Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
    predictive analytics risk management
    How Predictive Analytics Is Redefining Risk Management Across Industries
    7 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: WASTE Again!
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Big Data > Data Mining > WASTE Again!
Data Mining

WASTE Again!

Editor SDC
Editor SDC
3 Min Read
SHARE

If you are interested in cryptology, or would just like to pass messages securely without worrying too much (especially corporate messages, while on the road traveling, and using a public wireless network on the airports), you may try WASTE Again.

Contents
  • What is “WASTE again”?
  • Creating a mesh
  • What is “WASTE again”?
  • Creating a mesh

Note – We had blogged on the Tor Project much earlier and this is a step like that!

From the website-

What is “WASTE again”?

“WASTE again” enables you to create a decentralized and secure private mesh network using an unsecure network, such as the internet. Once the public encryption keys are exchanged, sending messages, creating groupchats and transferring files is easy and secure.

Creating a mesh

To create a mesh you need at least two computers with “WASTE again” installed. During installation, a unique pair of public and private keys for each computer is being generated…  

More Read

Big Data - Bruno Aziza
5 Steps To Winning with Analytics: Have a plan
3 Ways Big Data Is Changing Financial Institutions Forever
Catching Phishes
Package Update Roundup: Apr 2009
Bing Visual Search Beta

If you are interested in cryptology, or would just like to pass messages securely without worrying too much (especially corporate messages, while on the road traveling, and using a public wireless network on the airports), you may try WASTE Again.

Note – We had blogged on the Tor Project much earlier and this is a step like that!

From the website-

What is “WASTE again”?

“WASTE again” enables you to create a decentralized and secure private mesh network using an unsecure network, such as the internet. Once the public encryption keys are exchanged, sending messages, creating groupchats and transferring files is easy and secure.

Creating a mesh

To create a mesh you need at least two computers with “WASTE again” installed. During installation, a unique pair of public and private keys for each computer is being generated. Before the first connection can be established, you need to exchange these public keys. These keys enable “WASTE again” to authenticate every connection to other “WASTE again” clients.

After exchanging the keys, you simply type in the computers IP address to connect to. If that computer is located behind a firewall or a NAT-router, you have to create a portmap first to enable incoming connections.

and the features include-

 

image

Ajay- It is based on the same historical legacy of the PGP ( Pretty Good Privacy) project of the early 1990’s and offers up to 4096 bits of encryption. It offers a simple intuitive interface for a 4-step process in creating private and public key. Combine some John Le Carre novels tradecraft, one-touch keypads and residual creativity 🙂  and your network is securely assured from goodwill hunting.

The downloads are here-http://wasteagain.sourceforge.net/downloads.shtml

image

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

Edge Computing in IoT
Unique Capabilities of Edge Computing in IoT
Exclusive Internet of Things
Turning Geographic Data Into Competitive Advantage
The Rise of Location Intelligence: Turning Geographic Data Into Competitive Advantage
Big Data Exclusive
AI Recruitment Software Solution
The Best AI Recruitment Software Solution: Transforming Hiring with Smarter Tech
Artificial Intelligence Exclusive
real estate data
How Big Data Is Changes How We Buy and Sell Real Estate
Big Data Exclusive

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

Scenario Testing, Stress Testing and Decision Management

3 Min Read

New data streams expose world’s hidden history

4 Min Read

Who cares about your data?

5 Min Read

Students at the MIT Media Lab have developed a wearable…

1 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence
AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?