Yahoo奇摩 網頁搜尋

搜尋結果

  1. Loevinger's theory contributes to the delineation of ego development, which goes beyond the fragmentation of trait psychology and looks at personality as a meaningful whole. Loevinger conceived of an ego-development system which closely resembles moral development, but is broader in scope and uses empirical methods of study.

  2. 2020年10月1日 · Jess Scully: "Taiwan’s civic hackers were organized around a leaderless collective called g0v (pronounced “gov zero.”) Many believed in radical transparency, in throwing opaque processes open to the light, and in the idea that everyone who is affected by a decision should have a say in it. They preferred establishing consensus to running ...

    • Description
    • Discussion
    • Evaluation
    • Tutorial: Anonymous Blogging Using Tor
    • More Information

    "the Tor system works by using a volunteer network of computers that offer to relay your Web traffic, encrypted and anonymously, through the Tor network. It relays your traffic through three Tor intermediary nodes, the idea being that each relay node knows which neighboring node packets are coming from and going to, but no one knows the entire path...

    On the proper usage of Tor

    Andrew Lih : "The problem is, people are using Tor without understanding exactly what it does and does not provide. The weak link is when a user’s data finally emerges at the last computer (the exit node) which relays the request to the public Internet. Anyone operating a final exit node can see what you’re sending and receiving. So while Tor provides for end-user anonymity at the network/packet level (IP address), it does not provide for end-to-end data secrecy. The traffic coming off the th...

    The Military Background to Tor

    By Seth David Schoen, EFF: "It's totally true that the military people who invented Tor werethinking about how to create a system that would protect militarycommunications. The current iteration of that is described at 1. https://www.torproject.org/about/torusers.html.en#military right on the Tor home page. However, the Tor developers also became clear early on that thesystem wouldn't protect military communications well unless it hada very diverse set of users. Elsewhere in that same e-maild...

    From eWeek at http://www.eweek.com/article2/0,1759,2009849,00.asp "Using the tools available at tor.eff.org, I have been able to easily install Tor (along with the Privoxy secure Web proxy) and run it seamlessly without affecting my daily Web usage. One of the main reasons is that the Tor downloads include Vidalia, an easy-to-use GUI that made it s...

    By Ethan Zuckerman : (See also: The entry on Anonymous Bloggingcontains how-to instructions without access to Tor.)

    The entry on Anonymous Bloggingcontains how-to instructions without access to Tor. See Also: TOR Made for USG Open Source Spying Says Maker (cryptome.org) http://cryptome.org/0003/tor-spy.htm 1. iPhantom 2. Freenet 3. P2P Networks

  3. Andy's Deck's Glyphiti is an artistic experiment in extending the reaches of public art. Converting the clandestine creativity of the graffiti artist into something more openly available, Deck developed a globally accessible drawing wall.

  4. Definition. "A Distributed Hash Table (DHT) is a distributed and often decentralized mechanism for associating Hash values (keys) with some kind of content. Participants in the DHT each store a small section of the contents of the hashtable. The main advantage of DHTs are their scalability." ( http://www.infoanarchy.org/en/Distributed_hash_table )

  5. 'A pirate code was a code of conduct invented for governing pirates, and first introduced by the Portuguese buccaneer Bartolomeu Português. Generally each pirate crew had its own code or articles, which provided rules for discipline, division of stolen goods, and compensation for injured pirates.

  6. Description. "Since its original publication 1999, this foundational book has become a classic in its field. This second edition, Code Version 2.0, updates the work and was prepared in part through a wiki, a web site allowing readers to edit the text, making this the first reader-revision of a popular book. Code counters the common belief that ...