Internet privacy
Data
System administration
Cryptography
Friend-to-friend
Peer-to-peer
High availability
Data redundancy
Information
Quality control
File sharing networks