Pydle Documentation Release 0.9.2
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Users As Co-Designers of Software-Based Media: the Co-Construction of Internet Relay Chat
Users as Co-Designers of Software-Based Media: The Co-Construction of Internet Relay Chat Guillaume Latzko-Toth Université Laval AbsTrAcT While it has become commonplace to present users as co-creators or “produsers” of digital media, their participation is generally considered in terms of content production. The case of Internet Relay Chat (IRC) shows that users can be fully involved in the design process, a co-construction in the sense of Science and Technology Studies (STS): a collective, simultaneous, and mutual construction of actors and artifacts. A case study of the early de - velopment of two IRC networks sheds light on that process and shows that “ordinary users” managed to invite themselves as co-designers of the socio-technical device. The article con - cludes by suggesting that IRC openness to user agency is not an intrinsic property of software- based media and has more to do with its architecture and governance structure. Keywords Digital media; Communication technology; Co-construction; Design process; Ordinary user résumé Il est devenu banal de présenter l’usager comme cocréateur ou « produtilisateur » des médias numériques, mais sa participation est généralement envisagée comme une production de contenus. Le cas d’IRC (Internet Relay Chat) montre que les usagers des médias à support logiciel peuvent s’engager pleinement dans le processus de conception, une co-construction au sens des Science and Technology Studies : une construction collective, simultanée et mutuelle des acteurs et des artefacts. Une étude de cas portant sur le développement de deux réseaux IRC éclaire ce processus et montre que les « usagers ordinaires » sont parvenus à s’inviter comme co-concepteurs du dispositif. -
Instalación Y Administración De Servicios De Mensajería Instantánea, Noticias Y Listas De Distribución
Servicios de red e internet Instalación y administración de servicios de mensajería instantánea, noticias y listas de distribución Raquel Castellanos Crespo Instalación y administración de servicios de mensajería instantánea, noticias y listas de distribución Servicios de red e internet Raquel Castellanos Crespo INDICE 2 Servicios de red e internet | Instalación y administración de servicios de mensajería instantánea, noticias y listas de distribución Servicios de red e internet Raquel Castellanos Crespo Protocolos La mensajería instantánea (conocida también en inglés como IM) es una forma de comunicación en tiempo real entre dos o más personas basada en texto. El texto es enviado a través de dispositivos conectados a una red como Internet. La mensajería instantánea requiere el uso de un cliente de mensajería instantánea que realiza el servicio y se diferencia del correo electrónico en que las conversaciones se realizan en tiempo real. La mayoría de los servicios ofrecen el "aviso de presencia", indicando cuando el cliente de una persona en la lista de contactos se conecta o en qué estado se encuentra, si está disponible para tener una conversación. En los primeros programas de mensajería instantánea, cada letra era enviada según se escribía y así, las correcciones de las erratas también se veían en tiempo real. Esto daba a las conversaciones más la sensación de una conversación telefónica que un intercambio de texto. En los programas actuales, habitualmente, se envía cada frase de texto al terminarse de escribir. Además, en algunos, también se permite dejar mensajes aunque la otra parte no esté conectada al estilo de un contestador automático. Otra función que tienen muchos servicios es el envío de ficheros. -
PDF Completo, 1700K
Caracterizac¸ao˜ de um Processo de Software para Projetos de Software Livre Christian Robottom Reis [email protected] Orientac¸ao:˜ Profa. Dra. Renata Pontin de Mattos Fortes [email protected] Dissertac¸ao˜ apresentada ao Instituto de Cienciasˆ Matematicas´ e de Computac¸ao˜ da Universidade de Sao˜ Paulo para a obtenc¸ao˜ do t´ıtulo de Mestre em Cienciasˆ da Computac¸ao˜ e Matematica´ Computacional. Sao˜ Carlos, Sao˜ Paulo Fevereiro de 2003 ii Resumo Software Livre e´ software fornecido com codigo´ fonte, e que pode ser livremente usado, modifica- do e redistribu´ıdo. Projetos de Software Livre sao˜ organizac¸oes˜ virtuais formadas por indiv´ıduos que trabalham juntos no desenvolvimento de um software livre espec´ıfico. Estes indiv´ıduos trabalham geo- graficamente dispersos, utilizando ferramentas simples para coordenar e comunicar seu trabalho atraves´ da Internet. Este trabalho analisa esses projetos do ponto de vista de seu processo de software; em outras pala- vras, analisa as atividades que realizam para produzir, gerenciar e garantir a qualidade do seu software. Na parte inicial do trabalho e´ feita uma extensa revisao˜ bibliografica,´ comentando os principais traba- lhos na area,´ e sao˜ detalhadas as caracter´ısticas principais dos projetos de software livre. O conteudo´ principal deste trabalho resulta de dois anos de participac¸ao˜ ativa na comunidade, e de um levantamento realizado atraves´ de questionario,´ detalhando mais de quinhentos projetos diferentes. Sao˜ apresenta- das treze hipoteses´ experimentais, e os resultados do questionario´ sao˜ discutidos no contexto destas hipoteses.´ Dos projetos avaliados nesse levantamento, algumas caracter´ısticas comuns foram avaliadas. As equipes da grande maioria dos projetos sao˜ pequenas, tendo menos de cinco participantes. -
The Otherside Web-Based Collaborative Multimedia System
The Otherside Web-based Collaborative Multimedia System Ilias Anagnostopoulos University of Sheffield Sound Studios 34 Leavygreave Road S3 7RD, Sheffield United Kingdom I.Anagnostopoulos@sheffield.ac.uk Abstract that users can get involved to the extent of be- The Otherside is an advanced open-source multime- coming developers of the Otherside system. dia system, designed to run as a server application. It is essentially a sound synthesis system that al- lows for the creative collaboration of a number of 1.1.1 Computer Network Collaboration people or machines over computer networks. Un- like most similar attempts to create network-based audio applications, the Otherside does not require Computer Networks are nowadays dominating any specialized audio software or massive amounts the world through the internet. However, most of computer processing power. The audio processing of the well-established network applications are is done on the server side and directed to listeners very simple and are not particularly demand- using a simple Internet Radio protocol. Any listener ing in processing power and network bandwidth. can then choose to participate in the sound creation Digital Signal Processing is a complicated task process by using a simple web-browser-based chat- that only recently became a \household" appli- room, or by utilising their own advanced systems for network control. cation on personal computers. Careful planning and consideration is required to overcome some Keywords of the difficulties posed by computer networks Networks, Collaboration, Server, Streaming, OSC and their use by artistic collaboration systems. 1 Introduction One of these problems is that network con- nections and especially the internet often in- 1.1 Creative Collaboration volve extremely long distances between two The Otherside Server provides a platform for users, thus inevitably data can not be trans- the creative collaboration of any number of peo- ferred seamlessly. -
Ircxpro V1.2 Technical Manual
IRCXpro v1.2 Technical Manual SUMMARY This article describes how to configure your chat server, connecting to your server, securing your chat server, trouble shooting, Internet Relay Chat (IRC) commands, Extensions to the Internet Relay Chat Protocol (IRCX) commands and setting up a Java IRC client for your chat server and frequently ask questions. TABLE OF CONTENTS 1. Introducing IRCXpro Server ............................................................. 2 2. Configuring your chat server 2.1 Connection Monitor ............................................................... 3 2.2 General Settings ................................................................... 3 2.3 Client Rules ........................................................................... 4 2.4 Operators ............................................................................... 8 2.5 Operator Groups .................................................................... 9 2.6 Security ……………................................................................ 11 2.7 Advanced Security ................................................................. 12 2.8 Miscellaneous ........................................................................ 14 2.9 Port Scanner .......................................................................... 15 2.10 Version Checker .................................................................... 16 2.11 Filtering .................................................................................. 17 2.12 Channels ............................................................................... -
Analysis of Internet Relay Chat Usage by Ddos Zombies
Stéphane Racine - Analysis of Internet Relay Chat Usage by DDoS Zombies Master’s Thesis MA-2004-01 October 2003 - April 2004 - Tutor: Thomas Dübendorfer - Supervisor: Prof. Dr. Bernhard Plattner - 26.4.2004 Abstract This report gives an introduction to “Internet Relay Chat” (IRC), a popular chatting system, discusses the misuse of IRC to launch and control “Dis- tributed Denial-of-Service” (DDoS) attacks and finally proposes methods for detecting the preparation of such IRC-based DDoS attacks. This detection is based on the analysis of Cisco NetFlow data, in other words, recorded network traffic with highly reduced information content. Die hier vorliegende Dokumentation liefert eine Einfuhrung¨ in“Internet Relay Chat” (IRC), ein weit verbreitetes Chatsystem, bespricht einige der uber¨ IRC gesteuerten “Distributed Denial-of-Service”-Attacken (DDoS-Attacken) und schl¨agt schliesslich Methoden zur Fruherkennung¨ der Vorbereitung solcher IRC-basierten DDoS-Attacken vor. Wesentlich dabei ist, dass die Erkennung aufgrund von Cisco NetFlow Daten geschieht, also aufgezeichnetem Netz- werkverkehr mit sehr stark reduziertem Informationsgehalt. Preface During my studies I attended a lot of different and interesting courses, but the two ones which attracted my attention most were called “Communica- tion Networks” and “Practical IT Security”, both taught at the Computer Engineering and Networks Laboratory (TIK) of the ETH Zurich. Accordingly to my interests and the various possibilities for student the- ses I decided to write my thesis at TIK. In the context of the DDoSVax project [1] I focused my work on the “Analysis of Internet Relay Chat Usage by DDoS Zombies”. The following chapter-by-chapter text organisation gives a short overview over this Master’s Thesis documentation: • Chapter 1 introduces the topic, motivates the work and formulates the Master’s Thesis task. -
Academic Instant Messaging System Engenharia De Redes De
Academic Instant Messaging System Deploying Instant Messaging Over an Existing Session Initiation Protocol and LDAP Service Infrastructure Using the Message Session Relay Protocol João André Pereira Antunes Dissertação para obtenção do Grau de Mestre em Engenharia de Redes de Comunicação Júri Presidente: Prof. Doutor Rui Jorge Morais Tomaz Valadas Orientador: Prof. Doutor Fernando Mira da Silva Vogais: Prof. Doutor Paulo Jorge Pires Ferreira Outubro 2009 Acknowledgements I would like to thank the following people for helping me in one way or another, directly or not, during the timeframe of this thesis: Prof. Fernando Mira da Silva – making the theme of this work possible in the first place, for directions, valuable tips, review efforts, and pep talks. José Santos – for all of the availability to concede me the requested resources, but mostly for the talks that ultimately provided me some very helpful insights and ideas about the current service IT infrastructure and deployment of the IM service. André Brioso – for the helpful talk that gave me a valuable insight regarding the LDAP service infrastructure; All of the members of the open source Sip-Communicator community that helped me in one way or another. Special thanks to Emil Ivov – for all of the support and guidance regarding the feature enhancements that I developed for Sip-Communicator; for contributing to the notion that I have about open source; To Anthony Schmitt for his work and development of the first file transfer GUI for Sip-Communicator and his availability to give me the needed pointers on how to use it; To Lubomir Marinov and Yana Stamcheva for the new file transfer GUI and generic SLICK file transfer test; To all the people that make the Google summer of code possible. -
Implementation and Improvement of Features and Performance of IRC (Aim & Messenger) and Group Support System
© 2017 IJEDR | Volume 5, Issue 3 | ISSN: 2321-9939 Implementation and improvement of features and performance of IRC (aim & messenger) and group support system Sukhpreet Kaur, Er. Harpreet Kaur Research Scholar, Assistant Professor Department of Electronics and Communication Engg. Guru Gobind Singh College of Engg. & Technology Guru Kashi University, Talwandi Sabo, Bathinda, Punjab, India ________________________________________________________________________________________________________ Abstract: IRC (Internet Relay Chat) is a protocol used by people to communicate or deliver messages through networks. IRC offers services to users for real-time text messages through chat groups defined as virtual communities including people with same interests and hobbies. The communication provided by IRC is known as ‘Computer-Mediated Communication’ where people gathered at one place for conversations. IRC protocol enables its users or clients to connect to IRC servers providing a real-time interface for communicating with people at remote locations throughout the world. However, communication through IRC channels is not secure sometimes. Data security issue could occur while communicating using IRC protocol. Hence, data security is a major concern which needs to be considered to secure the information over IRC channels for hackers. This research focuses on the basic detail of IRC protocol, its architecture, environment, and features. The research is more focused on IRC system to improve its performance by implementing IRC application using new methodology and techniques. Index terms: IRC, IRC protocol, IRC Channels, Server Side, and Client Side ________________________________________________________________________________________________________ I. INTRODUCTION 1.1 IRC (Internet Relay Chat) Internet relay chat is an electronic chat protocol which uses the programs to the device the IRC rules. Internet relay chat is the most popular services on the web which enables numerous communication services to its users. -
INTERNET RELAY CHAT SERVICES FRAMEWORK: Gnuworld By
INTERNET RELAY CHAT SERVICES FRAMEWORK: GNUWorld By DANIEL ROBERT KARRELS A THESIS PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE UNIVERSITY OF FLORIDA 2003 Copyright 2003 by Daniel Karrels I dedicate this thesis to my parents. ACKNOWLEDGMENTS I thank my Mother and Father for their persevering support. Even through difficult times, and decisions with which they did not agree, they supported me in my endeavors. I thank Joseph N. Wilson for his excellent teaching and helping to spark my interest in computer science. I thank my graduate committee, Beverly A. Sanders and Richard E. Newman, for their support and feedback. Without their assistance, I would not have made it this far. iv TABLE OF CONTENTS Page ACKNOWLEDGMENTS ................................................................................................. iv LIST OF TABLES............................................................................................................ vii LIST OF FIGURES ......................................................................................................... viii ABSTRACT....................................................................................................................... ix 1 OVERVIEW OF INTERNET RELAY CHAT ............................................................1 History of Internet Relay Chat......................................................................................3 Organization of Thesis..................................................................................................4 -
While IRC Is Easy to Get Into and Many People Are Happy to Use It Without
< Day Day Up > • Table of Contents • Index • Reviews • Reader Reviews • Errata • Academic • Top Ten Tricks and Tips for New IRC Users IRC Hacks By Paul Mutton Publisher: O'Reilly Pub Date: July 2004 ISBN: 0-596-00687-X Pages: 432 While IRC is easy to get into and many people are happy to use it without being aware of what's happening under the hood, there are those who hunger for more knowledge, and this book is for them. IRC Hacks is a collection of tips and tools that cover just about everything needed to become a true IRC master, featuring contributions from some of the most renowned IRC hackers, many of whom collaborated on IRC, grouping together to form the channel #irchacks on the freenode IRC network (irc.freenode.net). < Day Day Up > < Day Day Up > • Table of Contents • Index • Reviews • Reader Reviews • Errata • Academic • Top Ten Tricks and Tips for New IRC Users IRC Hacks By Paul Mutton Publisher: O'Reilly Pub Date: July 2004 ISBN: 0-596-00687-X Pages: 432 Copyright Foreword Credits About the Author Contributors Acknowledgments Preface Why IRC Hacks? How to Use This Book How This Book Is Organized Conventions Used in this Book Using Code Examples How to Contact Us Got a Hack? Chapter 1. Connecting to IRC Introduction: Hacks #1-4 Hack 1. IRC from Windows Hack 2. IRC from Linux Hack 3. IRC from Mac OS X Hack 4. IRC with ChatZilla Chapter 2. Using IRC Introduction: Hacks #5-11 Hack 5. The IRC Model Hack 6. Common Terms, Abbreviations, and Phrases Hack 7. -
Code» Governance in IRC Channels 65 4.1 Principalchanneldesign
Code Governance «Code» as Regulation in a Self-governed Internet Application from a Computer Science Perspective vorgelegt von Diplom-Informatiker Kei Ishii von der Fakutät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurswissenschaften – Dr. Ing. – genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Bernd Mahr Berichter: Prof. Dr. Bernd Lutterbeck Berichter: Prof. Dr. Hans-Ulrich Heiß Tag der wissenschaftlichen Aussprache: 7. Juli 2005 Berlin 2005 D 83 Contents Main Hypotheses 15 Introduction 17 I Internet, Governance, and «Code» 21 1 Internet Governance and «Code» 23 1.1 InternetGovernance. .. .. .. .. .. .. .. .. 23 1.2 ”AndHowShallthe’NetBeGoverned”? . .. 23 1.3 Governance ................................... 25 1.4 «Code»asRegulationModality . .. 26 2 «Code» Governance: An Empirical Analysis 29 2.1 TheChoiceoftheObjectofAnalysis. .... 29 2.2 MainHypothesis ................................ 30 2.3 TwoModelsofRegulation . 30 2.3.1 ”Lex Informatica”: Key Aspects of a Regulation System ....... 31 2.3.2 TypesofRules ............................. 33 2.4 TechnicalNotesontheAnalysis . ... 34 II Empirical Analysis of the Internet Relay Chat 37 3 The Internet Relay Chat 39 3.1 TheFunctionalPerspective–UsingtheIRC . ...... 40 3.1.1 Ahypotheticaluserscenario . 40 3.1.1.1 Channels........................... 41 3.1.1.2 PrivateMessages . 42 3.1.1.3 CTCP(Client-to-ClientProtocol) . 43 3.1.1.4 IRCCommands ....................... 43 3 Contents 3.1.2 SizeandGrowthoftheIRC . 44 3.2 AConceptualViewoftheTechnologyofIRC . .... 46 3.2.1 ”Polity”:StructuralOverviewoftheIRC . .... 46 3.2.1.1 IRCServer.......................... 47 3.2.1.2 IRCClient.......................... 47 3.2.1.3 IRCUserBot ........................ 48 3.2.1.4 IRCService ......................... 49 3.2.1.5 IRCNetwork ........................ 50 3.2.2 ”Politics”:AProcessualViewoftheIRC . ... 52 3.2.2.1 TheClient-serverarchitecture . -
Modelo Para Dissertações E Teses
Universidade Federal de Pernambuco Centro de Informática Pós-Graduação em Ciência da Computação Daniel Araújo Melo ARCA – Alerts Root Cause Analysis Framework Dissertação de Mestrado Recife 2014 Universidade Federal de Pernambuco Centro de Informática Daniel Araújo Melo ARCA - Alerts Root Cause Analysis Framework This dissertation has been submitted to the Informat- ics Center of the Federal University of Pernambuco as a partial requirement to obtain the degree of Master in Computer Science. Orientador: Djamel F. H. Sadok Recife 2014 Catalogação na fonte Bibliotecária Jane Souto Maior, CRB4-571 M528a Melo, Daniel Araújo ARCA - Alerts root cause analysis framework / Daniel Araújo Melo. – Recife: O Autor, 2014. 122 f.: il., fig., tab. Orientador: Djamel Fawzi Hadj Sadok. Dissertação (Mestrado) – Universidade Federal de Pernam- buco. CIn, Ciência da computação, 2014. Inclui referências. 1. Redes de computadores. 2. Segurança da informação. I. Sadok, Djamel Fawzi Hadj (orientador). II. Título. 004.6 CDD (23. ed.) UFPE- MEI 2015-42 Daniel Araújo Melo ARCA - Alerts Root Cause Analysis Dissertação apresentada ao Programa de Pós-Graduação em Ciência da Computação da Universidade Federal de Pernambuco, como requisito parcial para a obtenção do tí- tulo de Mestre em Ciência da Computação. Aprovado em: 08/09/2014 BANCA EXAMINADORA __________________________________________ Prof. Dr. Stênio Flávio de Lacerda Fernandes Centro de Informática / UFPE __________________________________________ Prof. Dr. Arthur de Castro Callado Mestrado e Doutorado em Ciências da Computação / UFC ___________________________________________ Prof. Dr. Djamel Fawzi Hadj Sadok (Orientador) Centro de Informática / UFPE A minha família, esposa e filhos. Acknowledgments Initially, I would like to thank my family, especially my mother, Carmem Dolores, my wife Juliana, my son Enos Daniel and my grandmothers, Olga and Inez.