Re: Custom security Algorithms (General questions)
Thax for answering, I will look into Open VPN adapter.
What if it is used for non commercial use, Actually im doing a college project where i wanted to show it is possible to put in my own custom Crypto and compare it with Off the shelf solutions.
If you are giving source and we cant modify it , what can we do with the sources.
Complete thread:
- Custom security Algorithms - AlexDirk, 2010-04-01, 23:43
- Re: Custom security Algorithms - wodDamir, 2010-04-01, 23:56
- Re: Custom security Algorithms - AlexDirk, 2010-04-02, 07:46
- Re: Custom security Algorithms - wodDamir, 2010-04-02, 08:59
- Re: Custom security Algorithms - AlexDirk, 2010-04-02, 10:33
- Re: Custom security Algorithms - wodDamir, 2010-04-02, 13:05
- Re: Custom security Algorithms - AlexDirk, 2010-04-02, 13:57
- Re: Custom security Algorithms - wodDamir, 2010-04-02, 13:05
- Re: Custom security Algorithms - AlexDirk, 2010-04-02, 10:33
- Re: Custom security Algorithms - wodDamir, 2010-04-02, 08:59
- Re: Custom security Algorithms - AlexDirk, 2010-04-02, 07:46
- Re: Custom security Algorithms - wodDamir, 2010-04-01, 23:56