Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    image fx (67)
    Improving LinkedIn Ad Strategies with Data Analytics
    9 Min Read
    big data and remote work
    Data Helps Speech-Language Pathologists Deliver Better Results
    6 Min Read
    data driven insights
    How Data-Driven Insights Are Addressing Gaps in Patient Communication and Equity
    8 Min Read
    pexels pavel danilyuk 8112119
    Data Analytics Is Revolutionizing Medical Credentialing
    8 Min Read
    data and seo
    Maximize SEO Success with Powerful Data Analytics Insights
    8 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: WASTE Again!
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Big Data > Data Mining > WASTE Again!
Data Mining

WASTE Again!

Editor SDC
Editor SDC
3 Min Read
SHARE

If you are interested in cryptology, or would just like to pass messages securely without worrying too much (especially corporate messages, while on the road traveling, and using a public wireless network on the airports), you may try WASTE Again.

Contents
What is “WASTE again”?Creating a meshWhat is “WASTE again”?Creating a mesh

Note – We had blogged on the Tor Project much earlier and this is a step like that!

From the website-

What is “WASTE again”?

“WASTE again” enables you to create a decentralized and secure private mesh network using an unsecure network, such as the internet. Once the public encryption keys are exchanged, sending messages, creating groupchats and transferring files is easy and secure.

Creating a mesh

To create a mesh you need at least two computers with “WASTE again” installed. During installation, a unique pair of public and private keys for each computer is being generated…  

More Read

Memo to Steve Ballmer: Just Ask Them!
IBM and ILOG – What Else?
Do Social Media Monitoring Tools Provide True Intelligence?
Cyber Summit 2012: Big Data, Small Presentations and Rock and Roll
Some thoughts after attending Predictive Analytics World

If you are interested in cryptology, or would just like to pass messages securely without worrying too much (especially corporate messages, while on the road traveling, and using a public wireless network on the airports), you may try WASTE Again.

Note – We had blogged on the Tor Project much earlier and this is a step like that!

From the website-

What is “WASTE again”?

“WASTE again” enables you to create a decentralized and secure private mesh network using an unsecure network, such as the internet. Once the public encryption keys are exchanged, sending messages, creating groupchats and transferring files is easy and secure.

Creating a mesh

To create a mesh you need at least two computers with “WASTE again” installed. During installation, a unique pair of public and private keys for each computer is being generated. Before the first connection can be established, you need to exchange these public keys. These keys enable “WASTE again” to authenticate every connection to other “WASTE again” clients.

After exchanging the keys, you simply type in the computers IP address to connect to. If that computer is located behind a firewall or a NAT-router, you have to create a portmap first to enable incoming connections.

and the features include-

 

image

Ajay- It is based on the same historical legacy of the PGP ( Pretty Good Privacy) project of the early 1990’s and offers up to 4096 bits of encryption. It offers a simple intuitive interface for a 4-step process in creating private and public key. Combine some John Le Carre novels tradecraft, one-touch keypads and residual creativity 🙂  and your network is securely assured from goodwill hunting.

The downloads are here-http://wasteagain.sourceforge.net/downloads.shtml

image

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

image fx (2)
Monitoring Data Without Turning into Big Brother
Big Data Exclusive
image fx (71)
The Power of AI for Personalization in Email
Artificial Intelligence Exclusive Marketing
image fx (67)
Improving LinkedIn Ad Strategies with Data Analytics
Analytics Big Data Exclusive Software
big data and remote work
Data Helps Speech-Language Pathologists Deliver Better Results
Analytics Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

Standardizing Data Migration

4 Min Read
Image
AnalyticsBig DataData ManagementData MiningData QualityData WarehousingExclusiveHadoopPredictive Analytics

The Driving Force Behind Big Data: Data Connectivity

8 Min Read

Starting Your Business: Data From the Ground Up

4 Min Read

IBM Podcast: Retailers Respond to Economic and Consumer…

0 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive
data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?