Differences between revisions 5 and 6
Revision 5 as of 2005-03-10 04:41:36
Size: 1963
Editor: 202
Comment:
Revision 6 as of 2005-03-10 05:16:08
Size: 1828
Editor: WikiMinion
Comment:
Deletions are marked like this. Additions are marked like this.
Line 21: Line 21:
HyipInvestment EgoldEcurrency GetRich MakeMoney MlmAndDownlines ForexTrading WorkFromHome HomeBusiness OnlineInvesting SafeInvestment

We've had discussions about using anonymity software on the nodes before. One of the major reasons for it is to protect the node owners liability (eg. if one of their users abuses the system they can't get in trouble for it). However since we also want to build a reliable and scalable solution it means we need a way of removing abusive patterns of use, as you can imagine this has the potential to get pretty tricky. One good solution is ExtrusionDetection (or Reverse IntrusionDetection), the big problem we have with that right now is that there's no central aggregation point where an ExtrusionDetection box could go and most of the leaf nodes are either commercial AccessPoints or old hardware like FreeGeek boxes, neither of which have enough CPU power to run something like snort.

Here's a list of some software that might be interesting.


[CategorySoftware]

AnonymitySoftware (last edited 2007-11-23 18:00:53 by localhost)