Vulnerability Development mailing list archives
Re: Rumor
From: Aj Effin ReznoR <aj () REZNOR COM>
Date: Thu, 26 Oct 2000 12:23:08 -0700
"Brvenik, Jason" wrote:
Has anyone looked at the stuff mentioned in this article. It says "token-based authentication" is used to ensure the validity of the files and will be used to distribute virus updates, firewall updates... www.zdnet.com/zdnn/stories/news/0,4586,2643266,00.html
Not bad, but interesting for more "secure" (still awaiting peer review) file sharing for personal and biz usage, Groove Networks, http://www.groove.net Of course, it lacks the toke-based blah blah blah, but a simple infrastructure can be implemented regardless. -aj.
Current thread:
- Rumor Brvenik, Jason (Oct 26)
- Re: Rumor Aj Effin ReznoR (Oct 27)