Shen, Yu, Buford, Akon (eds.): Handbook of Peer-to-Peer Networking (2010)
Filed under book | Tags: · anonymity, computing, filesharing, internet, mobile technology, networks, p2p, privacy, trust, trusted computing

The handbook offers elaborate discussions on fundamentals of peer-to-peer computing models, networks and applications, and provides a comprehensive study on recent advancements, crucial design choices, open problems, and possible solution strategies. It is written by a team of leading international researchers and professionals
Peer-to-peer networking, a disruptive technology for large scale distributed applications, has gained widespread attention due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. In addition, a large range of new applications are under development or being proposed. The underlying architectures share features including decentralization, end system resources, autonomy, virtualization, and self-organization. These features constitute the P2P paradigm. Trends in information and network technology such as increased performance and deployment of broadband networking, wireless networking, and mobile devices are synergistic with and reinforce the capabilities of this P2P paradigm.
The Handbook of Peer-to-Peer Networking is dedicated to discussions on P2P networks and their applications, thus providing an exhaustive view of the state-of-the-art of the P2P networking field. Written by leading international experts, the volume contains fifty chapters dedicated to the following topics:
• Introduction to Peer-to-Peer Networking
• Unstructured P2P Overlay Architectures
• Structured P2P Overlay Architectures
• Search and Query Processing
• Incentive Mechanisms
• Trust, Anonymity, and Privacy
• Broadcast and Multicast Services
• Multimedia Content Delivery
• Mobile P2P
• Fault Tolerance in P2P Networks
• Measurement and P2P Traffic Characteristics
• Advanced P2P Computing and Networking
This comprehensive volume serves as an essential reference for researchers and professionals, The book is also suitable for computer science and engineering students at the advanced undergraduate level or higher who are familiar with networking, network protocol concepts, and basic ideas about algorithms.
Edited by Xuemin Shen, Heather Yu, John Buford, Mursalin Akon
Publisher Springer New York Dordrecht Heidelberg London
ISBN 978-0-387-09750-3
1421 pages
Panoptykon: Nadzór 2011: Próba podsumowania (2011) [Polish]
Filed under report | Tags: · cctv, censorship, data retention, internet, poland, privacy, surveillance

“Raport stanowi zwieńczenie projektu monitoringowego, który realizowaliśmy od października 2010. Skupia się na tych aktualnych tematach, które – w naszej ocenie – najlepiej ukazują napięcia i wyzwania związane ze współczesnym nadzorem: monitoring wizyjny, retencja i dostęp służb do danych telekomunikacyjnych, przekazywanie danych między służbami różnych państw, system informacji w ochronie zdrowia oraz system informacji oświatowej. Raport przybliża również pojęcie społeczeństwa nadzorowanego oraz jego konsekwencje dla podstawowych praw i wolności:
Konsekwencją rozwoju społeczeństwa nadzorowanego jest ograniczenie prywatności jednostek, ich autonomii informacyjnej i tajemnicy korespondencji. Ale to nie wszystko. Nadzór może również wiązać się z ograniczeniami wolności słowa czy prawa do informacji, a przez to prowadzić do pogłębiania się przepaści informacyjnej: państwo korporacje wiedzą o nas coraz więcej, my o nich – coraz mniej.”
Written by Małgorzata Szumańska and Dorota Głowacka
Published by Panoptykon Foundation, Warsaw, October 2011
Creative Commons 3.0 BY Polska
76 pages
conference (October 2011, Warsaw)
Comment (0)th3 pr0ph3tz 0f GoD: GoD zERo (2011)
Filed under e-zine | Tags: · hacking, internet, privacy, security, software
.GoD.zERo...................................... . . . ######### . . ################# . . ##################### . . ######## ####### . . ##### ### . . ### ## . . ### ## . . ## ## . . ## ## # . . #### ## ## . . ############### ###### . . ############# ###### . . ######### . . . . ###### . . ############ . . ############### . . ## ### . . ## # . O . ## 0 ----> < \==- - - - - - - --- . ## # . / \ _/\_\O <-- internet . ## ### . . ############### . . ############ . . ###### . . ## ## . . ## Your lord and owner ## . . ############################### . . ## ## . . ## ## . . ### ### . . #### #### . . ######## ######## . . ####################### . . ################# . . ######### . . 0 . .....................................GoD.zERo..
tHE t3n c0MM4NDMeNTZ 4 CRiMiN4LZ |_~]0-.-0[~_|
1. th0u sh4ll n3v3r r4T 0N ThY tEAM MaTEZ oR aNUTHEr, diReKTLy oR iNDiREKTLy.
2. th0U sh4LL n3v3R sT4y uP ph0R m0Re tHAn 72 HOuRz sTrAiT iN d4 sERcH 4 w4r3z & 0d4yZ.
3. th0w SHaLL NeVEr kuMMuNiCaTE 0R h4k G1bz0nz oVER iNSECuRE MEDiUMZ. eNCRyPT & BoUNce.
4. th0U sh4LL n3v3R d0 aNyTHiNG pHRUm a SYsTEM tHAt dUzNT ENCRyPT da rOOT diREKtoRY /.
5. THoW sh4LL 4LW4Yz TRuST tHY guT iNSTiNKt. wh3n th1gh sense m4juR he4t 0n a syst3m, j00 disappe4r. s|_|ck 1t up 4nd muV 0n d3r R pL3nTy 0V f1zh iN d4 Se4 0F w4r3Z wh3N th1gH s3ns3 ThY t4LKiNG 2 n4RqZ, g1Ve d3m PH4LsE iNpHo d3n DiSSaPPeAR.
6. th0u sh4LL n3v3R Le4v3 thY b0x3n uNENcRyPTeD oR LoGGeD iN wH3n tHy Le4v3 d4 MuDHuT, th1Z iZ wh3n da CiA SWooP iN.
7. th0W sh4LL n3V3R f0Ld wh3N iNt3r0G4T3d bY dUH L4W iNFORCEMeNT. St4Y sTRoNG, d4 FoRCE 0v 0d4y w4r3Z iZ sTr0NG w1Th1N jUr p33n.
8. th0u Sh4LL tRuZT nO 0n3.
9. ThOw SHaLL h4Ve PHuN iN tHE pRAIRe uV W4R3z. 10.exP3ri3Nce da RekuRsiON.
"j00 cre4t3 b0mbz, w3 cre4t3 f0rk b0mbz. j00 br1ng d0wn build1ngz, w3 br1ng d0wn juR int3rn3t k0nn3kti0n. j00 k1ll pe0pLe, w3 k1ll pr0c3ss33z. j00 vi0l4t3 p3rs0n4l lib3rt1ez, w3 g3n3r4t3 p4ge f4ult vi0lati0nz. j00 h4ve kuRRuPT p0Li7ic1anz, w3 kuRRuPT dUH st4ck. j00 k0ndukT dr0n3 att4x, w3 k0nDuKT p1nG att4kz. j00 r af7eR 0iL, w3 r af73r 0d4y w4r3z. j00 dec33v d4 p33p0le, w3 st1k R jUNK thRu d4 p33p h0Le. j00 trY & pr0gRaM dA m1ndZ 0v d4 p33p0le, w3 pr0gRaM dA w4R3z f0uR 0uR p33pl. j00 th1nk p33pL r sh33p, w3 m4ke JuR boX b33p wh3n w3 reBooT i7. j00 kuMiT w4r cr1m3z, w3 KuMiT PuT3r kRiMEz. j00 s3nd peo0pLe 2 sp4c3, w3 phr33 uP sp4c3 0n jUR h4rd DRiV3 wh3N w3 RM j00. th1z iZ 0ur m4ngiFezt0, 0uR kRiM3 iZ d4t 0v 0wn1Ng j00." -- OSaMa BiN LOGiN
*\o_ _c/*
/ * * \
< \ *\o/* />
)
c/* / > *\o
< \ />
__o */\ /\* c__
* /> GoD < \ *
/\* __o_ _c__ */\
* / * * \ *
<\ />
*\c/*
__)__
Chief editor: lee-0d4ynardo DeCoderio
PDF (TXT; dead link)
PDF (updated on 2012-7-27)