Solved

X.25 for Mac?

Posted on 1998-09-28
2
274 Views
Last Modified: 2013-12-27
Does there exist an implementation of the X.25 protocol stack for Mac OS and Open Transport?
0
Comment
Question by:davemak
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 5

Accepted Solution

by:
paulvaneykelen earned 100 total points
ID: 1541982
0
 

Author Comment

by:davemak
ID: 1541983
Technically, if my question were viewed as a "yes/no" question, then it was answered.  However, of the three links provided, one did not include any mention of X.25, and the other two were commercial packages with somewhat minimal X.25-related information online (other than mentioning it); neither of those links mention Open Transport, so I still don't know for sure if there is an Open Transport implementation of X.25 (in particular, one that is compatible with Mac OS 8).  Still, at least those are leads I can follow up on.  Thanks.
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The purpose of this Apple-hardware based article is to provide helpful information about an important component required of all Apple portable notebooks (Apple does not call them "Laptops" because they are too hot to sit on your lap), but is not o…
A lot of new and distinct gadgets are making their appearance every other day. The latest gadget that has wooed the attention of all gadget lovers and non gadget lovers alike is the Smartwatch. This tiny gadget is capable of offering live access to …
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question