Enkele dagen geleden is met versienummer 0.842 de eerste stabile uitgave uit de 0.840-tak van het p2p-programma DC++ uitgekomen. DC++ is een van de vele programma's om bestanden via het Direct Connect-netwerk uit te wisselen. Het programma dankt de twee plussen in zijn naam aan C++, waarin het is geschreven. Het pakket wordt door Jacek Sieka ontwikkeld en is een opensourcevariant van de originele Neomodus Direct Connect-client. De release notes voor deze uitgave kunnen hieronder worden gevonden.
Changes in version 0.842Changes in version 0.841
- Update OpenSSL to version 1.0.1g - notably fixes the TLS heartbeat attack
Changes in version 0.840
- Reset fav hub column sizes
- [L#395400] Revert the hub list caching patch as it was messing logs up
- [L#1115765] Added ability to filter out files and directories from the share
- [L#1225420] Open own list when using get/browse file list on self
- [L#1250614] Added menu option on hub tab for only searching in that hub
- [L#250238] Remove queued files that are already shared when DC++ starts
- [L#309815] Hub icon will change depending on user status (user/registered/operator)
- [L#721513] Transferview: Added "Remove file from queue" menu option and "Force attempt" is now only available for downloads
- [L#210217] Add connectivity status for hubs to the favorite hubs window
- [L#593613] Added /lastmessage in PMs to show the time of the last message
- [L#363092] Disallow transfer port and encrypted transfer port to be the same
- [L#1245179] Avoid connection failures
- [L#1228927] Fix columns for file lists in the Download Queue
- HTTP fixes
- Safer hub state tracking
- Add "/d" for DuckDuckGo searches
- Add a dialog box to nag XP suckers into upgrading
- Support for a new XP-only branch in version checking
- [L#395400] Hub list caching fixed on Linux
- [L#1030613] Safeguards against user command flooding
- [L#1030613] Separate internal from external user commands
- [L#991342] Verify keyprints against all available certificates - works with cert chains
- [L#991342] Use keyprints to indicate trust for hubs and clients - keyprint is equivalent to certificate pinning in this regard
- [L#991342] Generate temporary TLS keys dynamically at startup
- [L#991342] Use variable size temporary TLS keys
- [L#991342] Log some certificate verification errors
- [L#991342] No longer use SHA1 for automatically generated client certificates
- [L#991342] Automatically generated certificates remain valid for 90 days instead of 10
- [L#991342] Request certificate for all TLS connections regardless of security settings
- [L#991342] Better OpenSSL integration regarding multi-threading and clean-up
