Yahoo Web Search

Search results

  1. Nov 29, 2016 · Download Zebedee Secure Tunnel for free. Zebedee is a simple program to establish an encrypted, compressed "tunnel" for TCP/IP or UDP data transfer between two systems.

    • (3)
    • 695.85 MB
    • Security, Networking, Internet
    • Linux, Windows
  2. Zebedee Secure Tunnel ===== Zebedee is a simple program to establish an encrypted, compressed "tunnel" for TCP/IP or UDP traffic between two systems. This allows data from, for example, telnet, ftp and X sessions to be protected from snooping.

  3. DESCRIPTION. Zebedee is a simple program to establish an encrypted, compressed tunnel for TCP/IP or UDP traffic between two systems. This allows data from, for example, telnet, ftp and X sessions to be protected from snooping. You can also use compression, either with or without data encryption, to gain performance over low-bandwidth networks.

  4. DESCRIPTION. Zebedee is a simple program to establish an encrypted, compressedtunnel” for TCP/IP or UDP traffic between two systems. This allows data from, for example, telnet, ftp and X sessions to be protected from snooping. You can also use compression, either with or without data encryption, to gain performance over low-bandwidth networks.

  5. Zebedee Secure Tunnel ===== THIS IS THE LATEST DEVELOPMENT RELEASE. THE LATEST STABLE RELEASE IS 2.4.1. Zebedee is a simple program to establish an encrypted, compressed "tunnel" for TCP/IP or UDP traffic between two systems. This allows data from, for example, telnet, ftp and X sessions to be protected from snooping.

  6. This repository contains sources needed to build zebedee. About Zebedee is a simple program to establish an encrypted, compressed "tunnel" for TCP/IP or UDP data transfer between two systems.

  7. People also ask

  8. www.mirrorservice.org › zebedee › downloadZebedee: Download

    Sep 6, 2005 · The previous stable version of Zebedee (2.4.1) has been in use for well over two years. Version 2.4.1A contains a minor security fix for a possible “denial of service” attack as well as upgrading the versions of the libraries used.

  1. People also search for