Lines 6-8
composition of several combined services. The HL is a friend-to-friend (F2F)
Link Here
|
6 |
network, which means building trusted communications. Due to this approach, |
6 |
network, which means building trusted communications. Due to this approach, |
7 |
members of the HL network can avoid spam in their direction, as well as possible |
7 |
members of the HL network can avoid spam in their direction, as well as possible |
8 |
attacks if vulnerabilities are found in the code. |
8 |
attacks if vulnerabilities are found in the code. |
|
|
9 |
|
10 |
List of applications: |
11 |
|
12 |
* Basic: |
13 |
- HLS :: anonymizes traffic using the QB-problem |
14 |
- HLC :: runs many HL services as one application |
15 |
- HLA :: adapts HL traffic to external environments |
16 |
* Applied: |
17 |
- HLM :: messenger with a web interface |
18 |
- HLF :: file sharing with a web interface |
19 |
- HLR :: executes remote access commands |
20 |
- HLP :: ping the node to check the online status |