Informative Information for the Uninformed | ||||||||||||||
|
||||||||||||||
Usage Output OverviewThe following usage output was copied verbatim from the most recent version of the reference implementation, SteganRTP 0.3b.
Usage: steganrtp [general options] -t <host> -k <keyphrase> required options: at least one of: -a <host> The "source" of the RTP session, or, host treated as the "close" endpoint (host A) -b <host> The "destination" of the RTP session, or, host treated as the "remote" endpoint (host B) -k <keyphrase> Shared secret used as a key to obfuscate communications general options: -c <port> Host A's RTP port -d <port> Host B's RTP port -i <interface> Interface device (defaults to eth0) -s Enable the shell service (DANGEROUS) -v Increase verbosity (repeat for additional verbosity) help and documentation: -V Print version information and exit -e Show usage examples and exit -h Print help message and exit
|