BitTorrent Specification http://www.bitconjurer.org/ |
Filesharing applications http://dmoz.org/Computers/Software/Internet/Clients/File_Sharing/ |
The Anatomy of a Large-Scale Hypertextual Web Search Engine http://www-db.stanford.edu/~backrub/google.html |
MUTE http://mute-net.sourceforge.net/ |
GNUnet http://www.gnu.org/software/gnunet/ |
RTP header http://www.networksorcery.com/enp/protocol/rtp.htm |
UDP data transfer http://dsd.lbl.gov/DIDC/PFLDnet2004/talks/Grossman-slides.pdf |
Multicast http://www.nwfusion.com/details/502.html |
Multicast security http://www.live.com/mcastfw.html |
HP tech report "Peer-to-Peer Computing Dejan S. Milojicic, Vana Kalogeraki, Rajan Lukose, ..." http://www.hpl.hp.com/techreports/2002/HPL-2002-57.pdf |
P2P and related SW http://www.slyck.com/programs.php |
Another P2P news web site http://p2pnet.net/ |
P2P statistics (Sep, 2004) http://www.itic.ca/DIC/News/2004/09/02/P2P_Statistics_August_2004.en.html |
P2P and SIP http://www.techweb.com/wire/networking/47900119 |
Report on worldwide digital piracy http://www.itic.ca/DIC/News/index.html |
P2P Gets Serious http://www.lightreading.com/document.asp?doc_id=56091 |
Why DRM is bad http://www.craphound.com/msftdrm.txt |
Publications on Coral project web site http://www.scs.cs.nyu.edu/coral/overview/ |
More on IRIS here http://www.newscientist.com/news/news.jsp?id=ns99992861 (sponsored by National Science Foundation) |
More research publications from Chord http://pdos.lcs.mit.edu/chord/ |
Self-certifying File System (SFS) http://www.fs.net/sfswww/ |
Berkeley DB http://www.sleepycat.com/ |
Wavelet Transform Tutorial http://users.rowan.edu/~polikar/WAVELETS/WTtutorial.html |
High resolution wallpapers from Dali, Picasso http://www.rasiel.com/ |
Version Control System Comparison http://better-scm.berlios.de/comparison/comparison.html |
Keyword Matching http://www.limewire.org/techdocs/KeywordMatching.htm |
Java code examples http://www.limewire.org/techdocs.shtml |
Open Source JVM http://sablevm.org/docs.html |
Java to ELF compiler http://jcvm.sourceforge.net/ |
Another Java compiler http://gcc.gnu.org/java/ |
Subversion Version Control http://svnbook.red-bean.com/ |
Performance Comparison of Java/.NET Runtimes http://www.shudo.net/jit/perf/index.html |
Project WASTE documentation http://waste.sourceforge.net/docs/docs.html |
Project MNET documentation http://mnetproject.org/repos/mnet/doc/ |
More details on traffic shapers http://www.broadband-pbimedia.com/ct/archives/0703/0703_pondering.html |
and more comments from lightreading http://www.lightreading.com/boards/message.asp?msg_id=93718 |
Another way to secure access to the server "Port Knocking" http://www.portknocking.org/
Client can fecth current time and date from any public realtime service, calculate 128 bits hash with this number and secret word and
use the result as a sequence of ports to knock. Knock server checks the received sequence against the same or any other reliable
time server. This way the knocking sequence is going to be unique for every session and can not be easily replicated by adversary (GNU Public License)
|
"The longest and most comprehensive measurement study" of Bittorrent http://pds.twi.tudelft.nl/~pawel/pub/bittorrent.pdf |
Streaming P2P and Bittorrent http://www.ifi.uio.no/dmms/papers/129.pdf |
XHTML http://academ.hvcc.edu/~kantopet/xhtml/index.php |
Good PHP tutorial http://www.php.net/manual/en/tutorial.useful.php |
PHP Content Management platform http://drupal.org/ |
HTTP cache http://dijjer.sourceforge.net/ |
Network security http://www.insecure.org/nmap/nmap_doc.html |
Marketing, business and everything (must to listen) http://rdscon.vo.llnwd.net/o1/_downloads/ itc/mp3/2004/Clayton%20Christensen%20-%20Capturing%20the%20Upside.mp3 |
MD5 To Be Considered Harmful Someday (this link also a great source on TCP hacking) http://www.doxpara.com/md5_someday.pdf |
WikiEngines http://c2.com/cgi/wiki?TopTenWikiEngines |
Anonymity www.i2p.net see also network comparison http://www.i2p.net/how_networkcomparisons |
Very interesting reading (this is 1992) http://www.dina.dk/~abraham/Linus_vs_Tanenbaum.html |
Tor Project http://tor.eff.org/index.html |
http://entropy.stop1984.com/en/home.html |
SWT/JFace introduction http://www.javaworld.com/javaworld/jw-04-2004/jw-0426-swtjface-p2.html |
Open Source UML http://argouml.tigris.org/ http://www.umlet.com/ |
Must read Using UDP for Reliable Data Transfer ... http://www.ncdm.uic.edu/papers/udt-protocol.pdf |
The legacy control protocols are too tightly packed. This makes it very difficult for third parties
(e.g., routers, firewalls, and the US Department of Homeland Security) to analyze the traffic as it flows by ?!
http://www.x-cp.org/index.html |
Benchmarking Tool for Measuring TCP and UDP Performance http://www.pcausa.com/ |
SUMI P2P spoofing IP address http://sumi.sourceforge.net/ |
Binary XML http://uk.builder.com/architecture/web/0,39026570,39233479,00.htm |
P2P and law http://news.com.com/State+bill+could+cripple+P2P/2100-1028_3-5540937.html?part=rss&tag=5540937&subj=news.1028.5 |
Under hood of Skype http://it.slashdot.org/article.pl?sid=05/01/20/1653217 |
JSON (XML?) http://www.crockford.com/JSON/index.html |
Simple example of XHTML http://www.mikebiddulph.org/selectiveperception/ |
Open Source graphic editor http://gimp.org/ |
Media Develoment Loan Fund (MDLF) Campware initiative http://www.campware.org/ |
How PGP works http://www.pgpi.org/doc/pgpintro/ |
Search in video http://www.annodex.net/ |
This memo documents the RADIUS protocol http://www.freesoft.org/CIE/RFC/Orig/rfc2138.txt |
More links on authentication http://www.rocketaware.com/comm/authentication/ |
Law related news http://www.findlaw.com/ and MSGM v. Grokster case http://supreme.lp.findlaw.com/supreme_court/docket/2004/march.html#04-480 |
Fred von Lohmann Senior IP Attorney EFF http://www.eff.org/about/staff/?f=fred_von_lohmann.html , What P2P developers need to know http://p2pnet.net/story/2569 |
Adobe UI libraries http://opensource.adobe.com/ |
HTML demos http://www.damowmow.com/playground/demos/ |
Articles P2P related research work, search http://www.utsc.utoronto.ca/~rosselet/cscd58/ref05/p2p-lookups.pdf http://www.c-lab.de/vis/loeser/s609tj.pdf http://www.utsc.utoronto.ca/~rosselet/cscd58/ref05/p2p-measure.pdf
http://www.utsc.utoronto.ca/~rosselet/cscd58/proj05/presentation-topics.html http://bnoopy.typepad.com/bnoopy/2005/03/the_long_tail_o.html |
Open source Java VM http://jamvm.sourceforge.net/ |
Merkle Trees http://www.open-content.net/specs/draft-jchapweske-thex-02.html |
WinPcap http://winpcap.mirror.ethereal.com/ |
Enabling High Performance Data Transfers http://www.psc.edu/networking/projects/tcptune/ |
TCP Performance Tools http://ncne.nlanr.net/software/tools/tcp.html |
XSLT tutorial http://www.chongluo.com/books/xml/xslt/index.htm discussion http://oreillynet.com/pub/wlg/2423 |
a firewall cannot protect a network against its own internal users, and should not even try to. http://www.tldp.org/HOWTO/Firewall-Piercing/x58.html |
Using UDP for Reliable Data Transfer over High Bandwidth-Delay Product Networks |
TCP/IP tools http://doc.asf.ru/Tools%20&%20Utilities.htm |
PDF text extracting (Java) http://pdfbox.org/ |
Java performance benchmark 2004 http://www.shudo.net/jit/perf/ |
A Network Coding Approach http://web.mit.edu/medard/www/allertonf.pdf |
The Reliable Multicast Design Space for Bulk Data Transfer http://www.faqs.org/rfcs/rfc2887.html |
GTP: Group Transport Protocol for Lambda-Grids http://vgrads.rice.edu/publications/andrew6 |
Self heating beverages how to http://www.makezine.com/blog/archive/2005/07/wolfgang_puck_s_1.html |
Java Script http://www.ripcord.co.nz/behaviour/ http://prototype.conio.net/ http://script.aculo.us/drag-and-drop |