P2P: Peer to peer and social networks

| Ordered Links | Links |
DigitalStart.net | W3Toolbar | OopSchool | CyberToolbar | BrowseToolbar | Expert-Links.net | SurfToolbar | RedCarpetRank | Web2Logistics | Ad-University | AdSchoolWorld |

Peer to Peer- P2P.

Research has found out that your iTunes playlist paints a picture of your inner soul. What about our link collection? MultiFinanceIT is built around a link collection collected over nearly 10 years. The site may be hacked in less than a minute with a site crawler.

"Freedom enables a man not only to do the good things but also to do the wrong things. But no moral value can be ascribed to an action, however good, that has been performed under the pressure of an omnipotent government." 
Ludwig von Mises

P2P is often associated with young people sharing files across global networks. It is also connected to spyware, ad, trojan horses and viruses. A lot of people are skeptical to file sharing. Some models are more secure and effective than others. But file sharing opens enormous opportunities for companies. Instead of attaching files and documents to E-mails, it is more effective to use a secure file sharing technology. It may also place a lower burden on the global network of computers. Think of a company, sharing big reports. The fast fractal algorithm is know as an effective algorithm to compress pictures and movies. If that algorithm is combined with effective and secure file sharing, you have an idea of what P2P is about. It is definitely for serious companies looking for the most cost effective technologies. As often, young people pave the way to the future.

If you have good enough programmers, that know enough about secure installation, encapsulation, cryptation and digital signature, you may be able to make software that is nearly impossible to copy. Privacy becomes so difficult and timeconsuming that it is not worth the time. A simple example:

  • Encrypted communication on download.
  • An encrypted key is installed on the client computer.
  • A radom generated code that can only be used n times pops up before the installation is complete.
  • The customer has to verify this code before finishing installation.
  • When that is done, the encrypted key is destroyed and the installation finishes.
  • Copying is now a problem of copying the executable version of the program. That may be difficult if it is combined with a secure installation, that is related to a digital signature / sertificat on the client computer.

Music may be recorded, so this is not about music. What is a copy? Windows was not a copy of the Mac OS and Excel was not a copy of Lotus. Reverse engineering is always possible, but it may be very time consuming. Is it criminal to make reverse engineering software?

Is it criminal to make guns and crowbars? A tunnel may be used to commit a break-in. File sharing systems may be used to download freeware and pirate copies. Period!

"I worry about my child and the Internet all the time, even though she's too young to have logged on yet. Here's what I worry about. I worry that 10 or 15 years from now, she will come to me and say 'Daddy, where were you when they took freedom of the press away from the Internet?'"
--Mike Godwin, Electronic Frontier Foundation.

Privacy Policy | Company | Contact Us | Use of this site | Site Map | Organization number 987 091 398 | QR-code | © 2004 - 2017 MultiFinansIT | All rights Reserved |