Search results
Results From The WOW.Com Content Network
IPOP (IP-Over-P2P) is an open-source user-centric software virtual network allowing end users to define and create their own virtual private networks (VPNs). IPOP virtual networks provide end-to-end tunneling of IP or Ethernet over “TinCan” links setup and managed through a control API to create various software-defined VPN overlays.
privacyIDEA provides an authentication backend for various kinds of applications (including SSH, VPN, as well as web applications such as ownCloud [3]).Thus it is meant to replace classical proprietary two factor authentication systems such as RSA SecurID or Vasco.
Shadowsocks is a free and open-source encryption protocol project, widely used in China to circumvent Internet censorship.It was created in 2012 by a Chinese programmer named "clowwindy", and multiple implementations of the protocol have been made available since.
The OpenConnect client is written primarily in C, and it contains much of the infrastructure necessary to add additional VPN protocols operating in a similar flow, and to connect to them via a common user interface: [13] Initial connection to the VPN server via TLS; Authentication phase via HTTPS (using HTML forms, client certificates, XML, etc.)
In this essence, RPyC is different from other RPCs, that require registration of resources prior to accessing them. As a result, using RPyC is much more straightforward, but this comes at the expense of security (you cannot limit access). RPyC is intended to be used within a trusted network, there are various schemes including VPN for achieving ...
ZeroNet is a decentralized web-like network of peer-to-peer users, created by Tamas Kocsis in 2015, programming for the network was based in Budapest, Hungary; is built in Python; and is fully open source. [3] Instead of having an IP address, sites are identified by a public key (specifically a bitcoin address). The private key allows the owner ...
Veilid borrows from both the Tor anonymising router and the InterPlanetary File System (IPFS), to offer encrypted and anonymous peer-to-peer connection using a 256-bit public key as the only visible ID. Even details such as IP addresses are hidden.
Flash proxies are an Internet censorship circumvention tool which enables users to connect to the Tor anonymity network (amongst others) via a plethora of ephemeral browser-based proxy relays. The essential idea is that the IP addresses contingently used are changed faster than a censoring agency can detect, track, and block them.