Retroshare User Guide Written for V0.5.5C

Total Page:16

File Type:pdf, Size:1020Kb

Retroshare User Guide Written for V0.5.5C RetroShare User Guide Written for v0.5.5c Installing RetroShare Create a new Identity (account) Using RetroShare for the first time Adding Friends Adding Shared Folders Chatting with Friends Using the News feed Tab Using the Friends Tab Using the File sharing Tab Using the Chat Lobbies Tab Using the Messages Tab Using the Channels Tab Using the Forums Tab Tips & Tricks (and Troubleshooting) Note: Windows and Mac users will see two extra options along the top that some Linux users will not: FeedReader and LinksCloud. Because the usage portion of the guide was created with a Linux version of RetroShare that did not have those plugins, this guide will not explain those sections. The Getting Started tab is a shortcut to features which are explained in this guide elsewhere, so will not be dealt with here. Installing RetroShare Note: This guide was made for installing on Windows. Other operating systems may be very similar, but you may see some things that are a little bit different. 1. The first dialog box upon opening the installation file allows you to choose the language you want to use to install the program. Note: You are not choosing the language RetroShare will run in, only the language you will use while you install it. It seems that once installed, RetroShare defaults to the language of the operating system. (This can be changed later if you want.) Current options: Catalan, German, English, Spanish, French, Polish, Turkish, Russian, and Chinese 2. You arrive at a standard “welcome to the setup” dialog. Click Next to continue. 3. Next you will see a license agreement. Click on the radio button next to “I accept the terms...”, then click next. If you feel like reading it, it basically says that the creators of the program want you to be free to use it and change it in any way you like, and are giving you a license that gives you as much freedom as possible. (This is a complete contrast to most software written by programmers of companies, who want to take away your freedom to share and change it.) (This next step may not apply to all operating systems.) 4. Now you are presented with two options: Standard installation, and Portable installation. A standard installation is tied to the computer you install it on. This is a good choice if you will not be using RetroShare on any other computer. A portable installation is designed so you can move the files later to another computer and continue to use the program with the same account. This is a good choice if you may change computers, or if you have more than one computer but only one computer is on the Internet at a time. The portable installation is a little more complicated to use, so unless you know what you're doing, you want to use the standard installation. Note: RetroShare is not like Skype; your account is connected to where you installed the program. If you know you want to use the same account on more than one computer, you will need the portable installation, and will need to move the files from computer to computer in order to make it work. Click on the radio button next to your choice and click Next when done. 5. In this step, you are given the choice of where the program's files will be installed to (destination folder). The default folder is perfectly fine; you don't need to change it unless you have a special reason to. Below the Destination Folder box, the dialog box lists the space required and the total space available on the computer. You probably have more than enough space. If you're trying to compare the two, remember that GB is about 1,000 times bigger than MB. Click Next to continue. 6. The dialog box here lets you select components to install. The program defaults to installing everything necessary, but there are a few things you may want to decide on. If you don't want shortcuts on your desktop, quick launch, or start menu, this is where you can choose to leave those out. Click on the + sign next to “Shortcut icons” and uncheck the box next to any shortcuts you don't want. By default, RetroShare will start when you start up your computer. If you don't want that to happen, uncheck the box next to “Auto Startup”. Click Install when you're ready. 7. The program will show a progress bar as it installs. When it's finished, it will say Completed. Click Next. 8. Now you're at the final dialog. By default, RetroShare is set to run as soon as you click Finish. You can uncheck that if you aren't ready to use the program yet. Click Finish when you're ready. Create a new Identity (account) This is how you create an account to use to connect with other people. Note: Your account is tied to the computer you installed it on, unless you chose a portable installation. 1. Upon opening RetroShare for the first time, you will see a dialog that says “Create a new Identity”. The dialog has five things that need to be dealt with. a) Name This is the name everyone else will see when they connect to you. This can be any name you want to use on RetroShare. Some people prefer to use their real name, since they will only be connecting with people who know who they really are. Because RetroShare is completely secure, this is safe. You will never connect to anyone you don't want to. You can also create a username that is not your real name if you prefer, but you will need to let people know that it's you if they're not used to you using that name. Note: You can use spaces, numbers, and symbols as well as letters in your name. Important Note: Although you only connect with your direct friends, anyone who is friends with one of your friends will be able to see your name if they look in the right place. This only works one layer deep, so whether you feel safe using your real name will depend on whether you trust your friends' judgment. b) Password This is the password you will use forever with your account. You cannot change this password after you create your account! Make sure you pick something that you can remember. You should also pick a strong password so that no one who uses your computer can guess it. Strong passwords contain a mixture of letters, numbers, and other symbols. It is recommended to keep a copy of the password in a safe place where no one will think to find it except you, just in case you forget it. If you do forget it, you will lose access to that account (and any messages you had stored there) and will have to create a new one. c) Password (check) Type the same password again. It will not let you continue if the passwords don't match, to make sure that you don't accidentally type a character incorrectly. d) Location This can be used to connect two computers with the same account. Using one account on two computers is complicated to set up, so you don't need to worry about that. Just type something that indicates which computer you are creating the account on. Examples: Home, Laptop, PC, ... e) Randomness This is the bar at the bottom that has been filling up with blue rectangles. (It appears on Linux as a green progress bar.) The randomness bar is a way to protect you from someone trying to hack into your account. To be sure it is as safe as possible, wiggle the mouse around until it gets to 100% before you move on. When you have finished all five parts, click Generate New Identity. Note: The dialog box says RetroShare uses PGP keys for identity management. This is a term for the type of security used to prevent hacking. Because PGP keys have a “private” key that no one else but you ever sees, and a “public” key that you only share with your friends, this means that no one can pretend to be you, or see anything you have saved in your program unless they are using your computer while the program is logged in. 2. Now the program will generate your identity (which is what RetroShare calls accounts). When it finishes, it will ask you to type in your password in order to log in for the first time. 3. You may see a dialog box that says “RetroShare has detected an unregistered plugin.” This is because they are still working on RetroShare and haven't finished some parts of it. This does not affect the safety of your account or keep the main parts of the program from working correctly. Just click Yes to “authorize” the plugin. (You may see more than one of these dialog boxes.) 4. Now RetroShare has started up! You will need to tell any firewall you use to allow access to RetroShare. For Windows users, Windows Firewall will likely default to only check the “Private networks” box, giving a warning that “Public networks” are risky. Because RetroShare is so safe in itself, you can use it on any network you like without any chance of someone seeing what you are doing, so check that box too. Using RetroShare for the first time Congratulations! You have successfully installed RetroShare and created your account.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • N2N: a Layer Two Peer-To-Peer VPN
    N2N: A Layer Two Peer-to-Peer VPN Luca Deri1, Richard Andrews2 ntop.org, Pisa, Italy1 Symstream Technologies, Melbourne, Australia2 {deri, andrews}@ntop.org Abstract. The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered by enormous and heterogeneous economic interests, it has become a constrained network severely enforcing client-server communication where addressing plans, packet routing, security policies and users’ reachability are almost entirely managed and limited by access providers. From the user’s perspective, the Internet is not an open transport system, but rather a telephony-like communication medium for content consumption. This paper describes the design and implementation of a new type of peer-to- peer virtual private network that can allow users to overcome some of these limitations. N2N users can create and manage their own secure and geographically distributed overlay network without the need for central administration, typical of most virtual private network systems. Keywords: Virtual private network, peer-to-peer, network overlay. 1. Motivation and Scope of Work Irony pervades many pages of history, and computing history is no exception. Once personal computing had won the market battle against mainframe-based computing, the commercial evolution of the Internet in the nineties stepped the computing world back to a substantially rigid client-server scheme. While it is true that the today’s Internet serves as a good transport system for supplying a plethora of data interchange services, virtually all of them are delivered by a client-server model, whether they are centralised or distributed, pay-per-use or virtually free [1].
    [Show full text]
  • A Generic Data Exchange System for F2F Networks
    The Retroshare project The GXS system Decentralize your app! A Generic Data Exchange System for F2F Networks Cyril Soler C.Soler The GXS System 03 Feb. 2018 1 / 19 The Retroshare project The GXS system Decentralize your app! Outline I Overview of Retroshare I The GXS system I Decentralize your app! C.Soler The GXS System 03 Feb. 2018 2 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows, (+ Android). C.Soler The GXS System 03 Feb. 2018 3 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows. C.Soler The GXS System 03 Feb. 2018 3 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows. C.Soler The GXS System 03 Feb. 2018 3 / 19 The Retroshare project The GXS system Decentralize your app! The Retroshare Project I Mesh computers using signed TLS over TCP/UDP/Tor/I2P; I anonymous end-to-end encrypted FT with swarming; I mail, IRC chat, forums, channels; I available on Mac OS, Linux, Windows.
    [Show full text]
  • What Is Ipswitch WS FTP Server?
    User Guide Contents CHAPTER 1 WS_FTP Server Overview What is Ipswitch WS_FTP Server? ........................................................................................................................... 1 System requirements .................................................................................................................................................. 1 How FTP works .............................................................................................................................................................. 2 How SSH works.............................................................................................................................................................. 3 Sending feedback......................................................................................................................................................... 3 CHAPTER 2 Learning about WS_FTP Server Manager Understanding the server architecture ................................................................................................................ 5 Understanding the relationship between listeners and hosts..................................................................... 6 Accessing the WS_FTP Server Manager ............................................................................................................... 7 Managing WS_FTP Server remotely.......................................................................................................... 7 Navigating the WS_FTP Server Manager ............................................................................................................
    [Show full text]
  • INSECURE-Mag-9.Pdf
    Another year is almost over and a plethora of information security problems are behind us. To let 2006 go out in style, we bring you a feature packed issue of (IN)SECURE. As the feature interview for this issue we had the pleasure of talking with Kurt Sauer, the CSO at Skype, one of the most well-known companies in the digital world. We’ll be back next year with many new ideas in the pipeline. Stay tuned for coverage from a few conferences including the RSA Conference in San Francisco and the Black Hat Briefings &Training in Amsterdam. If you’re attending, be sure to drop me an e-mail and we’ll grab a drink. We wish you a safe 2007! Mirko Zorz Chief Editor Visit the magazine website at www.insecuremag.com (IN)SECURE Magazine contacts Feedback and contributions: Mirko Zorz, Chief Editor - [email protected] Marketing: Berislav Kucan, Director of Marketing - [email protected] Distribution (IN)SECURE Magazine can be freely distributed in the form of the original, non modified PDF document. Distribution of modified versions of (IN)SECURE Magazine content is prohibited without the explicit permission from the editor. For reprinting information please send an email to [email protected] or send a fax to 1-866-420-2598. Copyright HNS Consulting Ltd. 2006. www.insecuremag.com New enterprise single sign-on authentication software DigitalPersona announced the latest version of its award-winning enterprise product, DigitalPersona Pro 4.0. The new and improved software delivers a complete, accurate and trusted fingerprint Enterprise Single Sign-On (ESSO) solution with more secure authentication, improved manageability and the broadest support available for the world’s leading biometrically-enabled notebooks including models from Lenovo, HP, Dell, and Toshiba.
    [Show full text]
  • Windows XP, Vista, 7 & 8
    Windows XP, Vista, 7 & 8 ExhibitView Version 5.0 Product Guide Please read this document carefully before using ExhibitView 5.0. This document introduces one to the rich features embedded in ExhibitView software. It also acts as a basic reference for someone to get started working on ExhibitView. ExhibitView is free to use for first 14 days. ExhibitView is EASY! FAST! INTUITIVE! Connect your projector. Launch ExhibitView. You are ready for GREAT Presentations. ExhibitView supports wide range of file formats Table of Contents Look for each section below and in order. Section: 1. What's New in ExhibitView 5.0 a. System Requirements b. Installation Requirements c. Overview of ExhibitView 5 d. Known compatibility issues 2. Live Online Training 3. Creating and Saving Projects 4. File Formats Supported 5. Main Interface, The ExhibitView Desktop a. SlideMaker b. Documents c. Images d. Audio/Video e. Web Pages 6. The Presentation Area a. The area you see b. The area the jury sees c. Present side by side or full screen d. Courtroom setup 7. The Tools in the Toolbar 8. Video Controls and Marking on Videos while playing 9. The SlideMaker 10. The Synchronized Video Deposition Viewer 11. Keyboard Shortcuts 12. Help and Contact Information Section 1. What is New in ExhibitView 5.0? The fresh new ExhibitView 5.0 now makes your favorite presentation management system even more powerful, fast and feature rich. The old screens have given to the new rich user interface. The icons are now even easier to locate and use. Navigation is a breeze. ExhibitView 5.0 makes learning fun and easy.
    [Show full text]
  • UI Developers' Guide - Installation
    UI Developers' Guide - Installation This section outlines the steps necessary to download, configure, build, and run the Ed-Fi Dashboard UI on a development machine. UI Developers' Guide The Ed-Fi Dashboards configuration described in this document has been tested with the following Contents software configuration: Read more about the UI Developers' Windows 8.1 Professional (64-bit) and Enterprise (64-bit); Windows 10 Professional (64-bit) Guide: and Enterprise (64-bit). Windows Server 2012 and Windows Server 2008 R2 (Windows Server 2008 releases before R2 are not supported). Internet Information Services (IIS) 8.0 and IIS 10.0. Microsoft SQL Server 2012 – with Service Pack 3 or higher (Standard Edition, Developer Edition, or Enterprise Edition. Note that Express Edition is not supported). Configure SQL Server with the following features: Database Engine Services (replication/text search not required). Management Tools (complete). Use the default instance (MSSQLSERVER). Choose Mixed Mode security (the application uses a SQL login). Specify a password for the sa account. In the “Specify SQL Server administrator” click on Add Current User. Visual Studio 2013 or 2015 (Professional Edition or higher). .NET Framework 4.5.2. Preparing a development environment to run the dashboards can be summarized as follows: Step 1. Download and Extract the Dashboard Source Code The Ed-Fi Dashboards source code is contained in one repository that can be downloaded using git clone or as a ZIP archive from the Ed-Fi Alliance source code repository in GitHub at https://github.com /Ed-Fi-Alliance/Ed-Fi-Dashboard. The links to the latest stable and development code versions are located in the section Getting Started - Downloading the Code.
    [Show full text]
  • Outlook Office 365 Search Training
    Outlook Office 365 Search Rylander Consulting www.RylanderConsulting.com [email protected] 425.445.0064 i Outlook Office 365 Search Table of Contents Searching in Outlook Office 365 ..................................................................................................................... 1 Begin a Search............................................................................................................................................ 2 Using the Search Tab ...................................................................................................................................... 4 Scope of Search ......................................................................................................................................... 4 Refine Search ............................................................................................................................................. 5 Search by From or Subject .................................................................................................................... 6 Search for E-mail with Attachments ..................................................................................................... 8 Search Options Group ................................................................................................................................ 9 Recent Searches .................................................................................................................................... 9 Search Tools .........................................................................................................................................
    [Show full text]
  • Escaping the Ossification Trap with Gnunet
    Escaping the Ossification Trap with GNUnet Christian Grothoff BFH & The GNU Project 25.1.2018 \We shape our tools, and thereafter our tools shape us". {John Culkin What can be done? I Democracies are slow ) Effective regulation of mega-corporations exists only under dictatorships Dictatorship or Corpocracy? Regulation? I Charles Stross (@34c4) warns: Companies are AIs that develop faster than the law I Julia Reda (@IGF) warns: Regulation of platforms paradoxically can give them more power Regulation? I Charles Stross (@34c4) warns: Companies are AIs that develop faster than the law I Julia Reda (@IGF) warns: Regulation of platforms paradoxically can give them more power I Democracies are slow ) Effective regulation of mega-corporations exists only under dictatorships Dictatorship or Corpocracy? Better Technology! Data protection! Decentralization! Self-Organization! Technological impact assessment!1 1Difficult, but better than design-by-buzzword! Technological impact assessment case-study: Name systems DNS/DNSSEC DNS Server Root Zone a.root-servers.net. www.example.com? a.gtld-servers.net.test E2D3C9.... DNSSEC Trust Anchor NS . S4LXnQiBS... 49AAC1... DS RRSIG www.example.com? Recursive DNS Server Stub www.example.com? Name .com Resolver Server NS a.gtld-servers.net.test a.gtld-servers.net. A 93.184.216.119 DS 3490A6.... RRSIG example.com. K0rp9n... RRSIG com. U/ZW6P3c... AD www.example.com? RRSIG A 93.184.216.119 example.com. K0rp9n... DNS Server example.com a.iana-servers.net. RAINS Authority Server Root Zone 44 ) com ZK ; :registry www.example.com?
    [Show full text]
  • Dictation Module Reference Manual
    Olympus Dictation Management System R6 Dictation Module Reference Manual Contents 1 INTRODUCTION···························································································· 8 1.1 Olympus Dictation Management System Outline ··········································9 1.1.1 System Configurations of ODMS R6························································· 10 1.1.2 Modules and Tools ················································································ 12 1.2 Licenses······························································································· 14 1.3 Devices Connectable to Dictation Module ·················································· 15 1.4 Supported File Formats ·········································································· 16 1.5 Dictation Module Capabilities··································································· 17 2 FUNDAMENTALS OF OLYMPUS DICTATION MANAGEMENT SYSTEM ······ 18 2.1 Dictation File Name and Author ID ··························································· 19 2.2 Process and Status ················································································ 20 2.3 How Folders Work·················································································· 22 2.3.1 Folder Descriptions ··············································································· 22 2.3.2 Folder Functions ··················································································· 23 2.4 Worktypes and Option Items ···································································
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 7,512,661 B1 Phillips (45) Date of Patent: Mar
    US007512661B1 (12) United States Patent (10) Patent No.: US 7,512,661 B1 Phillips (45) Date of Patent: Mar. 31, 2009 (54) MOUNTING EMAIL ADDRESSES IN A FILE 2008/0172468 A1* 7/2008 Almeida ..................... TO9,206 SYSTEM FOREIGN PATENT DOCUMENTS (75) Inventor: Anthony H. Phillips, Southampton (GB) JP 2000354146 12/2000 (73) Assignee: International Business Machines Corporation, Armonk, NY (US) OTHER PUBLICATIONS (*) Notice: Subject to any disclaimer, the term of this Gmailya 3 Drive f Shellell Extension, httphttp://www.viksoe.dk/gmail?; vKSoe.dk/gmali/; Nov.Nov 8, patent is extended or adjusted under 35 U.S.C. 154(b) by 0 days. * cited by examiner (21) Appl. No.: 12/059,023 Primary Examiner—Zarni Maung (74) Attorney, Agent, or Firm—Oppenheimer Wolff & (22) Filed: Mar. 31, 2008 Donnelly LLP (51) Int. Cl. (57) ABSTRACT G06F 5/16 (2006.01) GO6F 2/OO (2006.01) The present invention discloses a method for mounting email (52) U.S. Cl. ....................................... 709/206: 709/207 addresses in a file system by creating email virtual folders. (58) Field of Classification Search ................. 709/206, The email virtual folders are created through the use of shell 709/207,238, 245, 250 extensions in an operating system, and an email address is See application file for complete search history. associated with the email virtual folder. The email virtual folders are utilized by adding one or more files to the email (56) References Cited virtual folder. When the files are added to the email virtual folder, the files are sent to the email address(es) associated U.S.
    [Show full text]
  • Guide to Retroshare Tor Or I2P Routing Update Some Quick Notes To
    A Guide to Retroshare Tor or I2P routing Update Some quick notes to supplement the existing Help Guides for setting up Retroshare Regular and Hidden Nodes routed via Tor and/or I2P. Snapshot in this update 1) Point out the torrc exit node command is not needed for Regular and Hidden Node Retroshare Tor routing with torrc examples. 2) Steps, guides for setting up multiple Tor binary folders each using a different Socks Port for concurrent TorS applications to enable different specific listening ports, Tor proxys. 3) Guide for setting up a I2P 4/4a/5 client tunnel and need to turn off unused I2P default tunnels. Retroshare Regular nodes using the optional Tor proxy client does not need nor use any Tor Exit Nodes. Unless you are using the same Tor binary for applications which require a Exit Node to clearnet such as with a FeedReader RSS server or website, do not include Exit Node commands in your Tor torrc file. Retroshare Regular Node using the optional Tor Proxy client Working Torrc Example (adjust the file paths for your needs, system) # This file was generated by Tor; if you edit it, comments will not be preserved # The old torrc file was renamedm to torrc.orig.1 or similar, and Tor will ignore it DataDirectory /usr/local/etc/tor GeoIPFile /usr/local/etc/tor/geoip GeoIPv6File /usr/local/etc/tor/geoip6 SocksPort 9050 Retroshare Hidden nodes routed solely to and inside the Tor Network should not have any Exit Node commands in your Tor torrc file. Working example of a Retroshare Hidden node operating as a Tor Hidden Service torrc file # This file was generated by Tor; if you edit it, comments will not be preserved # The old torrc file was renamed to torrc.orig.1 or similar, and Tor will ignore it DataDirectory /usr/local/etc/tor GeoIPFile /usr/local/etc/tor/geoip GeoIPv6File /usr/local/etc/tor/geoip6i HiddenServiceDir /home/name/hideserv HiddenServicePort 11040 127.0.0.1:13080 SocksPort 9050 Running Multiple concurrentt applications routing each through the tor network as a Tor proxy client or as a Tor hidden service.
    [Show full text]