background preloader

Freenet

Freenet
History[edit] The origin of Freenet can be traced to Ian Clarke's student project at the University of Edinburgh, which he completed as a graduation requirement in the Summer of 1999.[9][10][11] Ian Clarke's resulting unpublished report "A distributed decentralized information storage and retrieval system" (1999) provided foundation for the seminal paper written in collaboration with other researchers, "Freenet: A Distributed Anonymous Information Storage and Retrieval System" (2001).[12][13] According to CiteSeer, it became one of the most frequently cited computer science articles in 2002.[14] The distributed data store of Freenet is used by many third-party programs and plugins to provide microblogging and media sharing,[16] anonymous, decentralised version tracking,[17] blogging,[18] a generic web of trust for decentralized spam resistance,[19] Shoeshop for using Freenet over Sneakernet,[20] and many more. Features and user interface of the Freenet[edit] Content[edit] Network[edit] Frost Related:  outils et configuration en Securite informatique

CYBER-RESISTANCE : COMMENT SURFER ANONYME EN DEUX MINUTES Une petite piqure de rappel grand public, ça ne fait pas de mal… Merci à l’équipe de Linux Manua pour ce travail de vulgarisation indispensable ! [Linux Manua - 17/03/2009] En ces temps obscurs de surveillance généralisée et de répression, être anonyme sur le Net devient essentiel – Alors voilà la méthode pour avoir temporairement une adresse IP du Canada, de Russie, des Seychelles et même de Chine (un comble) puis, par exemple : dénoncer les lois liberticides visant à surveiller le Web et réprimer les internautes,critiquer les puissants sans retenue et sans risquer la répression,riposter aux satrapes qui traitent les internautes de terroristes ou de criminelstélécharger des fichiers interdits par des législations locales dictées par des lobbys mercantiles, Bien entendu, ces fictions invraisemblables ne concernent pas la France, pays de la Liberté. 1) Se connecter à un serveur proxy anonyme étranger gratuit : hostip.fr ip-adress.com utrace.de 4) TOR : L’artillerie lourde Like this:

UUCP UUCP is an abbreviation of Unix-to-Unix Copy.[1] The term generally refers to a suite of computer programs and protocols allowing remote execution of commands and transfer of files, email and netnews between computers. Specifically, a command named uucp is one of the programs in the suite; it provides a user interface for requesting file copy operations. The UUCP suite also includes uux (user interface for remote command execution), uucico (the communication program that performs the file transfers), uustat (reports statistics on recent activity), uuxqt (execute commands sent from remote machines), and uuname (reports the UUCP name of the local system). Some versions of the suite include uuencode/uudecode (convert 8-bit binary files to 7-bit text format and vice versa). Technology[edit] UUCP can use several different types of physical connections and link layer protocols, but was most commonly used over dial-up connections. History[edit] Mail routing[edit] User barbox! Bang path[edit]

The Freenet Project - /index Mix network Simple decryption mix net. Messages are encrypted under a sequence of public keys. Each mix node removes a layer of encryption using its own private key. Mix networks[1] are routing protocols that create hard-to-trace communications by using a chain of proxy servers known as mixes which take in messages from multiple senders, shuffle them, and send them back out in random order to the next destination (possibly another mix node). Each message is encrypted to each proxy using public key cryptography; the resulting encryption is layered like a Russian doll (except that each "doll" is of the same size) with the message as the innermost layer. How it works[edit] Participant A prepares a message for delivery to participant B by appending a random value R to the message, sealing it with the addressee's public key , appending B’s address, and then sealing the result with the mix's public key . to B. Message format[edit] To accomplish this, the sender takes the mix’s public key ( ) is discarded. . .

How to Crack WPA2 WPS WiFi password Wifi Protected Setup or WPS is a 802.11 certified standard for delivering security over your Wireless network. Wi-Fi Protected Setup enables typical users who possess little understanding of traditional Wi-Fi configuration and security settings to automatically configure new wireless networks, add new devices and enable security. WPS has been accompanying WPA2 since 2007, with over 200 wireless routers that support WPS with WPA2. Warning: This guide is to showcase weaknesses in Wifi security standards & is purely for educational purposes only. All vendors (including Cisco/Linksys, Netgear, D-Link, Belkin, Buffalo, ZyXEL, TP-Link and Technicolor) have WPS-enabled devices. Although WPS is marketed as being a secure way of configuring a wireless device, there are design and implementation flaws which enable an attacker to gain access to an otherwise sufficiently secured wireless network. How the WPA2 WPS Crack works Further details are available at Google code page and PDF whitepaper. Step 1.

Alternative DNS root The Internet uses the Domain Name System (DNS) to associate numeric computer IP addresses with human readable names. The top level of the domain name hierarchy, the DNS root, contains the top-level domains that appear as the suffixes of all Internet domain names. The official DNS root is administered by the Internet Corporation for Assigned Names and Numbers (ICANN). In addition, several organizations operate alternative DNS roots, often referred to as alt roots. The Internet Architecture Board (IAB) has spoken out strongly against alternate roots in RFC 2826.[1] Description[edit] The DNS root zone consists of pointers to the authoritative domain name servers for all TLDs (top-level domains). Alternative DNS roots may be characterized broadly as those run for idealistic or ideological reasons, run as profit-making enterprises, and those run internally by an organization for its own use. List of alternative roots[edit] This section lists the known alternate DNS roots. NameCoin P2P DNS[edit]

Freenet Da Wikipedia, l'enciclopedia libera. Freenet è una rete decentralizzata, creata per resistere alla censura, che sfrutta le risorse (banda passante, spazio su disco) dei suoi utenti per permettere la pubblicazione e la fruizione di qualsiasi tipo di informazione. Freenet è stata costruita pensando ad anonimato e sicurezza, non alla velocità di trasmissione. Questa caratteristica la rende poco indicata per lo scambio di file di grosse dimensioni (come filmati e file audio). Freenet è software libero distribuito con GNU General Public License; essendo scritto in Java può funzionare su Microsoft Windows, GNU/Linux, Mac OS X e su tutti i sistemi operativi dotati di Java Virtual Machine. Sebbene molte nazioni censurino le comunicazioni per motivi diversi, hanno tutte una caratteristica comune: qualcuno deve decidere cosa tagliare e cosa mantenere, cosa considerare offensivo e cosa no. All'interno di Freenet è possibile utilizzare servizi simili al Web e alle BBS. Ian Clarke et al.

Preuve à divulgation nulle de connaissance Un article de Wikipédia, l'encyclopédie libre. Une preuve à divulgation nulle de connaissance est un concept utilisé en cryptologie dans le cadre de l'authentification et de l'identification. Cette expression désigne un protocole sécurisé dans lequel une entité nommée « fournisseur de preuve », prouve mathématiquement à une autre entité, le « vérificateur », qu'une proposition est vraie sans toutefois révéler une autre information que la véracité de la proposition. En pratique, ce schéma se présente souvent sous la forme d'un protocole de type « stimulation/réponse » (challenge-response). Les anglophones utilisent l'abréviation ZKIP pour Zero Knowledge Interactive proof. Propriétés[modifier | modifier le code] Trois propriétés doivent être satisfaites : Les deux premières propriétés sont les mêmes qui servent à définir un système de preuve interactive, qui est un concept plus général. Preuves calculatoires et parfaites[modifier | modifier le code] Exemple[modifier | modifier le code]

Penetration Testing Explained, Part III: Playing with RATs and Reverse Shells | Varonis Blog Last week I broke into a Windows 2008 server and inserted a remote access trojan or RAT. Don’t call security, I did this in a contained environment within virtual machines. To continue on with my pen testing experiment, in this post I’ll explore a few basic steps and techniques used by hackers after they’ve entered a system. Where Am I? One of the first tasks for a hacker is to map out the surrounding terrain in the victim’s environment. As a practical matter, you’d want to know what other computers are connected to the target. One quick baby step is simply to look at the ARP tables. The address resolution protocol or ARP is used to map IP addresses to MAC addresses. Exploring the local network with arp -a. Anyone can view the tables by entering arp -a from a command line in Windows (and Linux). And that’s just what I did. The larger point is that with ARP I could see other computers on the network. If I wanted a more complete picture, I could upload and use nmap. Reverse Shell Game

ScreenPlay The MediaWiki ScreenPlay Extension (ScreenPlay) is a text-formatting add-on which allows screenwriters and hobbyists the ability to use MediaWiki as a screenwriting tool. Synopsis[edit | edit source] <screenplay>An example is described</screenplay><scene int day>A '''Darkened''' Room</scene> [[Bob Ross|BOB]] sits in front of a computer screen. Will produce the following type of formatting: Note how word case has been adjusted in certain cases. Description[edit | edit source] ScreenPlay supports three new editing hooks to add style codes that visually re-format certain wiki syntax (specifically, those used for definition lists, or "dl's") into proper screenplay format. Though ScreenPlay is not a replacement for a full-featured ScreenWriting software package, it offers a number of advantages for screenwriters: Usage[edit | edit source] Installing ScreenPlay is as easy as installing any other MediaWiki extension. Once installed, it is a simple matter to use ScreenPlay. Hooks[edit | edit source]

Related: