emLib
Rodi (P2P)
Functional requirements
Use cases
Design
Privacy
Help the project
Try Rodi (beta)
User Manual
History
Logos
Post IP range
How to...
Message board




SourceForge.net Logo
Get Firefox

Valid HTML 4.0! Valid CSS!

Links

BitTorrent Specification http://www.bitconjurer.org/
Filesharing applications http://dmoz.org/Computers/Software/Internet/Clients/File_Sharing/
The Anatomy of a Large-Scale Hypertextual Web Search Engine http://www-db.stanford.edu/~backrub/google.html
MUTE http://mute-net.sourceforge.net/
GNUnet http://www.gnu.org/software/gnunet/
RTP header http://www.networksorcery.com/enp/protocol/rtp.htm
UDP data transfer http://dsd.lbl.gov/DIDC/PFLDnet2004/talks/Grossman-slides.pdf
Multicast http://www.nwfusion.com/details/502.html
Multicast security http://www.live.com/mcastfw.html
HP tech report "Peer-to-Peer Computing Dejan S. Milojicic, Vana Kalogeraki, Rajan Lukose, ..." http://www.hpl.hp.com/techreports/2002/HPL-2002-57.pdf
P2P and related SW http://www.slyck.com/programs.php
Another P2P news web site http://p2pnet.net/
P2P statistics (Sep, 2004) http://www.itic.ca/DIC/News/2004/09/02/P2P_Statistics_August_2004.en.html
P2P and SIP http://www.techweb.com/wire/networking/47900119
Report on worldwide digital piracy http://www.itic.ca/DIC/News/index.html
P2P Gets Serious http://www.lightreading.com/document.asp?doc_id=56091
Why DRM is bad http://www.craphound.com/msftdrm.txt
Publications on Coral project web site http://www.scs.cs.nyu.edu/coral/overview/
More on IRIS here http://www.newscientist.com/news/news.jsp?id=ns99992861 (sponsored by National Science Foundation)
More research publications from Chord http://pdos.lcs.mit.edu/chord/
Self-certifying File System (SFS) http://www.fs.net/sfswww/
Berkeley DB http://www.sleepycat.com/
Wavelet Transform Tutorial http://users.rowan.edu/~polikar/WAVELETS/WTtutorial.html
High resolution wallpapers from Dali, Picasso http://www.rasiel.com/
Version Control System Comparison http://better-scm.berlios.de/comparison/comparison.html
Keyword Matching http://www.limewire.org/techdocs/KeywordMatching.htm
Java code examples http://www.limewire.org/techdocs.shtml
Open Source JVM http://sablevm.org/docs.html
Java to ELF compiler http://jcvm.sourceforge.net/
Another Java compiler http://gcc.gnu.org/java/
Subversion Version Control http://svnbook.red-bean.com/
Performance Comparison of Java/.NET Runtimes http://www.shudo.net/jit/perf/index.html
Project WASTE documentation http://waste.sourceforge.net/docs/docs.html
Project MNET documentation http://mnetproject.org/repos/mnet/doc/
More details on traffic shapers http://www.broadband-pbimedia.com/ct/archives/0703/0703_pondering.html
and more comments from lightreading http://www.lightreading.com/boards/message.asp?msg_id=93718
Another way to secure access to the server "Port Knocking" http://www.portknocking.org/
Client can fecth current time and date from any public realtime service, calculate 128 bits hash with this number and secret word and use the result as a sequence of ports to knock. Knock server checks the received sequence against the same or any other reliable time server. This way the knocking sequence is going to be unique for every session and can not be easily replicated by adversary (GNU Public License)
"The longest and most comprehensive measurement study" of Bittorrent http://pds.twi.tudelft.nl/~pawel/pub/bittorrent.pdf
Streaming P2P and Bittorrent http://www.ifi.uio.no/dmms/papers/129.pdf
XHTML http://academ.hvcc.edu/~kantopet/xhtml/index.php
Good PHP tutorial http://www.php.net/manual/en/tutorial.useful.php
PHP Content Management platform http://drupal.org/
HTTP cache http://dijjer.sourceforge.net/
Network security http://www.insecure.org/nmap/nmap_doc.html
Marketing, business and everything (must to listen)
http://rdscon.vo.llnwd.net/o1/_downloads/
itc/mp3/2004/Clayton%20Christensen%20-%20Capturing%20the%20Upside.mp3
MD5 To Be Considered Harmful Someday (this link also a great source on TCP hacking) http://www.doxpara.com/md5_someday.pdf
WikiEngines http://c2.com/cgi/wiki?TopTenWikiEngines
Anonymity www.i2p.net see also network comparison http://www.i2p.net/how_networkcomparisons
Very interesting reading (this is 1992) http://www.dina.dk/~abraham/Linus_vs_Tanenbaum.html
Tor Project http://tor.eff.org/index.html
http://entropy.stop1984.com/en/home.html
SWT/JFace introduction http://www.javaworld.com/javaworld/jw-04-2004/jw-0426-swtjface-p2.html
Open Source UML http://argouml.tigris.org/ http://www.umlet.com/
Must read Using UDP for Reliable Data Transfer ... http://www.ncdm.uic.edu/papers/udt-protocol.pdf
The legacy control protocols are too tightly packed. This makes it very difficult for third parties (e.g., routers, firewalls, and the US Department of Homeland Security) to analyze the traffic as it flows by ?! http://www.x-cp.org/index.html
Benchmarking Tool for Measuring TCP and UDP Performance http://www.pcausa.com/
SUMI P2P spoofing IP address http://sumi.sourceforge.net/
Binary XML http://uk.builder.com/architecture/web/0,39026570,39233479,00.htm
P2P and law http://news.com.com/State+bill+could+cripple+P2P/2100-1028_3-5540937.html?part=rss&tag=5540937&subj=news.1028.5
Under hood of Skype http://it.slashdot.org/article.pl?sid=05/01/20/1653217
JSON (XML?) http://www.crockford.com/JSON/index.html
Simple example of XHTML http://www.mikebiddulph.org/selectiveperception/
Open Source graphic editor http://gimp.org/
Media Develoment Loan Fund (MDLF) Campware initiative http://www.campware.org/
How PGP works http://www.pgpi.org/doc/pgpintro/
Search in video http://www.annodex.net/
This memo documents the RADIUS protocol http://www.freesoft.org/CIE/RFC/Orig/rfc2138.txt
More links on authentication http://www.rocketaware.com/comm/authentication/
Law related news http://www.findlaw.com/ and MSGM v. Grokster case http://supreme.lp.findlaw.com/supreme_court/docket/2004/march.html#04-480
Fred von Lohmann Senior IP Attorney EFF http://www.eff.org/about/staff/?f=fred_von_lohmann.html , What P2P developers need to know http://p2pnet.net/story/2569
Adobe UI libraries http://opensource.adobe.com/
HTML demos http://www.damowmow.com/playground/demos/
Articles P2P related research work, search http://www.utsc.utoronto.ca/~rosselet/cscd58/ref05/p2p-lookups.pdf http://www.c-lab.de/vis/loeser/s609tj.pdf http://www.utsc.utoronto.ca/~rosselet/cscd58/ref05/p2p-measure.pdf http://www.utsc.utoronto.ca/~rosselet/cscd58/proj05/presentation-topics.html http://bnoopy.typepad.com/bnoopy/2005/03/the_long_tail_o.html
Open source Java VM http://jamvm.sourceforge.net/
Merkle Trees http://www.open-content.net/specs/draft-jchapweske-thex-02.html
WinPcap http://winpcap.mirror.ethereal.com/
Enabling High Performance Data Transfers http://www.psc.edu/networking/projects/tcptune/
TCP Performance Tools http://ncne.nlanr.net/software/tools/tcp.html
XSLT tutorial http://www.chongluo.com/books/xml/xslt/index.htm discussion http://oreillynet.com/pub/wlg/2423
a firewall cannot protect a network against its own internal users, and should not even try to. http://www.tldp.org/HOWTO/Firewall-Piercing/x58.html
Using UDP for Reliable Data Transfer over High Bandwidth-Delay Product Networks
TCP/IP tools http://doc.asf.ru/Tools%20&%20Utilities.htm
PDF text extracting (Java) http://pdfbox.org/
Java performance benchmark 2004 http://www.shudo.net/jit/perf/
A Network Coding Approach http://web.mit.edu/medard/www/allertonf.pdf
The Reliable Multicast Design Space for Bulk Data Transfer http://www.faqs.org/rfcs/rfc2887.html
GTP: Group Transport Protocol for Lambda-Grids http://vgrads.rice.edu/publications/andrew6
Self heating beverages how to http://www.makezine.com/blog/archive/2005/07/wolfgang_puck_s_1.html
Java Script http://www.ripcord.co.nz/behaviour/ http://prototype.conio.net/ http://script.aculo.us/drag-and-drop

Todo on this page - PHP script and form to add links automatically. Form has three fields - secret word, URL link and comment








Message board

Home