Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment Re:I2P? (Score 2, Informative) 122

Yes, I2P has a number of clients specifically made for it. Also, since the traffic stays inside the network, there's not the same issue as with Tor (that bittorrent basically ruins the outproxies). That upside is also a downside, since it means you can't torrent traffic from regular sites, you have to stick to internal I2P torrents.

Submission + - Wikileaks Releases Murder Video (

linguizic writes: Today Wikileaks released the video of US military firing large caliber weapons into a crowd that included two children as well as a photojournalist and a driver for Reuters. Wikileaks maintains that this video was covered up by the US Military when Reuters asked for an official investigation. This is the same video that supposedly has made the editors of Wikileaks a target of the State Department and/or the CIA as was discussed on Slashdot here:

Verizon CTO Says 4G Service Is On Track 74

Verizon has announced that it is on track to roll out their new 4G LTE service using the 700 MHz band that it acquired in the recent FCC auction. Targeted first towards USB air cards for laptop customers, the service will be extended to cell phones and other mobile devices with embedded LTE eventually. Testing in Boston and Seattle should conclude in the next couple of months and commercial deployments should follow soon thereafter. "Lynch said getting voice to work over LTE has been particularly challenging. But that challenge is getting resolved as Verizon and other members of the GSMA announced Monday they are supporting a standard that uses IMS technology to deliver voice services over LTE. Still, more work needs to be done. Until a solution is complete, Verizon will use its CDMA network to provide voice services. And the LTE network will be used for data. Eventually, when voice over LTE becomes a reality, Verizon will use that technology. Verizon will also have to integrate EV-DO into its LTE offering to ensure that customers can switch to the 3G EV-DO network when the 4G LTE network is not available. Even though Verizon is being aggressive in building its network, it won't happen overnight."

Submission + - Anonymous network I2P 0.7.10 released (

Mathiasdm writes: The Invisible Internet Project (I2P) attempts to create an anonymous communication network. I2P creates an additional layer in the network stack, providing anonymity using encryption and passing messages along through several other computers. On top of the network, regular services such as mail, browsing, file sharing and chatting are supported.
Version 0.7.10 was released today. It will increase the scalability of the network, which has seen a 5-fold traffic growth in the past year, even further. The release also addresses a possible security issue.

Comment Re:Why CMS (Score 5, Informative) 219

For one, the weight a CMS adds is compensated by all of the code that is already present, all of the plugins that can be added without any trouble, the possibility for non-coders to easily modify website content ...
Especially for large websites, this can dramatically improve how fast you can update and improve your site.
Also, if you don't want to use a CMS, a framework like Django or Ruby on Rails is the way to go. These allow you to program everything yourself, but already have a lot of functionality built-in, to avoid reinventing the wheel.

Submission + - Freenet 0.7.5 Announced

evanbd writes: After a year of development, the Freenet Project has announced version 0.7.5 of the Freenet anti-censorship software. Compared to 0.7, the new version offers significantly improved network performance, faster startup and reduced memory usage when uploading or downloading large files, enhancements to the user interface, and a new Windows installer. A new search function is also available, though it's still fairly limited. Downloads are available for Linux, OSX, and Windows. If you encounter any difficulties or bugs, help is available on IRC in #freenet at

Comment Re:First post? (Score 3, Insightful) 231

Unlike with Tor, each user is a router (especially true for high-bandwidth users). Obviously people are not a router to the regular net (as that could get people in trouble), but all users route data through the I2P network itself.
In other words, if you want high-bandwidth bittorrenting, it helps a lot to contribute bandwidth yourself (makes you well-integrated). This keeps leechers to a slightly lower level.
Secondly, as torrents consume a lot of bandwidth, they also provide cover traffic for other people who might not more anonymity.

Slashdot Top Deals

I have a very small mind and must live with it. -- E. Dijkstra