Ali.as

Ali.as Blog

VikingVPN

1. No. We are not able to connect a person to an Internet Protocol address and operate a zero-knowledge system.

2. Usa says, they do not have information preservation regulations, despite their security applications that are draconian. The single advice we discuss with anybody is currently charging information. This is anonymized by utilizing a prepaid card that is anonymous. If requested to discuss unique data about our customers as well as their customs, we’d not be able to achieve this, because we do not have some logs of the information.

3. That’s information that is largely private. But, we are able to ensure our customers that signing is not used by us to accomplish that aim.

4. In case of a notice, the DMCA plan printed on our site is sent out by us. We haven’t however obtained a notice that was legitimate.

5. We exhaust our customers to be protected by all legal alternatives. A failure that, we might supply our logs all, which don’t really exist. We’ve got a passively activated guarantee Canary if needed to wiretap a person under a national-security notice. We’d additionally probably pick to shut our support down and set it up else where.

6. Yes. These locations are not closed, and which don’t have any information limits.

7. Which now only consider bank cards. Our transaction supplier is a lot more prohibitive than we ever thought they’d be. We are nevertheless attempting to modify transaction suppliers. Luckily, through the use of a credit card that is prepaid, it is still possible to have support that is completely anonymous from which.

8. A solid hand-shake (both RSA- a nonstandard elliptic curve as the curves are funny or 4096). A powerful cipher such as AES256- AES-256 or CBC -GCM security (maybe not EDE setting). At least SHA1 for information integrity assessments. The recently acquired SHA3 as well as sHA2 (Skein) hash capabilities can also be slower, although great and provide no actual additional assurances of information integrity, and offer no additional safety. The process to solidify against Guy-in-the- Guy and Center – strikes that are on the Side.

 


Perl Development Journal

Or just search in Google/Bing for "Ali.as" (lol)


The CPAN Top 100

What is that? One of the few rankings in the world you probably will not want be at the #1...


This page is also a repository for SVN, CPAN modules, outdated modules and the place for other developers who don`t want to bother with their own sites.

Worked together with 100+ authors, 500+ modules and the number is still growing.


JSAN

The JavaScript Archive Network is an awesome resource for Open Source JavaScript software & libraries.

The old website has been moved to openjsan.org which is now live!


Squid

Using the Squid cache as a reverse proxy can save traffic and bandwidth and increase the speed of your web server enormously.


Content copyright 2002 Ali.as
All rights reserved.