Solved

Looking .NET's most developed application layer protocol

Posted on 2012-12-23
2
306 Views
Last Modified: 2013-01-01
I need to build a flexible .NET tool that pushes files over the WAN in an encrypted format. What application layer protocol (TLS, SSH, SSL...) is most developed in .NET? I plan on developing the code that sends and receives the files.
0
Comment
Question by:jdana
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 8

Accepted Solution

by:
JustAndrei earned 500 total points
ID: 38717526
What does the most developed mean?
It is quite simple to use System.Net.WebClient methods UploadData and UploadFile; the target URL should begin with https, what makes the connection secured.
0
 

Author Closing Comment

by:jdana
ID: 38734827
That'll work. Thanks.
0

Featured Post

Is Your DevOps Pipeline Leaking?

Is your CI/CD pipeline a hodge-podge of randomly connected tools? You’ve likely got a tool to fix one problem & then a different tool to fix another, resulting in a cluster of tools with overlapping functionality. Learn how to optimize your pipeline with Gartner's recommendations

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Error in Visual Project 10 49
Updating Printer Details in VB.Net 16 43
Background worker passing messagebox yes no 13 26
C# Web service insert into Oracle table 8 43
Exception Handling is in the core of any application that is able to dignify its name. In this article, I'll guide you through the process of writing a DRY (Don't Repeat Yourself) Exception Handling mechanism, using Aspect Oriented Programming.
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question