Network Programming With the Twisted Framework
In this final installment of his series on Twisted, the author looks at specialized protocols and servers contained in the Twisted package, with a focus on secure connections. One thing the servers and clients in Parts 1, 2, and 3 had in common is that they operated completely in the clear, cryptographically speaking. Sometimes, however, you want to keep your connection free from prying eyes (or from tampering/spoofing).
(Submitted by Anonymous Sun Sep 21, 2003 )
Our content can be syndicated: Main page Mac Page
Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author