Showing posts with label Sharing. Show all posts
Showing posts with label Sharing. Show all posts

Anonymous FTP

A host which provides an FTP service may additionally provide Anonymous FTP access as well. Under this arrangement, users do not strictly need an account on the host. Instead the user typically enters 'anonymous' or 'ftp' when prompted for username. Although users are commonly asked to send their email address as their password, little to no verification is actually performed on the supplied data.

As modern FTP clients typically hide the anonymous login process from the user, the ftp client will supply dummy data as the password (since the user's email address may not be known to the application).

For example, the following ftp user agents specify the listed passwords for anonymous logins:

* Mozilla Firefox (2.0) — mozilla@example.com

* KDE Konqueror (3.5) — anonymous@

* wget (1.10.2) — -wget@

* lftp (3.4.4) — lftp@

Anonymous FTP

The Gopher protocol has been suggested as an alternative to anonymous FTP, as well as Trivial File Transfer Protocol and File Service Protocol.


Third P2P-Generation

indirect and encrypted

The third generation of peer-to-peer networks are those that have anonymity features built in. Examples of anonymous networks are ANts P2P, RShare, Freenet, I2P, GNUnet and Entropy.

A degree of anonymity is realized by routing traffic through other users' clients, which have the function of network nodes. This makes it harder for someone to identify who is downloading or who is offering files. Most of these programs also have strong encryption to resist traffic sniffing.

Friend-to-friend networks only allow already-known users (also known as "friends") to connect to the user's computer, then each node can forward requests and files anonymously between its own "friends'" nodes.

Third-generation networks have not reached mass usage for file sharing because most current implementations incur too much overhead in their anonymity features, making them slow or hard to use. However, in countries where very fast fiber-to-the-home Internet access is commonplace, such as Japan, a number of anonymous file-sharing clients have already reached high popularity.

An example might be: Petra gives a file to Oliver, then Oliver gives the file to Anna. Petra and Anna thus never become acquainted and thus are protected. Often used virtual IP addresses obfuscate the user's network location because Petra only knows the virtual IP of Anna. Although real IP's are always necessary to establish a connection between Petra and Oliver, nobody knows if Anna really requested and Petra really send the file or if they just forward it (As long as they won't tell anyone their virtual IP's!). Additionally all transfers are encrypted, so that even the network administrators cannot see what was sent to whom. Example software includes WASTE, JetiANts, Tor and I2P. These clients differ greatly in their goals and implementation. WASTE is designed only for small groups and may therefore be considered Darknet; ANts and I2P are public Peer-to-Peer systems, with anonymization provided exclusively by routing reach.

Ants network

* ANts P2P
* JetiANts
* Hornet

Mute network

* MUTE
* Kommute - KDE

I2P network

* I2P
* I2Phex - Gnutella over I2P
* iMule - eDonkey (Kademlia) over I2P
* Azureus - has I2P plugin

Retroshare-Network (F2F Instant Messenger)

* Retroshare Instant Messenger - Retroshare Chat Messenger for privacy of filesharing

other networks or clients

* Alliance
* Freenet
* GNUnet
* Nodezilla
* OFF System
* Perfect Dark
* Proxyshare
* RShare
* Share
* Tor
* WinNY
* Zultrax

File sharing

File sharing refers to the providing and receiving of digital files over a network, usually following the peer-to-peer (P2P) model, where the files are stored on and served by personal computers of the users. Most people who engage in file sharing on the Internet both provide (upload) files and receive files

P2P file sharing is distinct from file trading in that downloading files from a P2P network does not require uploading, although some networks either provide incentives for uploading such as credits or forcing the sharing of files being currently downloaded.

USENET was the first global file sharing network. Files are posted to alt.binary.* groups by users and copies are propagated to all hosts that carry that particular group. Unlike the later peer-to-peer file sharing networks, requests for a file relies on people asking others to post them, and users save them if they want those files.

First P2P-generation: Server-client

The first generation of peer-to-peer file sharing networks had a centralized server system. This system controls traffic amongst the users. The servers store directories of the shared files of the users and are updated when a user logs on. In the centralized peer-to-peer model, a user would send a search to the centralized server of what they were looking for. The server then sends back a list of peers that have the data and facilitates the connection and download. The Server-Client system is quick and efficient because the central directory is constantly being updated and all users had to be registered to use the program. However, there is only a single point of entry, which could result in a collapse of the network. In addition, it is possible to have out of date information or broken links if the server is not refreshed.

The first file-sharing programs marked themselves by inquiries to a server, either the data to the download held ready or in appropriate different Peers and so-called Nodes further-obtained, so that one could download there. Two examples were Napster (today using a pay system) and eDonkey2000 in the server version (today, likewise with Overnet and KAD - network decentralized). Another notable instance of peer to peer file sharing, which still has a free version, is Limewire.