Feeds

Peek-A-Booty – The First Screenshots

Don't leave a bear behind

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk

CodeCon Judging from our mail, we know quite a few of you were tuned into the unveiling of the Peek-A-Booty app on Sunday via the DNA Lounge webcast.

But you probably won't have got too much detail from the transmission, so as promised, we can bring you the first screenshots of the censor-busting P2P proxy.

Bad Bear

Like the SETI application, Booty provides the most entertainment when in screensaver mode. It's actually a background process, so it doesn't need to wait for your PC to be idle before doing useful stuff: that's just when it's at its most informative to you.

nodeless

Here's the screensaver showing Peek-A-Booty operational but not connected to any other Booty nodes.

nodeless

Now you can see the user connected to three different machines: a "normal" peer, who's not behind a firewall; a user behind a NAT translation mangler, and a node which is behind a censor firewall. He's the duct-taped bear.

The Booty beta uses a web based configuration screen which you can see by clicking here. In the final versions, this will be replaced by an OS-native GUI configuration screen.

The idea is to make Peek-A-Booty "granny friendly", so the large contingent of gay bikers and fluffy sex fans that the Booty bear will attract will surely be a bonus. (Just kidding). Credit for the Booty bear goes to Joey deVilla, who describes himself as a "recovering cartoonist" and who with Paul Baranowski wrote the application.

To recap, the app needs both funding and coders, so apply via the official website®

Related Story

Censor-buster Peek-A-Booty goes public

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.