background preloader


Related:  Technology

Bitmessage From the Bitmessage wiki: "Bitmessage is a P2P communications protocol used to send encrypted messages to another person or to many subscribers. It is decentralized and trustless, meaning that you need-not inherently trust any entities like root certificate authorities. Bitmessage may be used independently or with TOR. Installation Install pybitmessage or pybitmessage-gitfrom the AUR. Set up Without TOR After launching bitmessage (the name of the bitmessage binary is pybitmessage) for the first time, disregard any popups and: Navigate to the Your Identities tab Hit the New button and create a few new addresses. With TOR The same steps apply as above, except that you would need to do the following (ideally before you set up your first identity): Usage Testing Using bitmessage is the same as using an email client. Attachments Attachments are not possible for the moment in bitmessage. base64 < binary.file > text.file base64 -d < text.file > binary.file ~/.scripts/ Chans

jewel/clearskies MegaHAL MegaHAL is a computer conversation simulator, or "chatterbot", created by Jason Hutchens. Background[edit] MegaHAL was and made its debut in the 1998 Loebner Prize Contest. Like many chatterbots, the intent is for MegaHAL to appear as a human fluent in a natural language. As a user types sentences into MegaHAL, MegaHAL will respond with sentences that are sometimes coherent and at other times complete gibberish. In the world of conversation simulators, MegaHAL is based on relatively old technology and could be considered primitive. In 1996, Jason Hutchens entered the Loebner Prize Contest with HeX, a chatterbot based on ELIZA. Distribution[edit] MegaHAL is distributed under the GNU General Public License (GPL). See also[edit] External links[edit]

Anonymous VPN Providers? 2016 Edition (Page 2) ~ TorrentFreak You can read the introduction (page 1) here. 1. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user of your service? If so, what information and for how long? 2. What is the registered name of the company and under what jurisdiction(s) does it operate? 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. StrongVPN 1. 2. 3. 4. 5. 6. 7. 8. 2048 bit encryption with OpenVPN is the highest recommended level. 9. 10. 11. 12. StrongVPN website VPNBaron 1. 2.We’re registered and operate in Romania, inside the European Union under the name “HEXVIILLE SRL” 3. 4. 5. 6. 7. 8. Yes, have both a Kill Switch and a double DNS Leak Protection mechanism – one included in the OpenVPN protocol and the other in our own windows client. 9. 10. 11. 12. VPNBaron website VPN Land 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. VPN Land website AceVPN 1. 2. 3. 4. 5. 6. 7. 8. Yes, we do provide kill switches if a connection drops. IPSEC IKEv2 – 384 bits ECC (Equivalent to RSA 7680 bits) and AES 256 bit encryption.

Outernet | Information for the World from Outer Space DHT Protocol | twister 20 Linux System Monitoring Tools Every SysAdmin Should Know Need to monitor Linux server performance? Try these built-in commands and a few add-on tools. Most Linux distributions are equipped with tons of monitoring. These tools provide metrics which can be used to get information about system activities. You can use these tools to find the possible causes of a performance problem. The commands discussed below are some of the most basic commands when it comes to system analysis and debugging server issues such as: Finding out bottlenecks.Disk (storage) bottlenecks.CPU and memory bottlenecks.Network bottlenecks. #1: top - Process Activity Command The top program provides a dynamic real-time view of a running system i.e. actual process activity. Fig.01: Linux top command Commonly Used Hot Keys The top command provides several useful hot keys: => Related: How do I Find Out Linux CPU Utilization? #2: vmstat - System Activity, Hardware and System Information Display Memory Utilization Slabinfo # vmstat -m Get Information About Active / Inactive Memory Pages