Insert chapter for proxy-solutions and their cipher capabilities.
authorUlrich <ulrich.poeschl@bmlv.gv.at>
Wed, 20 Nov 2013 15:55:12 +0000 (16:55 +0100)
committerUlrich <ulrich.poeschl@bmlv.gv.at>
Wed, 20 Nov 2013 15:55:12 +0000 (16:55 +0100)
src/.gitignore
src/practical_settings.tex

index 5fb7d16..da1aa5f 100644 (file)
@@ -4,3 +4,4 @@ applied-crypto-hardening.log
 applied-crypto-hardening.out
 applied-crypto-hardening.pdf
 applied-crypto-hardening.toc
+*.gummi
\ No newline at end of file
index 40fea09..182735a 100644 (file)
@@ -680,6 +680,12 @@ Adi?? }
 \subsubsection{XMPP / Jabber}
 \subsubsection{IRC}
 
+\subsection{Intercepting proxy solutions}
+\todo{write this!! }
+\input{proxy_solutions}
+
+
+
 %\subsection{Database Systems}
 %\subsubsection{MySQL}
 %