Bookmark
Software | OpenDaylight
www.opendaylight.org/software, posted 2014 by peter in cloudcomputing communication free networking opensource software virtualization
OpenDaylight is an open platform for network programmability to enable SDN and NFV for networks at any size and scale. The community’s second release “Helium” comes with a new user interface and a much simpler and customizable installation process thanks to the use of the Apache Karaf container.
...
OpenDaylight software is a combination of components including a fully pluggable controller, interfaces, protocol plug-ins and applications. With this common platform both customers and vendors can innovate and collaborate in order to commercialize SDN- and NFV-based solutions.
Bookmark
Home | Open Platform for NFV (OPNFV)
https://www.opnfv.org/, posted 2014 by peter in communication free networking opensource software virtualization
Open Platform for NFV (OPNFV) is a new open source project focused on accelerating the evolution of Network Functions Virtualization (NFV). OPNFV will establish a carrier-grade, integrated, open source reference platform that industry peers will build together to advance the evolution of NFV and to ensure consistency, performance and interoperability among multiple open source components. Because multiple open source NFV building blocks already exist, OPNFV will work with upstream projects to coordinate continuous integration and testing while filling development gaps.
Bookmark
Making "NSA-Proof" Social Networking Mainstream | TechPresident
techpresident.com/news/wegov/24759/making-NSA-proof-social-networking-mainstream, posted 2014 by peter in communication fascism networking privacy social toread
When Edward Snowden exposed the scale and depth of the National Security Agency's surveillance programs, his findings led to another disheartening revelation: that our Internet has become too centralized. Webmail services like Yahoo and Google and social networks like Facebook and Twitter are convenient and efficient platforms, as well as easy to use, but they collect massive amounts of user data that can facilitate intelligence spying and other types of snooping. Meanwhile, securer methods of communication are often cumbersome and overly technical for the average user who would like to send an email without having to download and set up various software. Yet after Snowden’s leaks, an increasing demand for securer alternatives has led to the development of anti-surveillance products with an eye towards being user friendly.
That is certainly true for Miguel Freitas, a research engineer based in Rio de Janeiro, Brazil, who decided to create a decentralized alternative to Twitter to counter NSA spying and protect against shutdowns of social media sites; but it would also be “something that my grandmother could use,” Freitas tells techPresident.
Bookmark
ProxFree - Free Web Proxy | Maintain Privacy & Surf Anonymously
https://www.proxfree.com/, posted 2014 by peter in communication free networking privacy
ProxFree is a simple and completely free web proxy service. Perfect for those looking to bypass censorship restrictions and/or looking to browse the internet privately, anonymously and securely.
Bookmark
Home - leap.se
https://leap.se/en, posted 2013 by peter in communication networking privacy security
LEAP's multi-year plan to secure everyday communication breaks down into discrete services, to be rolled out one at a time. When we introduce a new service, integrated support will be added to both the user-facing LEAP Client and the server-side LEAP Platform for Service Providers. All communication content will be client-side encrypted, and as much of the metadata as possible. Most importantly, all LEAP services will be based on our plan for federated secure identity and unmappable routing.
Bookmark
How to remain secure against NSA surveillance | Bruce Schneier
www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance, posted 2013 by peter in fascism howto networking security toread
Now that we have enough details about how the NSA eavesdrops on the internet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves.
Bookmark
VPN Services That Take Your Anonymity Seriously, 2013 Edition | TorrentFreak
torrentfreak.com/vpn-services-that-take-your-anonymity-seriously-2013-edition-130302/, posted 2013 by peter in business list networking privacy security
It’s taken a long time but today we bring the first installment in a series of posts highlighting VPN providers that take privacy seriously. Our first article focuses on anonymity and a later installment will highlight file-sharing aspects and possible limitations.
Bookmark
cortesi - How mitmproxy works
corte.si/posts/code/mitmproxy/howitworks/index.html, posted 2013 by peter in communication development free hack networking reference security software
The text below is now part of the official documentation of mitmproxy. It's a detailed description of mitmproxy's interception process, and is more or less the overview document I wish I had when I first started the project. I proceed by example, starting with the simplest unencrypted explicit proxying, and working up to the most complicated interaction - transparent proxying of SSL-protected traffic1 in the presence of SNI.
Bookmark
3G and 4G USB modems are a security threat, researcher says - Network World
https://www.networkworld.com/news/2013/031513-3g-and-4g-usb-modems-267763.html, posted 2013 by peter in mobile networking security
The vast majority of 3G and 4G USB modems handed out by mobile operators to their customers are manufactured by a handful of companies and run insecure software, according to two security researchers from Russia.
Bookmark
Sakis3G - All-in-one script
www.sakis3g.org/, posted 2012 by peter in communication linux mobile networking
Sakis3G is a tweaked shell script which is supposed to work out-of-the-box for establishing a 3G connection with any combination of modem or operator. It automagically setups your USB or Bluetooth™ modem, and may even detect operator settings. You should try it when anything else fails!
If you are lucky enough, you may be connected 30 seconds after downloading script.
|< First < Previous 11–20 (84) Next > Last >|