19.97. Xunlei/Thunder protocol ................................................................... 297
19.98. Usabit Bittorrent tracker ..................................................................... 297
19.99. uTorrent .......................................................................................... 298
19.100. uTP (Micro Transport Protocol) .......................................................... 298
19.101. Vakaka.com .................................................................................... 298
19.102. Vector Bittorrent tracker ................................................................... 298
19.103. Winmx .......................................................................................... 299
19.104. winNY ........................................................................................... 299
19.105. Vuze Bittorrent client ....................................................................... 299
19.106. Zattoo.com .................................................................................... 300
20. Printer ......................................................................................................... 301
20.1. Apple AirPrint .................................................................................... 301
20.2. BJNP ................................................................................................. 301
20.3. Common Unix Printer System ............................................................... 301
20.4. Internet Printing Protocol .................................................................... 302
20.5. HP Printer Job Language ..................................................................... 302
20.6. Line Printer Remote ............................................................................ 302
21. Qosmos ....................................................................................................... 303
21.1. Base virtual protocol ........................................................................... 303
22. Routing ....................................................................................................... 304
22.1. Apollo Domain:XEROX ........................................................................ 304
22.2. Border Gateway Protocol ..................................................................... 305
22.3. Enhanced Interior Gateway Routing Protocol .......................................... 305
22.4. Hot Standby Router Protocol ................................................................ 305
22.5. Routine Information Protocol over IPX ................................................... 305
22.6. Loopback:XEROX ................................................................................ 305
22.7. Multiprotocol Packet Label Switching .................................................... 306
22.8. Netware Link Services Protocol ............................................................. 306
22.9. Open Shortest Path First ...................................................................... 306
22.10. Pseudo Wire Emulation ...................................................................... 306
22.11. Routing Information Protocol V1 ......................................................... 307
22.12. Routing Information Protocol V2 ......................................................... 307
22.13. Routing Internet Protocol ng1 ............................................................ 307
22.14. Spanning Tree Protocol ..................................................................... 307
22.15. Virtual Router Redundancy Protocol .................................................... 308
23. Security Service ............................................................................................ 309
23.1. Fsecure ............................................................................................. 309
23.2. GhostSurf .......................................................................................... 309
23.3. McAfee Client update .......................................................................... 310
23.4. PeerGuardian ..................................................................................... 310
24. Standard ..................................................................................................... 311
24.1. High Entropy ..................................................................................... 311
24.2. Statistical Protocol IDentification .......................................................... 311
25. Telephony ................................................................................................... 312
25.1. BSS Application Part ........................................................................... 312
25.2. ISDN User Part .................................................................................... 312
26. Terminal ...................................................................................................... 313
26.1. Remote Login .................................................................................... 313
26.2. Remote Shell ..................................................................................... 313
26.3. Telnet ............................................................................................... 313
26.4. Secure TELNET ................................................................................... 314
26.5. Telnet VIP .......................................................................................... 314
27. Thin Client ................................................................................................... 315
27.1. Rational ClearCase .............................................................................. 315
27.2. GoToDevice Remote Administration ...................................................... 316
27.3. GoToMyPC Remote Access ................................................................... 316
27.4. Independant Computing Architecture (Citrix) ......................................... 316
27.5. JEDI (Citrix) ........................................................................................ 317
27.6. LogMeIn Rescue ................................................................................. 317
27.7. PCAnywhere ...................................................................................... 317
27.8. Radmin ............................................................................................. 317
Application Control Signatures
17