summaryrefslogtreecommitdiff
path: root/security/zebedee/pkg/DESCR
diff options
context:
space:
mode:
authortaca <taca>2001-06-24 05:48:51 +0000
committertaca <taca>2001-06-24 05:48:51 +0000
commit58501fa7320008093da3596af77d53f0906f1a87 (patch)
tree5185c6a61fbbd1b769d41b63dd6fee8c69615da1 /security/zebedee/pkg/DESCR
parente7be45e6be02d6993e596a210ccd390e181383b3 (diff)
downloadpkgsrc-58501fa7320008093da3596af77d53f0906f1a87.tar.gz
Importing zebedee 2.2.2. Quoting from README.txt is here.
Zebedee Secure Tunnel ===================== Zebedee is a simple program to establish an encrypted, compressed "tunnel" for TCP/IP or UDP traffic between two systems. This allows data from, for example, telnet, ftp and X sessions to be protected from snooping. You can also use compression, either with or without data encryption, to gain performance over low-bandwidth networks. The main goals for Zebedee are to: * Provide client and server functionality under both UNIX and Windows 95/98/NT. * Be easy to install, use and maintain with little or no configuration required. * Have a small footprint, low wire protocol overhead and give significant traffic reduction by the use of compression. * Use only algorithms that are either unpatented or for which the patent has expired. * Be entirely free for commercial or non-commercial use and distributed under the term of the GNU General Public Licence (see LICENCE.txt for details). For further information on how to use Zebedee see the file zebedee.html in the distribution (or the manual page for zebedee(1) under UNIX -- it is basically the same text). Example configuration files are also provided.
Diffstat (limited to 'security/zebedee/pkg/DESCR')
-rw-r--r--security/zebedee/pkg/DESCR5
1 files changed, 5 insertions, 0 deletions
diff --git a/security/zebedee/pkg/DESCR b/security/zebedee/pkg/DESCR
new file mode 100644
index 00000000000..4a89606b856
--- /dev/null
+++ b/security/zebedee/pkg/DESCR
@@ -0,0 +1,5 @@
+Zebedee is a simple program to establish an encrypted, compressed
+"tunnel" for TCP/IP or UDP data transfer between two systems. This
+allows traffic such as telnet, ftp and X to be protected from snooping
+as well as potentially gaining performance over low-bandwidth networks
+from compression.