Search results
Nov 29, 2016 · Download Zebedee Secure Tunnel for free. Zebedee is a simple program to establish an encrypted, compressed "tunnel" for TCP/IP or UDP data transfer between two systems.
- (3)
- 695.85 MB
- Security, Networking, Internet
- Linux, Windows
Zebedee Secure Tunnel ===== Zebedee is a simple program to establish an encrypted, compressed "tunnel" for TCP/IP or UDP traffic between two systems. This allows data from, for example, telnet, ftp and X sessions to be protected from snooping.
DESCRIPTION. Zebedee is a simple program to establish an encrypted, compressed tunnel for TCP/IP or UDP traffic between two systems. This allows data from, for example, telnet, ftp and X sessions to be protected from snooping. You can also use compression, either with or without data encryption, to gain performance over low-bandwidth networks.
DESCRIPTION. Zebedee is a simple program to establish an encrypted, compressed “tunnel” for TCP/IP or UDP traffic between two systems. This allows data from, for example, telnet, ftp and X sessions to be protected from snooping. You can also use compression, either with or without data encryption, to gain performance over low-bandwidth networks.
Zebedee Secure Tunnel ===== THIS IS THE LATEST DEVELOPMENT RELEASE. THE LATEST STABLE RELEASE IS 2.4.1. Zebedee is a simple program to establish an encrypted, compressed "tunnel" for TCP/IP or UDP traffic between two systems. This allows data from, for example, telnet, ftp and X sessions to be protected from snooping.
This repository contains sources needed to build zebedee. About Zebedee is a simple program to establish an encrypted, compressed "tunnel" for TCP/IP or UDP data transfer between two systems.
People also ask
What is Zebedee secure tunnel?
Can Zebedee tunnel data traffic?
How long does a Zebedee tunnel take?
Can Zebedee handle connectionless UDP data?
Sep 6, 2005 · The previous stable version of Zebedee (2.4.1) has been in use for well over two years. Version 2.4.1A contains a minor security fix for a possible “denial of service” attack as well as upgrading the versions of the libraries used.