PeerGuardian P2P Firewall Privacy Defense

Author: mety Labels::

Conceal Your Identity from Spying Eyes

Download Peer Guardian from here

If you use bittorrents, eDonkey, WinMX, Gnutella, Limewire, or any other P2P network, then you are likely being scanned by investigators. In an effort to trap and prosecute people for abusing copyrighted movies and music, investigators often pose as P2P downloader's. While they themselves share and download copyrighted files, these "posers" also scan and log your IP (internet protocol) address. Your computer IP address then becomes ammunition for civil lawsuits, where you may be sued for copyright infringement.

These investigator "posers" are everywhere. Their efforts will sometimes result in wholesale lawsuits, where hundreds of downloader's are charged thousands of dollars in copyright fines. Investigating posers comprise up to 3% of all P2P downloader's

you may be sharing files with.

In this war over digital freedoms, there are a couple of options for concealing your identity from these prying eyes.

Concealment Option 1: You can install an anonymizing proxy network service, like Anonymizer.com, The Cloak, or A4. There is even a special anonymizer dedicated to P2P networking: Mute.

Concealment Option 2: You can install a masking software product, like Peer Guardian firewall. Using either a proxy or a masking solution, or both in conjunction, will help hide you from being tracked by investigators or anyone trying to observe your downloading habits. The concealment is not 100%, but it is as private as you can get as a public user of the Web.

How Peer Guardian Firewall works:

Note: while Peer Guardian does work with Windows XP, 2000, ME and 98, it does not yet work with Windows Vista. A Windows Vista version of PG will hopefully be available by mid-March of 2007.

Peer Guardian maintains a centralized database of all the common investigator entities: RIAA, MPAA, MediaForce, MediaDefender, BaySTP, Ranger, OverPeer, NetPD and others.

Peer Guardian monitors these investigators' IP addresses by using sophisticated tracking devices. The investigators' digital addresses are then compiled into a centralized "blacklist" that is updated hourly.

Peer Guardian then gives away free "firewall" software to users. This software constantly checks the centralized blacklist, and then blocks your IP address from being seen by those investigator IP addresses.

You install the free Peer Guardian firewall software on your PC, and it will deflect over 99% of the investigators away from your machine. You will be rendered effectively invisible to anyone on the Peer Guardian blacklist.

PeerGuardian firewall software is compatible with all the major file sharing applications, such as Kazaa, iMesh, LimeWire, eMule, Grokster, DC++, Shareaza, Azureus, BitLord, ABC, and others.

As part of the grassroots push to maintain Internet freedoms and anonymity, the Peer Guardian software designers have armed downloader's with a very powerful defense here.

Where you can get Peer Guardian Firewall Software:

Peer Guardian is manufactured by Phoenix Labs (formerly Meth Labs).

Try Peer Guardian for yourself, and see how thousands of Internet users are protecting their anonymity.

Important Technical and Legal Notes: no masking of your address is 100% foolproof. At the same time, remember that in any other country outside of Canada, downloading copyrighted movies and songs puts you at legal risk for copyright infringement prosecution. Hundreds of users in the USA and UK have been fined by the MPAA and RIAA for downloading files in the last three years. Only in Canada is P2P file sharing tolerated legally, and only then, under specific circumstances.

Furthermore, while the About Network does promote freedom of expression and the democratic use of the Internet, the About Network does not condone nor promote the illegal downloading of copyrighted files. If you are going to participate in P2P file sharing, please take the time to educate yourself about the legalities and consequences of such activity

3 comments |

What is 'MUTE' File Sharing?

Author: mety Labels::

MUTE is clearly superior to bit torrent downloading.

MUTE is an emerging P2P network with one important feature: MUTE conceals all of its users identities through virtual addressing, effectively building in the most anonymity of any P2P network in 2006. Especially for torrent downloaders, MUTE may be a good alternative means to share files.

MUTE is special by using a special technology based on the behavior of ants in colonies, MUTE allows large file downloading through the Internet, while still concealing the identities of its P2P users from each other (and from prying authorities' eyes).

MUTE files are not as plentiful as bittorrent files are at this time.

Additionally, it does take longer to establish connections, find files, and download them through MUTE...up to three or four days. But this seemingly sluggish nature is an inherent downside to the privacy model, because users are purposely separated by many layers of connections - no direct connections are made between downloader and uploader.

But as more P2P users learn to use the MUTE network with patience, and as word of the MUTE P2P network spreads, you can expect P2P users to migrate to this safer and more anonymous community. MUTE will become a better source of files during later 2006 and early 2007... you can bet on it.

Is MUTE better than torrent downloading?

Answer: In terms of speed and size, no...MUTE is 5 times slower. But in terms of anonymity,

0 comments |

What is "The Invisible Web"?

Author: mety Labels::

Many untrained users have the naive expectation that they can locate anything on the Net by using Google or Yahoo or Ask.com. No, as powerful as these search engines are, they do not index everything on the Internet. In fact, search engines index less than 10% of the entire Internet! That remaining 90% is called the "Invisible Web", or in other words, "The Cloaked Web" or "The Deep Web". This is the massive content that is beyond the capabilities of spider indexing.

To better visualize this concept, let's start with some size estimates from Google.com, Yahoo.com, Cyberatlas, and MIT. These stats are current to July 2006:

56 billion static web pages are publicly-available on the World Wide Web.

Another estimated 6 billion static pages are available within private intranet sites

200+ billion database-driven pages are available as dynamic database reports ("invisible web" pages)

Google.com indexes 9.75 billion web pages.

Google, considered by experts to be the best search database today, is capable of indexing only a fraction of this monstrous content! Even by using electronic spiders to read and catalog millions of web pages each week, Google current indexes only 9.75 billion web pages of the 200+ billion pages out there, or less than 4% of all available Internet content.

So if Google only catalogs 4% of the World Wide Web, and other search engines catalog even less, then where is the remaining 90%of web content hidden?

That's where the "Invisible Web" begins

The "Invisible Web" (aka "Deep Web" or "Cloaked Web") is content that is closed-off to search engines. To be specific: the Invisible Web is about 200+ billion web pages that are stored not as static web pages, but as on-demand database content. As of December 2005, robot spiders are not advanced enough to read these private databases. Only a human reader can see these "invisible pages" by directly visiting these sites and making direct database requests.

Technical terminlogy:

"Spider": an artifical intelligence program, or robot, that is sent out weekly to scour the public Internet and read millions of static web pages.

The spider reports back to its mother database with its results, and those results get collated into search engine catalogs for public use.

"Database-Driven Web Content": web pages that exist only temporarily, and are generated only when readers request answers from a large database. These temporary web pages are dynamic, usually cannot be bookmarked, and commonly have extremely long URL addresses. Examples of databased web content: Today's job postings in Honolulu, apartments available in Singapore, today's weather report for Dublin, flights available to Istanbul, stock quotes for the NYSE, houses for sale in Winnipeg, reviews on the movie "King Kong", leather jackets for sale on eBay, hard drives for sale at Best Buy, your current savings account balance. These temporary web pages, once displayed to the reader, cease to exist moments later. Minute-by-minute, these databased web pages are re-created to reflect updated information on the database.

"OK. So I think I understand this now. 'Invisible Web Pages' are really 'Dynamic Web Pages'. That's when a database builds me a temporary page to answer my database question! Neat! So how do I find these thousands of "Invisible Web" databases?

Finding and reading "Invisible Web" pages is not difficult nor prohibited, but it is time-consuming. Because Invisible Web ("Deep Web") content is very specialized and unique to a specific topic of changing content, you will need to search twice:

First: you need to use primary search engines (Google, Yahoo, MSN, A9, Vivisimo, Dogpile, Ask) to locate the database you want. Expect this to be at least 30 minutes of searching (e.g. search for "jobs in honolulu", "weather reports dublin", "houses for sale winnipeg", "hard drive sales at best buy")

Secondly: once you find the specific database you want, you then need to search within that database.

For example: you may find www.monster.com helpful for searching databased jobs in Honolulu. Perhaps you will read www.theweathernetwork.com to find your weather reports, or www.expedia.com to search for available flights. Note: expect this "invisible web" database searching to take hours; these databases overflow with interesting and useful content!

0 comments |

What Are The Good BitTorrent Software Packages?

Author: mety Labels::

The Most Popular BitTorrent P2P Software.

uTorrent

(Known as both "u-torrent" and "micro torrent", this is the most popular torrent tool today. uTorrent has all the functions a torrent downloader will ever need, and it only requires 1 MB of hard drive space and memory. uTorrent has all the downloading and seeding performance of its competitors, but with minimal impact to the rest of your computer's speed.)

There is some reports about a virus after using the uTorrent embedded search engine.

The virus was adware.ZQuest. As you should do with any software you install, please run your anti-virus scanner regularly. To specifically scan the uTorrent software, use Windows Explorer to locate the utorrent.exe file on your C drive (likely C:\program files\utorrent). Once you find utorrent.exe file, right-click it and launch your virus scanner. Gratefully, the vast majority of About readers have not had virus problems with uTorrent.

Azureus

(A Java language client; was considered "king" of the torrent programs until uTorrent software came along and took that crown away. As with uTorrent and any other software you install, ensure that you virus scan.)

ABC

(Another very popular Torrent client)

TurboBT

(Nice-looking GUI appearance with this package)

BitComet

(Good, it is very slow and it losing popularity to uTorrent and Azureus)

The Original BitTorrent Client

(no fancy GUI here, but it downloads quickly. Recommended for programmer types and Macintosh users)

0 comments |

How Does 'MUTE' File Sharing Work?"

Author: mety Labels::

A. MUTE downloading anonymity works because it routes its signals the same way a colony of ants routes its worker insects: by constantly shifting the most efficient path, but no single insect is ever responsible for choosing that path. This is called a "mesh" model of computer networking.

In the words of its creator, Jason C. Rohrer, a young, talented programmer from New York state, MUTE is a "secure, anonymous, distributed communications framework. Node-to-node connections are encrypted, and messages are routed using an ant-inspired algorithm."

An Ant-Inspired Algorithm?

Ants tend to travel in fairly straight lines between their nest and a source of food. These also happen to be the shortest, most efficient routes.

As they wander around, they mark their routes with pheromones.

When they find food, they grab a piece of it and follow the pheromone trail back home. As they make the subsequent trips down the food path, they repeatedly scent the trail. This attracts more ants to follow the new trail and abandon the old "inefficient" ones.

The collectively intelligent behavior of ants it mimicked by the MUTE network nodes. MUTE nodes don't use pheromone markers. Instead, they send messages to "learn" which routes are the most efficient.

When a new node joins the mesh, it creates and maintains the connection to the neighbor nodes. These nodes, in turn, maintain connections to their neighbors.

The new node broadcasts a "request" message to its neighbors. If they don't have what is requested, they pass the request to their neighbors, and so on.

MUTE File Sharing uses "response timeouts" to detect "inefficient" routes and improve routing performance. If a node times out waiting for a response from another node, it resends the message with a fresh route request.

There is much more to the technical side of MUTE than this short explanation covers. If you are a techie-oriented type, you may enjoy some quite fascinating details of MUTE's operation here:

http://mute-net.sourceforge.net/technicalDetails.shtml

0 comments |

Dalida -Serge Lama Greatest song Je Suis Malade

Author: mety Labels::

This is a great song by Dalida

It is a French song I don't listen to French song but I just found it on PC

I found the lyric for it both in French and English it a duet with anther French Singer his name is Serge Lama

The song name is "Je Suis Malade" this mean "I am ill
"in English

Download this song

Viwe the song vadio here

I hope you like it like I did


Je suis malade



Je ne rêve plus

Je ne fume plus

Je n'ai même plus d'histoire

Je suis seul sans toi

Je suis laid sans toi

Je suis comme un orphelin

Dans un dortoir.


Je n'ai plus envie

De vivre ma vie

Ma vie cesse quand tu pars

Je n'ai plus de vie

Et même mon lit

Se transforme en quai de gare


Quand tu t'en vas.


Je suis malade, complètement malade

Comme quand ma mère sortait le soir

Et qu'elle me laissait seul avec mon
désespoir

Je suis malade, parfaitement malade


T'arrives, on ne sait jamais quand

Tu r'pars, on ne sait jamais où


Et ça va faire bientôt deux ans que tu

t'en fous.


Comme à un rocher

Comme à un péché

Je suis accroché à toi


Je suis fatigué

Je suis épuisé

De faire semblant d'être heureux

Quand ils sont là.


Je bois toutes les nuits

Mais tous les whiskys

Pour moi ont le même goût


Et tous les bateaux

Portent ton drapeau


Je ne sais plus où aller

Tu es partout.


Je suis malade, complètement malade

Je verse mon sang dans ton corps

Et je suis comme un oiseau mort quand

Comment toi tu dors

Je suis malade, parfaitement malade


Tu m'as privé de tous mes chants

Tu m'as vidé de tous mes mots


Pourtant moi, j'avais du talent avant

ta peau.

Cet amour me tue

Si ça continue

Je crèverai seul avec moi


Et
moi Comme tu toi
Près de ma radio

Comme un gosse idiot

J'Ecoutant ma propre voix

Qui chantera


Je suis malade, complètement malade

Comme quand ma mère sortait le soir

Et qu'elle me laissait seul avec

mon désespoir

Je suis malade, c'est ça, je suis malade

Tu m'as privé de tous mes chants

Tu m'as vidé de tous mes mots

Et j'ai le cœur complètement malade

Cerné de barricades

T'entends

Je suis malade


I Am ill



I don't dream no more,

I don't smoke no more

I don't even carry a story no more

I am dirty without you,

I am ugly without you

I am like an orphan

in a dormitory


I don't feel like living

my life no more

My life stops when you leave

I don't have a life no more,

and my bed

Transforms into a train station


When you leave


I am ill, completely ill

Like when my mother use to go out at

Night Leaving me alone with my

despair

I am ill, perfectly ill


You come back, we never know when

You leave, we never know where


And it will soon be two years

That you absolutely don't care


Like to a rock,

Like to a sin

I hold on to you


I am tired,

I am jaded

I pretend that I am happy when they're there


I drink every night,

but all whiskies

every thing Taste the same


And all ships

wear your flag


I don't know where to go,

You are everywhere


I am ill, completely ill

I pour my blood in your body

And I'm like a dead bird when you sleep


How do you sleep

I am ill, perfectly ill


You deprived me of my songs

You emptied me of my words


However, I was talented before I met
your flesh

This love is killing me,

if it goes on

I'll die, alone with myself


And me also Holding onto my radio,

Like an idiotic kid

Listening to my own voice

singing


I am ill, completely ill

Like when my mother use to go out at

Night Leaving me alone with

my despair

I 'm ill, that's right, I am ill

You deprived me of my songs

You emptied me of my words

And my heart is completely ill

Surrounded by barricades,

do you hear

Me? I am ill

0 comments |

Labels

Powered by Blogger.

I made these pages for me and my friends to help solving the problem we face regarding Computer & internet, if anyone wants me to answer a question or find out about some information please send me email and I will try to reply.*P.S. some of the article I wrote and the other I found on the internet I posted them in sprit of learning and shearing, please forgive me if you found something you don’t want to be in my blog, email me and I will delete them. Thank you for your interest in my pages.امل نجم Amal Nagm

banner 1 banner 2