Network programming with the Twisted framework, Part 4

In this final installment of the series on Twisted, the author looks at specialized protocols and servers contained in the Twisted package, with a focus on secure connections. One thing the servers and clients in Parts 1,2 & 3 had in common is that they operated completely “in the clear”. Sometimes, however, you want to keep your connection free from prying eyes (or from tampering/spoofing).

One Response

  1. 2003-09-15 7:52 pm