Definitions
Sorry, no definitions found. You may find more data at stunnel.
Etymologies
Sorry, no etymologies found.
Support

Help support Wordnik (and make this page ad-free) by adopting the word Stunnel.
Examples
-
Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. ie678-exec. txt
Hack In The Box 2010
-
Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows.
Hack In The Box 2010
-
Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows.
Hack In The Box 2010
-
Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. ie678-exec. txt
Hack In The Box 2010
-
Stunnel can be used to add SSL functionality to commonly used inetd daemons like POP3, POP2 and IMAP servers without any changes in the programs 'code.
-
Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. ie678-exec. txt
Hack In The Box 2010
-
Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows.
Hack In The Box 2010
-
The Stunnel application was designed to work as an SSL encryption wrapper between remote client and local (inetd-startable) or remote server.
Softpedia - Windows - All Softpedia Windows 2010
-
Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. ie678-exec. txt
Hack In The Box 2010
-
Stunnel uses OpenSSL or SSLeay libraries for cryptography, so it supports whatever cryptographic algorithms you compiled into your library.
Comments
Log in or sign up to get involved in the conversation. It's quick and easy.