Yahoo奇摩 網頁搜尋

搜尋結果

  1. This is a free and open-source P2P Social Virtual Private Network (VPN) that seamlessly networks your computer with the computers of your friends so that: Your computer can communicate directly to computers of your friends, and all communication is encrypted and authenticated.

  2. The third stage is to use packet tunelling/vpn technology *inside existing infrastructure* to engage in networking that is opportunistically peer-to-peer. As more and more people engage each each other directly when they have the opportunity, the opportunities to do so will multiply.

  3. Relakks - P2P Foundation. Relakks = anonymity service. URL = https://www.relakks.com/?lang=eng. "Relakks offers a neutral IP on top of your existing ISP service through a strongly encrypted VPN connection. Basically, this gives users the advantage of a Swedish IP address from anywhere in the world. The cost of the service is 5 euros per month ...

  4. AnoNet is a decentralized friend-to-friend network built using VPNs and software BGP routers. anoNet works by making it difficult to learn the identities of others on the network allowing them to anonymously host IPv4 and IPv6 services) Language: Platform: Website: http://wiki.ucis.nl/Anonet.

  5. The Four Basic Techniques. "Andrew Lih, a former journalism professor and software engineer now based in Beijing (and author of the forthcoming book The Wikipedia Story), laid out for me the ways in which the GFW can keep a Chinese Internet user from finding desired material on a foreign site.

  6. During the Jan 25 revolution, the Mubarak regime caused a nearly total blackout of Internet, cellular and SMS service. While the Net was up, Telecomix provided tools such as TOR, VPNs and other encryption for safe communication. To restore access to censored sites, we built mirrors and proxies.

  7. Virtualization, using VMWare or Microsoft Virtual PC, is probably the easiest way of accomplishing this step. Almost any setup, be it a laptop, a desktop, or even a server, can be packaged into a virtual image and then redeployed on a machine of one’s choice without disrupting the host system.

  1. 其他人也搜尋了