Jump to content

Search the Community

Showing results for tags 'p2p'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 5 results

  1. Open Source zero-knowledge peer-2-peer file sync. Librevault is a data synchronization app, designed to keep files same on different computers over the network. All data is transferred directly from one device to another without the need to upload them to other servers. You can use Librevault in your local network even if the Internet connection is unavailable. Data Encryption All file content and filenames are encrypted using an industry-grade AES-256 algorithm. All transmissions are performed using TLSv1.2 The hash algorithm is SHA-3 Open Source Librevault is developed by the open source community. Secure Librevault encrypts all data with AES-256 and uses TLS for all transmissions. Flexible Synchronize between your devices, even without the Internet connection — over the local network. Decentralized Librevault transfers data directly from one device to another. You can use it in your local network, and it will work even without Internet access. Secure and private All the data is encrypted client-side using industrial-grade AES-256 algorithm, preventing hackers from ever being able to decrypt your data. All communication is secured using TLSv1.2 ====================================================================== Requirements: Windows Vista, 7, 8, 10 OS X 10.11 El Capitan Ubuntu 16.04 Xenial Xerus ====================================================================== Home: https://librevault.com/ Download: Windows | OS X | Ubuntu
  2. Directory Opus 12.6.Build.6369-neommc *JUNE 16* (plus "Neoland's USB portable" and "a serial from TSRh TeaM" ) Directory Opus is a simplest file manager, a utility program which presents lists of files and allows the user to perform actions of some kind on those files. File managers are useful for moving files between folders, making backup copies of files, viewing pictures and playing sounds, running other utility programs on lists of files, deleting unwanted files and many other “housekeeping” tasks. Directory Opus goes beyond the simple file manager metaphor, and offers you a complete replacement for Windows Explorer and many other utility programs for handling FTP, ZIP, viewing files and images, running slideshows and more. It provides you with all this within a user-friendly and fully-configurable environment within which you can access and manage your important data with a minimum of effort. Harness the power of your computer like never before! Homepage: https://www.gpsoft.com.au/index.html How to use the medicine? Download the v12.6 installer + @neommc's medicine from here: Site: 95.141.193.17 Sharecode [?]: /noload2/files/062/rsload.net.DOpusInstall.rar Mirrors: ----------------------------------------------------------- Site: https://dl2.soft98.ir Sharecode [?]: /soft/d/Directory.Opus.12.6.Build.6369.rar?1524949850 Site: http://www.mirrorcreator.com Sharecode [?]: /files/0M8RMMN9/Directory.Opus.12.6.Build.6369.rar_links Site: https://dbr.ee Sharecode [?]: /4iYd password: soft98.ir ----------------------------------------------------------- Site:http://dl.yasdl.com Sharecode [?]: /Arash/2017/Software/Directory.Opus.Pro.12.6.Build.6369_YasDL.com.rar Password: www.yasdl.com New by sweet_17: Site: https://www.upload.ee Sharecode: /files/9490147/Directory_Opus_12.6.rar.html Credited to: @neommc Thanks pablomarmol for a serial for v12.6 from TSRh TeaM: Tested on Windows 10 x64: working (but blacklisted now) Update on Aug 21, 2017: directory.opus.12.0.serial-tsrh has been blacklisted now. You can use it with firewall, but the best solution is to use the Neommc's crack. The tsrh serial can also be used with the Neommc's crack, resulting in a perfect working copy without using the firewall. Directory Opus 12.6 Build 6369 USB portable by Neoland DOPUSv12.6.0.6369_USB_Portable by Neoland site: https://mirr.re sharecode: /d/gTG <Multilanguage> Tested on Windows 10 x64: working.
  3. A peer-to-peer (P2P) communications technology built into millions of security cameras and other consumer electronics includes several critical security flaws that expose the devices to eavesdropping, credential theft and remote compromise, new research has found. A map showing the distribution of some 2 million iLinkP2P-enabled devices that are vulnerable to eavesdropping, password theft and possibly remote compromise, according to new research. The security flaws involve iLnkP2P, software developed by China-based Shenzhen Yunni Technology. iLnkP2p is bundled with millions of Internet of Things (IoT) devices, including security cameras and Webcams, baby monitors, smart doorbells, and digital video recorders. iLnkP2P is designed to allow users of these devices to quickly and easily access them remotely from anywhere in the world, without having to tinker with one’s firewall: Users simply download a mobile app, scan a barcode or enter the six-digit ID stamped onto the bottom of the device, and the P2P software handles the rest. A Webcam made by HiChip that includes the iLnkP2P software. But according to an in-depth analysis shared with KrebsOnSecurity by security researcher Paul Marrapese, iLnkP2P devices offer no authentication or encryption and can be easily enumerated, allowing potential attackers to establish a direct connection to these devices while bypassing any firewall restrictions. Marrapese said a proof-of-concept script he built identified more than two million vulnerable devices around the globe (see map above). He found that 39 percent of the vulnerable IoT things were in China; another 19 percent are located in Europe; seven percent of them are in use in the United States. Although it may seem impossible to enumerate more than a million devices with just a six-digit ID, Marrapese notes that each ID begins with a unique alphabetic prefix that identifies which manufacturer produced the device, and there are dozens of companies that white-label the iLnkP2P software. For example, HiChip — a Chinese IoT vendor that Marrapese said accounts for nearly half of the vulnerable devices — uses the prefixes FFFF, GGGG, HHHH, IIII, MMMM, ZZZZ. These prefixes identify different product lines and vendors that use iLnkP2P. If the code stamped on your IoT device begins with one of these, it is vulnerable. “In theory, this allows them to support nearly 6 million devices for these prefixes alone,” Marrapese said. “In reality, enumeration of these prefixes has shown that the number of online devices was ~1,517,260 in March 2019. By enumerating all of the other vendor prefixes, that pushes the number toward 2 million.” Marrapese said he also built a proof-of-concept attack that can steal passwords from devices by abusing their built-in “heartbeat” feature. Upon being connected to a network, iLnkP2P devices will regularly send a heartbeat or “here I am” message to their preconfigured P2P servers and await further instructions. “A P2P server will direct connection requests to the origin of the most recently-received heartbeat message,” Marrapese said. “Simply by knowing a valid device UID, it is possible for an attacker to issue fraudulent heartbeat messages that will supersede any issued by the genuine device. Upon connecting, most clients will immediately attempt to authenticate as an administrative user in plaintext, allowing an attacker to obtain the credentials to the device.” To make matters worse, even if an attacker doesn’t want to bother intercepting device passwords, a great many of them will be running in their factory-default state with the factory-default password. The IoT malware Mirai proved this conclusively, as it rapidly spread to millions of devices using nothing more than the default credentials for IoT devices made by dozens of manufacturers. What’s more, as we saw with Mirai the firmware and software built into these IoT devices is often based on computer code that is many years old and replete with security vulnerabilities, meaning that anyone able to communicate directly with them is also likely to be able to remotely compromise them with malicious software. Marrapese said despite attempts to notify China’s CERT, iLnk and a half dozen major vendors whose products make up the bulk of the affected devices, none of them have responded to his reports — even though he first started reaching out to them more than four months ago. Neither HiChip nor iLnk responded to requests for comment sent by KrebsOnSecurity. Interestingly, iLnk’s Web site (p1.i-lnk[.]com) currently appears to be non-functional, and a review of its HTML source code indicates the site is currently compromised by an obfuscated script that tries to redirect visitors to a Chinese gaming Web site. Despite the widespread impact of these vulnerabilities, Marrapese’s research suggests that remediation from vendors is unlikely – and in fact, infeasible. “The nature of these vulnerabilities makes them extremely difficult to remediate for several reasons,” Marrapese wrote. “Software-based remediation is unlikely due to the infeasibility of changing device UIDs, which are permanently assigned during the manufacturing process. Furthermore, even if software patches were issued, the likelihood of most users updating their device firmware is low. Physical device recalls are unlikely as well because of considerable logistical challenges. Shenzhen Yunni Technology is an upstream vendor with inestimable sub-vendors due to the practice of white-labeling and reselling.” Marrapese said there is no practical way to turn off the P2P functionality on the affected devices. Many IoT devices can punch holes in firewalls using a feature built into hardware-based routers called Universal Plug and Play (UPnP). But simply turning off UPnP on one’s router won’t prevent the devices from establishing a P2P connection as they rely on a different communications technique called “UDP hole punching.” Marrapese said it should be possible to block vulnerable devices from communicating with any P2P servers by setting up firewall rules that block traffic destined for UDP port 32100. However, a much safer idea would be to simply avoid purchasing or using IoT devices that advertise any P2P capabilities. Previous research has unearthed similar vulnerabilities in the P2P functionality built into other IoT systems. For examples of this, see This is Why People Fear the Internet of Things, and Researchers Find Fresh Fodder for IoT Attack Cannons. Marrapese documented his findings in more detail here. The enumeration vulnerability has been assigned CVE-2019-11219, and the man-in-the-middle vulnerability has been assigned CVE-2019-11220. Additional reading: Some Basic Rules for Securing your IoT Stuff. Source: P2P Weakness Exposes Millions of IoT Devices (Krebs on Security)
  4. Description: BitTorrent's software client allows you to quickly download high-quality digital content such as video, music, and games. Available in over 20 languages, it leverages our community of over 70 million users to securely deliver files to your PC faster than anything else out there. Features include detailed graphs and stats on the health of digital media files provide you a safer, more controlled downloading experience, local peer discovery and automatic port mapping increase file transfer speed without the need to reconfigure routers or other hardware, and dynamic bandwidth management allows you to download content without disrupting Web browsing, e-mail, or other applications. Homepage: http://www.bittorrent.com/Downloads links: BitTorrent Plus Stable [Official Link]: http://download-new.utorrent.com/endpoint/bittorrent/os/windows/track/stable/BitTorrent.Plus.v7.9.2.xxxx.Patch-REiS [Only the crack] http://www.mirrorcreator.com/files/ZTERCV4Z/ Note: You must unpack the file "BitTorrent.exe" with PE Explorer or other unpack programs because the files are protected by UPX, and then apply the patch. If you want how to patch BitTorrent correctly, see here: Credits to: knowledge On the other hand, if you search the new patch for uTorrent, see here! :showoff: :showoff: :showoff:
  5. Video streaming giant Netflix is considering a move to peer-to-peer assisted streaming. The company has put up a job posting for a Senior Software Engineer tasked with integrating P2P technology into its streaming services. Could a BitTorrent-powered Netflix be coming soon? With over 33 million streaming subscribers in the U.S. alone, Netflix is one the major providers of online video entertainment. The company claims to be a piracy killer, and previously noted that unauthorized P2P traffic reduced in countries where their services were rolled out. Interestingly enough, the streaming service also has a lot to gain from file-sharing technologies. A recent Netflix job ad spotted by Ars Technica, reveals that they are considering using P2P technology to improve their streaming services. “Netflix seeks a seasoned Senior Software Engineer with a special focus in peer-to-peer networks,” the company writes. The description of the new position has a clear focus on researching the possibility to allow users to stream videos via peer-to-peer technology. - Research and architecture of large-scale peer-to-peer network technology as applicable to Netflix streaming. - Liaise with internal client and toolkit teams to integrate P2P as an additional delivery mechanism. - Design and develop tools for the operation of peer-to-peer enabled clients in a production environment. Netflix mentions that the company is currently responsible for over 30% of all downstream traffic. Should it move towards P2P streaming, Netflix will also be the number one in terms of upstream bandwidth, a position currently dominated by BitTorrent traffic. Netflix’ job ad The option of P2P-assisted streaming became of interest again this year, after Netflix signed a deal with Comcast to pay for direct access to its network. With P2P technology, Netflix has the option to increase its streaming capabilities without additional bandwidth costs. In fact, not only could the company achieve superior streaming quality by using P2P technology, its bandwidth bills could even decrease. Bram Cohen, the inventor of BitTorrent, would welcome a P2P-powered Netflix. He previously said that video delivery via P2P is far superior to the systems currently used by Netflix and other video services. “The fact is that by using BitTorrent it’s possible to give customers a much better experience with much less cost than has ever been possible before. It’s really not being utilized properly and that’s really unfortunate,” Cohen said. According to Cohen, Netflix’s video streaming quality is currently less than acceptable. “I actually don’t have a TV at home myself, but I do watch stuff on Netflix and I find it very frustrating because the video quality is really terrible,” he noted. With P2P-assisted streaming it will be possible to stream videos in a higher quality than is currently possible, but whether Netflix will use a BitTorrent-inspired technology or something different is unknown at this point. In any case, it’s an interesting development to watch. Source: TorrentFreak
×
×
  • Create New...