Differences between revisions 1 and 2
Revision 1 as of 2004-07-07 18:12:01
Size: 226
Editor: sub20-89
Comment: Security?
Revision 2 as of 2004-07-08 08:06:35
Size: 489
Editor: TomHiggins
Comment:
Deletions are marked like this. Additions are marked like this.
Line 14: Line 14:

=== Implementations ===

||Platforms||Company||Links||Notes||
||
Windows 2000/XP[[BR]]Linux (2.4 kernel)[[BR]]FreeBSD 4.x/5.x[[BR]]Mac OS X 10.2/10.3 ||PorchDog Software || http://www.porchdogsoft.com/products/howl/ || Working to be totaly GPL||

  

Zeroconf

Technologies

Suggested Application

  • IP address negotiation for tunnel interfaces

Pros/Cons

Potential man in the middle attack, etc.

Implementations

Platforms

Company

Links

Notes

|| Windows 2000/XPBRLinux (2.4 kernel)BRFreeBSD 4.x/5.xBRMac OS X 10.2/10.3 ||PorchDog Software || http://www.porchdogsoft.com/products/howl/ || Working to be totaly GPL||


CategorySoftware

ZeroConf (last edited 2007-11-23 18:02:41 by localhost)