RetroShare

RetroShare
RetroShare is a Open Source cross-platform, Friend-2-Friend and secure decentralised communication platform. It lets you to securely chat and share files with your friends and family, using a web-of-trust to authenticate peers and OpenSSL to encrypt all communication. RetroShare provides filesharing, chat, messages, forums and channels Other Systems and packages Features Serverless, completely decentralised Multiple simultaneous downloads / uploads Search Friends Messages Forums Channels Voice over IP Instant messaging Groupchat GnuPG Authentication OpenSSL Encryption adding downloads via website links Plugins support UPnP / NAT-PMP port forwarding support Graphical User Interface written with Qt4 toolkit System tray integration

http://retroshare.sourceforge.net/

Related:  CHAT/SOCIALvoidhaze

Download Battlegram X for Mac - Chat client for Battle.net Chat client for Battle.net. Free Battlegram is a client that connects to the public chat interface ("Chat") of Blizzard Entertainment's Battle.net Internet gaming service. It enables Mac users of Battle.net to communicate with other Battle.net users without having to use one of Blizzard's game clients. Battlegram only connects to the Chat part of Battle.net and does not even touch the private binary part of Battle.net.

About Darknet Darknet is a group of like-minded individuals founded around 1999 sharing knowledge in password cracking, cracking, cryptography, programming (C++, VB, Delphi, C, Pascal, Assembly, Python, PERL, Bash and so on), network security, Linux, Windows, UNIX and more. It started off on EFNet IRC network back in the days when being a script kiddy was moderately cool, packet wars were in and lame DOS attacks like WinNUKE and the ath0++ modem drop were cool. From that we progressed along, I got myself a web host and made a simple site for my first real domain, was born in the year 2000. It had a lame page with bright green Darknet graphic and thats all. We continued playing around with DoS attacks and started learning about DDoS and some real network security (NetBIOS etc.) 2001 SteeJans and I actually made a decent site design, it didn’t have much content in the beginning.

Tor: Documentation First, read the overview page to get a basic idea of how Tor works, what it's for, and who uses it. Install Tor Browser and try it out. Be sure to read the list of warnings about ways you can screw up your anonymity. Look through the Tor Browser Design Document. Distributed hash table Distributed hash tables History[edit] These systems differed in how they found the data their peers contained: Napster, the first large-scale P2P content delivery system to exist, had a central index server: each node, upon joining, would send a list of locally held files to the server, which would perform searches and refer the querier to the nodes that held the results. This central component left the system vulnerable to attacks and lawsuits.[citation needed]Gnutella and similar networks moved to a flooding query model – in essence, each search would result in a message being broadcast to every other machine in the network.

Peer-to-peer A peer-to-peer (P2P) network in which interconnected nodes ("peers") share resources amongst each other without the use of a centralized administrative system Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or work loads between peers. Peers are equally privileged, equipotent participants in the application. Business group chat, file sharing, group decision making: Campfire Current Campfire customers can sign in here. Hello, We launched Campfire back in 2006 so teams could easily collaborate online in real-time. Since then, over 1,000,000,000 (yes, billion) messages have been sent with Campfire.

Phreaking The term phreak is a portmanteau of the words phone and freak, and may also refer to the use of various audio frequencies to manipulate a phone system. Phreak, phreaker, or phone phreak are names used for and by individuals who participate in phreaking. Because identities were usually masked, an exact percentage of prevalence cannot be calculated. History[edit] Phone phreaking got its start in the late 1950s. Its golden age was the late 1960s and early 1970s. Orbot: Mobile Anonymity + Circumvention Orbot is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Orbot creates a truly private mobile internet connection.Download Orbot: Google Play | F-Droid | Direct Download (.apk) Source code: Tor Gitweb | Github Mirror

SheevaPlug The SheevaPlug is a "plug computer" designed to allow standard computing features in as small a space as possible. Commercial products[edit] The following commercial products are known to be based on the SheevaPlug platform: Other operating system ports and stacks[edit] P2P File Sharing Programs - Free File Sharing Software Millions of people use free P2P file sharing programs - software to swap music, video and other files over the Internet. Many free P2P file sharing programs exist. Some P2P software offers a larger user base and greater numbers of files to choose from. Some software better utilizes network resources and may be easier to use.

10 Chat Widgets to Consider Embedded chat in a website provides the ability to more closely connect with your readers or customers, depending on the instance. Chat widgets provide real-time feedback and spur thought-provoking discussions - features lacking in e-mail. However the disadvantages should be acknowledged too.

Related:  Anonymat & sécurité_Net_eMailshareKratomOutils de réunion à distanceRetroShare - p2p - Top Choice