← Revision 1 as of 2004-07-07 18:12:01
Size: 226
Comment: Security?
|
← Revision 2 as of 2004-07-08 08:06:35 →
Size: 489
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 14: | Line 14: |
=== Implementations === ||Platforms||Company||Links||Notes|| || Windows 2000/XP[[BR]]Linux (2.4 kernel)[[BR]]FreeBSD 4.x/5.x[[BR]]Mac OS X 10.2/10.3 ||PorchDog Software || http://www.porchdogsoft.com/products/howl/ || Working to be totaly GPL|| |
Zeroconf
Technologies
Suggested Application
- IP address negotiation for tunnel interfaces
Pros/Cons
Potential man in the middle attack, etc.
Implementations
Platforms |
Company |
Links |
Notes |
|| Windows 2000/XPBRLinux (2.4 kernel)BRFreeBSD 4.x/5.xBRMac OS X 10.2/10.3 ||PorchDog Software || http://www.porchdogsoft.com/products/howl/ || Working to be totaly GPL||