AN APPROACH TO CREATE AND USE TEST (ECHO) SERVERS BASED ON TCL/TK


This article presents some of the methods used to control traffic in the operation of a corporate network. They are based on the capabilities provided to the developer by the software environment implemented on the basis of Tcl/Tk. The issues related to the creation and use of test (ECHO) servers, the exchange of encrypted secure information, the interaction with the servers included in the network (PROXY and HTTP) are described in more detail. Software examples for building client-server objects are presented. An algorithm for information block exchange between addressee and recipient with a variable encryption key within a corporate network is presented.