Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Why CMS (Score 5, Informative) 219

For one, the weight a CMS adds is compensated by all of the code that is already present, all of the plugins that can be added without any trouble, the possibility for non-coders to easily modify website content ...
Especially for large websites, this can dramatically improve how fast you can update and improve your site.
Also, if you don't want to use a CMS, a framework like Django or Ruby on Rails is the way to go. These allow you to program everything yourself, but already have a lot of functionality built-in, to avoid reinventing the wheel.
Software

Submission + - Freenet 0.7.5 Announced

evanbd writes: After a year of development, the Freenet Project has announced version 0.7.5 of the Freenet anti-censorship software. Compared to 0.7, the new version offers significantly improved network performance, faster startup and reduced memory usage when uploading or downloading large files, enhancements to the user interface, and a new Windows installer. A new search function is also available, though it's still fairly limited. Downloads are available for Linux, OSX, and Windows. If you encounter any difficulties or bugs, help is available on IRC in #freenet at irc.freenode.net.

Comment Re:First post? (Score 3, Insightful) 231

Unlike with Tor, each user is a router (especially true for high-bandwidth users). Obviously people are not a router to the regular net (as that could get people in trouble), but all users route data through the I2P network itself.
In other words, if you want high-bandwidth bittorrenting, it helps a lot to contribute bandwidth yourself (makes you well-integrated). This keeps leechers to a slightly lower level.
Secondly, as torrents consume a lot of bandwidth, they also provide cover traffic for other people who might not more anonymity.
Encryption

Submission + - Anonymous network I2P 0.7.2 released (i2p2.de)

Mathiasdm writes: "The Invisible Internet Project, also known as I2P, has seen its 0.7.2 release (download). I2P uses multiple encryption layers, and routing through several other computers to hide both sender and receiver of messages. On top of the network, regular services such as mail, browsing, file sharing and chatting are supported. This release (and all of the releases since 0.7) is at the start of a new development period, in which the I2P developers wish to spread the word about the secure network. This new release includes performance improvements, a first edition of an experimental new desktop interface and security improvements (by limiting the number of tunnels a single peer can participate in)."

Slashdot Top Deals

Reality must take precedence over public relations, for Mother Nature cannot be fooled. -- R.P. Feynman

Working...