Perfect Dark (P2P) easy download and file sharing

Perfect Dark is a peer-to-peer (P2P) from Japan, which was released in 2006. It supports Japanese and English language for easy download and exchange. files and documents.perfect dark

The Perfect Dark application came from its predecessors, Share (P2P) and Winny (P2P), η οποίες απαιτούσαν μικρότερο εύρος ζώνης δικτύου και χώρο στο σκληρό δίσκο. Η εφαρμογή έχει το δικό της ιδιωτικό δίκτυο με το όνομα "unity", διαθέτει ένα ισχυρό εργαλείο αναζήτησης για να υπάρχει βέλτιστη ανταλλαγή αρχείων και παρέχει πίνακα ανακοινώσεων όπου οι χρήστες μπορούν να συζητήσου ή να ανταλλάξουν αρχεία. Επιπλέον προσφέρει Κοινοτική Tech Support για τους προχωρημένους χρήστες και προγραμματιστές. Οι χρήστες μπορούν επίσης να μοιραστούν ένα μέγεθος των αρχείων που έχουν αποσταλεί, για περαιτέρω ενίσχυση της λήψης άλλων χρηστών της κοινότητας.Η εφαρμογή Perfect Dark εξακολουθεί να αναπτύσσεται μέχρι και σήμερα.

Other key features of the application Perfect Dark include the following:
Use of hash tables for maximum security on large P2P networks.
Protecting users by changing the IP address, where it allows users to share and download large number of files without .
Key Table and Hash Tab distribution, which make up the entire application network and use a complex algorithm, ensure shots and shipment.
Users can use logical operators like AND, NOT and OR to help filter the files to be sent or received.

DKT + DHT + DU

The creator applies an architecture called DKT + DHT + DU when designing the network. These three parts compose the entire network.

 

DKT + DHT + DU
"DKT" Distributed Keyword Table (Διανομή Πίνακα Λέξεων-Κλειδιών).
"DHT" for Distributed Hash Table (Διανομή Πίνακα Κατακερματισμού).
"DU" for distributed Unity. (Διανομή Ενότητας).

"DKT" είναι κυρίως για την παροχή αποτελεσματικής αναζήτηση αρχείων, ενώ η "DHT" και η "DU" χρησιμοποιείται για την αποτελεσματική κοινή χρήση αρχείων και την ενίσχυση της ανωνυμίας.

Network Bandwidth Requirements

The minimum shipping speed is 100 KB / sec. If the user does not configure the Perfect Dark application with the appropriate settings or if he is unable to support the necessary settings, download rates will be limited so that priority will be given to other users. This is intended to increase the Perfect Dark network retention rate.

Require disk space

It requires at least 40 GB hard disk space, where a huge Hash table is stored, which is used as storage and distribution of files.

File System Requirements

The application requires the NTFS file system instead of FAT32, because FAT32 is limited in file size to 4 GB, while the application supports downloading files up to 32 GB.

Specifications

Search files: Search υ

Η «Αναζήτηση δέντρου" προσφέρει ισχυρή αναζήτηση. Επιπλέον, η χρήση του AND, OR και NOT τελεστών Boolean βοηθά στην απομάκρυνση ανεπιθύμητων αποτελεσμάτων.

Stream text

Η εφαρμογή περιλαμβάνει ένα μοναδικό χαρακτηριστικό που ονομάζεται "flow"("ροή"): Είναι ένα παράθυρο, όπου το κείμενο που έγραψε ένας από τους χρήστες εμφανίζεται με κατακόρυφη κύλιση. Κάθε χρήστης μπορεί να γράψει ένα μικρό μήνυμα (μερικές γραμμές και στήλες), και θα εμφανίζεται στους άλλους χρήστες χρησιμοποιώντας τη δυνατότητα ροής.

Automatic update

From version 1.02 the application Perfect Dark has the ability to be updated automatically through its own network.

Message boards

Perfect Dark has a simple message board. These tables are distributed over the network. Their design is rudimentary. Japanese language must be used to search within the tables.

Safety

The overall structure of the Perfect Dark network is broadly similar to its recent versions freenet, only using a larger partition table. Anonymity is based on a mixnet where file traffic is transmitted according to specific probabilities, and is stored or transferred to encrypted blocks while the keys are distributed separately.

The application uses RSA (1024-bit) and AES (128-bit) to encrypt data transmitted between peers and the keys are temporarily stored for higher performance.

Published files and scoreboards (including auto-updates) are usually signed with 160-bit ECDSA signatures. Automatic software updates are also protected with 2048-bit RSA signatures.

Creators believe that because of the program's code, potential attacks on security and anonymity are likely, as "opportunists" and wasteful files that degrade the network. However, the authors have stated the idea of ​​using open source in the future to solve the above problems.

2010, the Japanese security company NetAgent, claimed to have created software capable of decrypting encrypted information, such as the file name, the IP address of the original computer that uploaded the file, and other details.

filefacts.com/perfect-dark-info

Note
Article by Adem Theodor and Moustakas Alexandros at wikibooks.org

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).