3.77. Telestream .......................................................................................... 91
3.78. Teltel .................................................................................................. 91
3.79. TuneIn ................................................................................................ 91
3.80. TVAnts Protocol ................................................................................... 92
3.81. TVU Network Player .............................................................................. 92
3.82. UUSee Protocol .................................................................................... 92
3.83. WebEx ................................................................................................ 93
3.84. VeohTV ............................................................................................... 93
3.85. VEVO .................................................................................................. 93
3.86. Viaplay ............................................................................................... 94
3.87. Viber .................................................................................................. 94
3.88. Viewster .............................................................................................. 95
3.89. Vine ................................................................................................... 95
3.90. Voddler.com ........................................................................................ 95
3.91. Vsee ................................................................................................... 96
3.92. X.25 .................................................................................................... 96
3.93. Xbox Music .......................................................................................... 96
3.94. Xcap ................................................................................................... 97
3.95. XL Nonton ........................................................................................... 97
3.96. Yahoo Screen ....................................................................................... 97
3.97. Yahoo Messenger Video ........................................................................98
4. Authentication ................................................................................................. 99
4.1. Challenge Handshake Authentication Protocol ........................................... 99
4.2. Diameter .............................................................................................. 99
4.3. Identification Protocol .......................................................................... 100
4.4. kpasswd ............................................................................................. 100
4.5. Kerberos ............................................................................................. 100
4.6. Password Authentication Protocol .......................................................... 100
4.7. Remote Authentication Dial-In User Service ............................................. 101
4.8. SOCKet Secure v4 ................................................................................. 101
4.9. SOCKet Secure v5 ................................................................................. 101
4.10. Terminal Access Controller Access-Control System Plus ............................ 101
4.11. Yellow Page Passwd ............................................................................ 102
4.12. Yellow Pages Server ............................................................................ 102
5. Compression ................................................................................................. 103
5.1. Compression Control Protocol ............................................................... 103
5.2. COMP ................................................................................................. 103
6. Database ....................................................................................................... 104
6.1. DB2 .................................................................................................... 104
6.2. Distributed Relational Database Architecture ........................................... 104
6.3. FileMaker Pro ...................................................................................... 105
6.4. IBM Informix ........................................................................................ 105
6.5. Mobilink ............................................................................................. 105
6.6. MySQL Protocol ................................................................................... 105
6.7. PostgreSQL ......................................................................................... 106
6.8. Structured Query Language Interface ...................................................... 106
6.9. Sybase ................................................................................................ 106
6.10. Tabular Data Stream ........................................................................... 106
6.11. Transparent Network Service (Oracle) .................................................... 107
7. Encrypted ..................................................................................................... 108
7.1. I2P Invisible Internet Project ................................................................... 108
7.2. IPsec Encapsulating Security Payload ...................................................... 108
7.3. Internet Security Association and Key Management Protocol ...................... 109
7.4. Online Certificate Status Protocol ........................................................... 109
7.5. Secure Shell ........................................................................................ 109
7.6. Secure Socket Layer .............................................................................. 110
7.7. Tor ..................................................................................................... 110
7.8. Tor2web ............................................................................................. 110
8. ERP .............................................................................................................. 112
8.1. SAP .................................................................................................... 112
9. File Server ..................................................................................................... 113
Application Control Signatures
6