Changes
DyKnow
,no edit summary
If it is preferable for the traffic to remain unencrypted for some time, using [[socat]] as a [[Socat#Cleartext_to_SSL_Tunnel_for_DyKnow|plaintext-to-SSL proxy]] allows the final end of the connection to be encrypted but the initial segment to remain unencrypted.
DyKnow 5.7 installed a hardcoded root certificate on student computers, allowing traffic to be intercepted in attacks similar to the Superfish vulnerability. SWAT has provided a [https://swat.eng.vt.edu/expanded-information-regarding-dyknow-57-vulnerability remediation tool] to remove the certificate and proxy features of DyKnow.
==File Format==
The .dyz file format is a gzipped XML file. After decompressing the file, it can easily be parsed using any standard XML library; pen strokes are stored as base64-encoded binary strings that are provided by the Microsoft Ink library. The DyKnow format also has support for storing complete file history, including erased, resized, and moved pen strokes as well as other deleted or changed elements.<ref>[https://code.google.com/p/dyknow-panel-extractor/wiki/DPXReader]</ref>
==Patents==
* [https://code.google.com/p/dyknow-panel-extractor/ dyknow-panel-extractor utility]
[[Category:Proprietary course software]][[Category:Campus bugs]][[Category:Move to UniluugSoftware]]