Location:
Search - NAT TCP
Search list
Description: 这是一个TCP打洞的程序,是用VC编写的,很好懂-This is a TCP holes the procedure is the use of VC prepared, well understood
Platform: |
Size: 11960320 |
Author: jqx |
Hits:
Description: p2p内网穿透技术示例源码,基于tcp的解决方案。-p2p network penetration technology sample source, tcp-based solutions.
Platform: |
Size: 25600 |
Author: 章永辉 |
Hits:
Description: 很好用的tcp穿透nat的程序代码,是两个在nat后的pc可以直接通讯。-Good penetration with the tcp code nat is nat after two in the pc can communicate directly.
Platform: |
Size: 4258816 |
Author: 扬载伦 |
Hits:
Description: 很好用的udp穿透nat的程序代码,是两个在nat后的pc可以直接通讯。-Udp good use of the program code penetration nat is nat after two in the pc can communicate directly.
Platform: |
Size: 26624 |
Author: 扬载伦 |
Hits:
Description: TCP实现P2P通信、TCP穿越NAT的方法。-TCP realize P2P communications, TCP through the NAT method.
Platform: |
Size: 87040 |
Author: 李彬 |
Hits:
Description: TCP实现P2P通信、TCP穿越NAT的方法
TCP实现P2P通信、TCP穿越NAT的方法 -TCP realize P2P communications, TCP through TCP realize NAT method of P2P communications, TCP through NAT method
Platform: |
Size: 87040 |
Author: jack |
Hits:
Description: TCP实现P2P通信、TCP穿越NAT的方法、TCP打洞.rar,用于实现内网p2p传输-TCP realize P2P communications, TCP through the NAT method, TCP holes. Rar, used to realize transmission p2p network
Platform: |
Size: 86016 |
Author: 张石 |
Hits:
Description: 利用TCP协议在NAT上打洞,分为客户端与服务器端实现-Using TCP protocol on the holes in the NAT, is divided into client and server-side realize
Platform: |
Size: 187392 |
Author: 李金鑫 |
Hits:
Description: udp 穿透NAt,和文件传输,用UDP模拟tcp的机制发送文件-peer to peer programming,udp act as tcp
Platform: |
Size: 158720 |
Author: 陈金力 |
Hits:
Description: 课程目标:
理解数据网络设备的互联
了解数据网络规划方式
掌握网络通信的基础原理和 TCP/IP 原理
掌握常见的网络接口和线缆
掌握路由器和以太网交换机的原理、配置、日常维护
掌握路由协议的基本工作原理和配置方法
掌握广域网协议的原理、配置和日常维护
掌握 ACL 和NAT 的原理和配置
对数据网络维护有一定的认识-Course Objectives: understand the Internet data network equipment, network planning way to understand the data network communications the basis of principle and TCP/IP grasp the principle of common cable network interface and Ethernet routers and switches to master the principles of , configuration, day-to-day maintenance routing protocol grasp the basic working principle and configuration grasp of the principle of wide area network protocol, configuration and day-to-day maintenance of ACL and NAT to master the principle and configuration of data network maintenance have a certain understanding of
Platform: |
Size: 1492992 |
Author: mackerel |
Hits:
Description: 网络tcp打洞技术,可以穿过过NAT进行直接点对点通信。-Tcp holes network technology, can be had through direct peer-to-peer communications NAT.
Platform: |
Size: 168960 |
Author: 罗丰 |
Hits:
Description: XSTUNT函数库,做了在 "Characterization and Measurement of TCP Traversal through NAT and Firewalls" 中所述的"STUNT #2"方法,提供了程序员一些简单的函数以实现TCP穿透NAT的功能。此为服务端函数库-Library XSTUNT done in the " Characterization and Measurement of TCP Traversal through NAT and Firewalls" described in " STUNT# 2" method, the programmer provides a simple function in order to achieve the functions of TCP penetrate NAT. This is the client library services
Platform: |
Size: 32768 |
Author: 黄菲 |
Hits:
Description: XSTUNT函数库,做了在 "Characterization and Measurement of TCP Traversal through NAT and Firewalls" 中所述的"STUNT #2"方法,提供了程序员一些简单的函数以实现TCP穿透NAT的功能。此为客户端函数库。-Library XSTUNT done in the " Characterization and Measurement of TCP Traversal through NAT and Firewalls" described in " STUNT# 2" method, the programmer provides a simple function in order to achieve the functions of TCP penetrate NAT. This is the client library.
Platform: |
Size: 168960 |
Author: 黄菲 |
Hits:
Description: 1. Sniffer traffic for the protocol TCP.
1.1. Interception of FTP logins on any port.
1.2. Interception of POP3 logins on any port.
1.3. The interception of any data from the traffic (a personal request).
2. Intercepting HTTP / HTTPS requests to wininet.dll, ie all programs working with this
library. This includes Internet Explorer (any version), Maxton, etc.
2.1. Substitution ..
3. The functions of the server.
3.1 Socks4/4a/5.
3.2 Backconnect for any services (RDP, Socks, FTP, etc.) on the infected machine. You can
access to a computer that is behind a NAT, or, for example, that
banned from the internet connection.
3.3 Getting a screenshot of your screen in real time. -For research and academic purposes ONLY.
WARNING: USE AT YOUR OWN RISK
Platform: |
Size: 1634304 |
Author: aidj |
Hits:
Description: TCP P2P nat traversal
Platform: |
Size: 80896 |
Author: zhangjunshao |
Hits:
Description: 基于VC++的NAT穿透技术,已经验证好使,可以放心下载使用-VC++ based on the NAT through technology, has been verified so you can rest assured download
Platform: |
Size: 5971968 |
Author: 马仲甜 |
Hits:
Description: TCP实现P2P通信、TCP穿越NAT的方法、TCP打洞
-P2P communication TCP implementation, TCP through the NAT method, TCP hole punching
Platform: |
Size: 761856 |
Author: vince |
Hits:
Description: TCP实现P2P通信、TCP穿越NAT的方法、TCP打洞-TCP punch hole on NAT using C++
Platform: |
Size: 47104 |
Author: jemmy |
Hits:
Description: 自己实现的tcp nat穿透方式,较好的完成了tcpnat穿透功能-The realization of our own TCP NAT penetration, completed the tcpnat penetration function
Platform: |
Size: 6181888 |
Author: shf |
Hits:
Description: 利用打洞的方式实现处在两个不同NAT后的主机的TCP通信-To realize the communication between two host behind different NAT by TCP
Platform: |
Size: 14836736 |
Author: 丁伟 |
Hits: