TITLE

Mnet

PUB. DATE
March 2007
SOURCE
Network Dictionary;2007, p314
SOURCE TYPE
Book
DOC. TYPE
Reference Entry
ABSTRACT
A definition of the term "Mnet" is presented. It refers to a free software and open source project run by hackers volunteering in the public interest and a distributed, peer-to-peer, file store. The most important features of Mnet, which is also considered an emergent network, will come from the interactions of nodes operated by autonomous people who do not coordinate with one another.
ACCESSION #
31667985

 

Related Articles

  • The Network Architecture Designed for an Adaptable IoT-based Smart Office Solution. FURDIK, Karol; LUKAC, Gabriel; SABOL, Tomas; KOSTELNIK, Peter // International Journal of Computer Networks & Communications Secu;Nov2013, Vol. 1 Issue 6, p216 

    The paper presents a prototype of the Smart Office system, which was developed as one of pilot applications of the FP7 EU project ELLIOT, http://www.elliot-project.eu. The described solution is based on the LinkSmart semantic middleware, http://sourceforge.net/projects/linksmart/, an open source...

  • eDonkey. Taylor, Nathan // Australian PC User;Oct2006, Vol. 18 Issue 10, p89 

    The article focuses on eDonkey2000 which was the original client for the network, with the open source eMule coming along much later. Although it invented the eDonkey/eMule network, eDonkey has moved away from the server-based style of eMule and now uses a network called Overnet by default,...

  • Free and Open-Source Software is not an Emerging Property but Rather the Result of Studied Design. Magrassi, Paolo // Proceedings of the International Conference on Intellectual Capi;2010, p285 

    Free and open source software (FOSS) is considered by many, along with Wikipedia, the proof of an ongoing paradigm shift from hierarchically-managed and market-driven production of knowledge to heterarchical, collaborative and commons-based production styles. In such perspective, it has become...

  • Estimating the Size of P2P Botnets. Tung-Ming Koo; Hung-Chang Chang; Wen-Chi Liao // International Journal of Advancements in Computing Technology;Jul2012, Vol. 4 Issue 12, p386 

    In recent years, botnets have become a threat to Internet security. Attackers can control a large number of computers to launch various types of attacks. Botnet size is vital to assessing the threat posed by botnets since a larger botnet poses a greater threat. This study proposes a method for...

  • Peer-to-Peer Enables Windows XP Swaps. Spangler, Todd // Interactive Week;11/12/2001, Vol. 8 Issue 44, pN.PAG 

    Deals with the availability of illegal copies of Microsoft Windows XP operating system and instructions on bypassing its copy-protection scheme, in peer-to-peer networks over the Internet. File that offer hacking tips; Product activation requirement of the Windows XP; Companies that have...

  • The Peer-to-Peer Piracy Prevention Act. Ardito, Stephanie C. // Information Today;Sep2002, Vol. 19 Issue 8, p18 

    Focuses on legislation to prevent piracy on peer-to-peer (P2P) computer networks. Proposal of an amendment to U.S. Copyright Law; Outlook for the limitation of the liability of copyright owners for protecting their works on P2P networks; Introduction of the bill by Rep. Howard L. Berman;...

  • Global snapshots.  // SC Magazine: For IT Security Professionals (UK Edition);Oct2007, p9 

    This section offers global news briefs on issues related to information security. The web site of the Bank of India has been attacked by hackers, leaving a malicious iframe distributing 30 types of malware on the homepage. A policeman in Japan has lost his job for leaking confidential...

  • Juxtapose.  // Network Dictionary;2007, p270 

    A dictionary entry for the term "Juxtapose" is presented. It refers to an Open Source peer-to-peer platform created by Sun Microsystems. This platform is defined as a set of XML-based protocols that allow any device connected to a network to exchange messages and collaborate in spite of the...

  • Defend Your Privacy and Manage Your Windows. Harac, Ian; Gralla, Preston; Larkin, Erik // PCWorld;Feb2010, Vol. 28 Issue 2, p65 

    The article reviews several open source application software, including PeerBlock, TrackerWatcher, and WindowSpace.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics