Wikipedia:VP2

From Wikipedia, the free encyclopedia

This page is about the VP2 client application. For information on vpbot, see Wikipedia:VP2/vpbot.
VandalProof 2 Forums

HomeRegisterHelp

Current status: Down
Last updated by: 1568 23:20, 31 March 2007 (UTC) Update
In order to use VP2 at present, you must be able to use IRC and be an approved VP2 user. Visit #vandalproof to seek approval from one of the moderators.

Discussion
post | watch

To discuss the tool and seek help in using it.

Report a Bug
post | watch

To report bugs with the software.

Request a Feature
post | watch

To make suggestions to improve the tool.

Report Abuse
post | watch

To notify moderators of abuse of this tool.

VandalProof 2
Developer: Daniel Cannon
Preview release: 2.01 / 10 Aug 2006
OS: Windows 98 or Above
Platform: VB6
Use: Wikipedia Tools
License: GPL
Website:

VP2 is a Windows-based application developed for the English language Wikipedia that will allow users to participate in the coordinated reviewing of edits.


For more information check out the official vandalproof channel #vandalproof on the freenode network.

Contents

[edit] How it works

The VP2 application is, in essence, an IRC client. It will allow users to connect to channels on the freenode network where they will be able to interact with vpbot, an IRC bot that manages a pool of edits and assigns them to users for review.

After connecting to the network, users will be asked to select the kinds of edits they wish to review, with options to hide edits by administrators, whitelisted users, named users, and/or anonymous users. After selecting their settings, the client will then begin loading edits for review, with the available options to mark the edit as "Not Vandalism" or to revert and warn, much as earlier versions of VandalProof worked.

[edit] Download

Before you can begin using VP2, you will have to be added to vpbot's list of approved users (this is separate from the list of VP users). As VP2 is currently only in a beta phase, only a few select users will be given access. To request access, please join #vandalproof and ask someone with list moderator access to add you. When an entry for you is created, you will be randomly assigned a password and ID number which will be needed to gain access to the bot. This information can either be emailed to you, or sent to you via IRC. Please tell a moderator how you wish to receive your identification information. Currently, the only users with list moderator access are: AmiDaniel (User:AmiDaniel), crazynas (User:Crazynas), Eagle_101 (User:Eagle_101), mboverload (User:Mboverload), Sagacious (User:Sagaciousuk), xyr (User:Xyrael), Betacommand (User:Betacommand) and Glen_S (User:Glen_S).

Once you have your password, you can then download the most recent beta release (v2.0.1) of the client application from VP201.exe. No setup is available currently, though it will be soon, so if you have problems running the executable, please be patient. If you get an error which requires a file called mswinsck.ocx, you can download it from here.

[edit] Version History

Version Date Description Download
2.0.1 10 Aug 06 Minor bug fix, whereby warnings were being posted incorrectly. VP201.exe
2.0.0 07 Aug 06 Initial beta release. Suprisingly stable, though not without its bugs. There's a lot of work left to be done! VandalProof2.exe

[edit] Getting the Sources

Source code will likely be made available within the next couple of weeks. Please be sure that you understand the terms and conditions of the General Public License before downloading and/or modifying the VP2 client's source code.

[edit] License

This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 2 of the License, or any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY, without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.