Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: WASTE Again!
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Big Data > Data Mining > WASTE Again!
Data Mining

WASTE Again!

Editor SDC
Editor SDC
3 Min Read
SHARE

If you are interested in cryptology, or would just like to pass messages securely without worrying too much (especially corporate messages, while on the road traveling, and using a public wireless network on the airports), you may try WASTE Again.

Contents
  • What is “WASTE again”?
  • Creating a mesh
  • What is “WASTE again”?
  • Creating a mesh

Note – We had blogged on the Tor Project much earlier and this is a step like that!

From the website-

What is “WASTE again”?

“WASTE again” enables you to create a decentralized and secure private mesh network using an unsecure network, such as the internet. Once the public encryption keys are exchanged, sending messages, creating groupchats and transferring files is easy and secure.

Creating a mesh

To create a mesh you need at least two computers with “WASTE again” installed. During installation, a unique pair of public and private keys for each computer is being generated…  

More Read

4 Ways to Distribute Your Error Reports
Measuring and improving an effective and efficient warranty process
Predictive Analytics: 8 Things to Keep in Mind (Part 1)
Edith on GT : A BI solution for Advanced Data Mining
The CIO Diaries – Bridging the Gap to LBOs

If you are interested in cryptology, or would just like to pass messages securely without worrying too much (especially corporate messages, while on the road traveling, and using a public wireless network on the airports), you may try WASTE Again.

Note – We had blogged on the Tor Project much earlier and this is a step like that!

From the website-

What is “WASTE again”?

“WASTE again” enables you to create a decentralized and secure private mesh network using an unsecure network, such as the internet. Once the public encryption keys are exchanged, sending messages, creating groupchats and transferring files is easy and secure.

Creating a mesh

To create a mesh you need at least two computers with “WASTE again” installed. During installation, a unique pair of public and private keys for each computer is being generated. Before the first connection can be established, you need to exchange these public keys. These keys enable “WASTE again” to authenticate every connection to other “WASTE again” clients.

After exchanging the keys, you simply type in the computers IP address to connect to. If that computer is located behind a firewall or a NAT-router, you have to create a portmap first to enable incoming connections.

and the features include-

 

image

Ajay- It is based on the same historical legacy of the PGP ( Pretty Good Privacy) project of the early 1990’s and offers up to 4096 bits of encryption. It offers a simple intuitive interface for a 4-step process in creating private and public key. Combine some John Le Carre novels tradecraft, one-touch keypads and residual creativity 🙂  and your network is securely assured from goodwill hunting.

The downloads are here-http://wasteagain.sourceforge.net/downloads.shtml

image

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

protecting patient data
How to Protect Psychotherapy Data in a Digital Practice
Big Data Exclusive Security
data analytics
How Data Analytics Can Help You Construct A Financial Weather Map
Analytics Exclusive Infographic
AI use in payment methods
AI Shows How Payment Delays Disrupt Your Business
Artificial Intelligence Exclusive Infographic
financial analytics
Financial Analytics Shows The Hidden Cost Of Not Switching Systems
Analytics Exclusive Infographic

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

Data Visualization Techniques – For the Masses

2 Min Read
Image
Cloud ComputingCRMData MiningMarketingMarketing AutomationWeb Analytics

Know Your Numbers: The Dollar-Driven Guide to Holiday Emails

4 Min Read
Image
AnalyticsBig DataBusiness IntelligenceCloud ComputingData MiningITMarketingPredictive AnalyticsSentiment AnalyticsSocial DataSocial Media AnalyticsText AnalyticsUnstructured Data

How Big Data Will Change Marketing Forever

7 Min Read

On the Move: Surveying your Mobile User

4 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots
giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?