Differences between revisions 2 and 3
Revision 2 as of 2004-07-08 08:06:35
Size: 489
Editor: TomHiggins
Comment:
Revision 3 as of 2004-07-08 08:06:50
Size: 487
Editor: TomHiggins
Comment:
Deletions are marked like this. Additions are marked like this.
Line 18: Line 18:
||
Windows 2000/XP[[BR]]Linux (2.4 kernel)[[BR]]FreeBSD 4.x/5.x[[BR]]Mac OS X 10.2/10.3 ||PorchDog Software || http://www.porchdogsoft.com/products/howl/ || Working to be totaly GPL||
||Windows 2000/XP[[BR]]Linux (2.4 kernel)[[BR]]FreeBSD 4.x/5.x[[BR]]Mac OS X 10.2/10.3 ||PorchDog Software || http://www.porchdogsoft.com/products/howl/ || Working to be totaly GPL||

Zeroconf

Technologies

Suggested Application

  • IP address negotiation for tunnel interfaces

Pros/Cons

Potential man in the middle attack, etc.

Implementations

Platforms

Company

Links

Notes

Windows 2000/XPBRLinux (2.4 kernel)BRFreeBSD 4.x/5.xBRMac OS X 10.2/10.3

PorchDog Software

http://www.porchdogsoft.com/products/howl/

Working to be totaly GPL


CategorySoftware

ZeroConf (last edited 2007-11-23 18:02:41 by localhost)