background preloader

Wiki

Wiki
Related:  Technology

Bitmessage From the Bitmessage wiki: "Bitmessage is a P2P communications protocol used to send encrypted messages to another person or to many subscribers. It is decentralized and trustless, meaning that you need-not inherently trust any entities like root certificate authorities. Bitmessage may be used independently or with TOR. Installation Install pybitmessage or pybitmessage-gitfrom the AUR. Set up Without TOR After launching bitmessage (the name of the bitmessage binary is pybitmessage) for the first time, disregard any popups and: Navigate to the Your Identities tab Hit the New button and create a few new addresses. With TOR The same steps apply as above, except that you would need to do the following (ideally before you set up your first identity): Usage Testing Using bitmessage is the same as using an email client. Attachments Attachments are not possible for the moment in bitmessage. base64 < binary.file > text.file base64 -d < text.file > binary.file ~/.scripts/createMagnetLink.py Chans

jewel/clearskies Glances - An Advanced Real Time System Monitoring Tool for Linux Earlier, we’ve written about many Linux System Monitor Tools that can be used to monitor performance of Linux systems, but we think that, most users prefer the default one that comes with every Linux distributions (top command). The top command is real time task manager in Linux and the most frequently used system monitoring tool in GNU/Linux distributions to find the performance related bottlenecks in system which help us to take corrective actions. It has a nice minimalist interface, comes with few amount of reasonable options that enables us to get a better idea about overall system performance quickly. However, sometimes its very tricky to find an application/process that consuming lots of system resources is a bit difficult under top. Because top command doesn’t have a ability to highlights programs that are eating too much of CPU, RAM, other resources. What is Glances? Glances is a free tool and licensed under GPL to monitory GNU/Linux and FreeBSD operating systems. Glances Features

Bitmessage Bitmessage is a decentralized, encrypted, peer-to-peer, trustless communications protocol that can be used by one person to send encrypted messages to another person, or to multiple subscribers. Bitmessage encrypts each users' message inbox using strong encryption and replicates it inside its P2P network mixing it with inboxes of other users in order to conceal user's identity, prevent eavesdropping and protect the network from any control. The Bitmessage communication protocol avoids sender-spoofing through strong authentication, and hides metadata from wiretapping systems. In June 2013, the software experienced a surge of new adoptions after news reports of email surveillance by the US National Security Agency. As of June 2014[update], the network processes several thousand private messages per day.[1] Applications[edit] Official client[edit] PyBitmessage is the official instant messaging client designed for Bitmessage. Bitpost client[edit] An alternative client for OSX. Bitmessage.ch[edit]

Wikiquote MegaHAL MegaHAL is a computer conversation simulator, or "chatterbot", created by Jason Hutchens. Background[edit] MegaHAL was and made its debut in the 1998 Loebner Prize Contest. Like many chatterbots, the intent is for MegaHAL to appear as a human fluent in a natural language. As a user types sentences into MegaHAL, MegaHAL will respond with sentences that are sometimes coherent and at other times complete gibberish. In the world of conversation simulators, MegaHAL is based on relatively old technology and could be considered primitive. In 1996, Jason Hutchens entered the Loebner Prize Contest with HeX, a chatterbot based on ELIZA. Distribution[edit] MegaHAL is distributed under the GNU General Public License (GPL). See also[edit] External links[edit]

Anonymous VPN Providers? 2016 Edition (Page 2) ~ TorrentFreak You can read the introduction (page 1) here. 1. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user of your service? If so, what information and for how long? 2. What is the registered name of the company and under what jurisdiction(s) does it operate? 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. StrongVPN 1. 2. 3. 4. 5. 6. 7. 8. 2048 bit encryption with OpenVPN is the highest recommended level. 9. 10. 11. 12. StrongVPN website VPNBaron 1. 2.We’re registered and operate in Romania, inside the European Union under the name “HEXVIILLE SRL” 3. 4. 5. 6. 7. 8. Yes, have both a Kill Switch and a double DNS Leak Protection mechanism – one included in the OpenVPN protocol and the other in our own windows client. 9. 10. 11. 12. VPNBaron website VPN Land 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. VPN Land website AceVPN 1. 2. 3. 4. 5. 6. 7. 8. Yes, we do provide kill switches if a connection drops. IPSEC IKEv2 – 384 bits ECC (Equivalent to RSA 7680 bits) and AES 256 bit encryption.

Open source communities meet their users needs Image by opensource.com I have told the story of how FinTP, the first open source application for processing financial transactions, was born. Here, I would like to present a deeper view on how the community is being built, its structure and governance and why I think people should join such communities. I myself am a founding member of two communities, the first being built together with my friends after our first bachelor party, from a desire to preserve our spirit of joy and good vibes. View the complete collection of Beginners in Open Source articles An open source project cannot succeed without a powerful community that supports its development. While it may seem that the transition from the closed community to FINkers United is destined to be smooth, there are many adjustments to be made. Community structure Communities are groups of individuals sharing common interests. Reasons to join the FINkers United community Why would you join an open source community?

Related: