Welcome![Sign In][Sign Up]
Location:
Search - NAT TCP

Search list

[Internet-NetworkMakeTCPHoleSCR

Description: 这是一个TCP打洞的程序,是用VC编写的,很好懂-This is a TCP holes the procedure is the use of VC prepared, well understood
Platform: | Size: 11960320 | Author: jqx | Hits:

[P2Pp2p_NAT

Description: p2p内网穿透技术示例源码,基于tcp的解决方案。-p2p network penetration technology sample source, tcp-based solutions.
Platform: | Size: 25600 | Author: 章永辉 | Hits:

[Internet-NetworkMakeTCPHoleNat

Description: 很好用的tcp穿透nat的程序代码,是两个在nat后的pc可以直接通讯。-Good penetration with the tcp code nat is nat after two in the pc can communicate directly.
Platform: | Size: 4258816 | Author: 扬载伦 | Hits:

[Internet-Networkp2p.tar

Description: 很好用的udp穿透nat的程序代码,是两个在nat后的pc可以直接通讯。-Udp good use of the program code penetration nat is nat after two in the pc can communicate directly.
Platform: | Size: 26624 | Author: 扬载伦 | Hits:

[P2P200811117306388

Description: TCP实现P2P通信、TCP穿越NAT的方法。-TCP realize P2P communications, TCP through the NAT method.
Platform: | Size: 87040 | Author: 李彬 | Hits:

[P2Ptcpp2p

Description: TCP实现P2P通信、TCP穿越NAT的方法 TCP实现P2P通信、TCP穿越NAT的方法 -TCP realize P2P communications, TCP through TCP realize NAT method of P2P communications, TCP through NAT method
Platform: | Size: 87040 | Author: jack | Hits:

[P2Pp2p

Description: TCP实现P2P通信、TCP穿越NAT的方法、TCP打洞.rar,用于实现内网p2p传输-TCP realize P2P communications, TCP through the NAT method, TCP holes. Rar, used to realize transmission p2p network
Platform: | Size: 86016 | Author: 张石 | Hits:

[TCP/IP stackMakeTCPHole

Description: 利用TCP协议在NAT上打洞,分为客户端与服务器端实现-Using TCP protocol on the holes in the NAT, is divided into client and server-side realize
Platform: | Size: 187392 | Author: 李金鑫 | Hits:

[TCP/IP stackUDP_YY_1.3

Description: udp 穿透NAt,和文件传输,用UDP模拟tcp的机制发送文件-peer to peer programming,udp act as tcp
Platform: | Size: 158720 | Author: 陈金力 | Hits:

[Otherzhongxingpeixunjiaocai_ZCNE

Description: 课程目标: 􀁺 理解数据网络设备的互联 􀁺 了解数据网络规划方式 􀁺 掌握网络通信的基础原理和 TCP/IP 原理 􀁺 掌握常见的网络接口和线缆 􀁺 掌握路由器和以太网交换机的原理、配置、日常维护 􀁺 掌握路由协议的基本工作原理和配置方法 􀁺 掌握广域网协议的原理、配置和日常维护 􀁺 掌握 ACL 和NAT 的原理和配置 􀁺 对数据网络维护有一定的认识-Course Objectives: 􀁺 understand the Internet data network equipment, network planning 􀁺 way to understand the data network communications 􀁺 the basis of principle and TCP/IP 􀁺 grasp the principle of common 􀁺 cable network interface and Ethernet routers and switches to master the principles of , configuration, day-to-day maintenance routing protocol 􀁺 grasp the basic working principle and configuration 􀁺 grasp of the principle of wide area network protocol, configuration and day-to-day maintenance of 􀁺 ACL and NAT to master the principle and configuration of data network maintenance 􀁺 have a certain understanding of
Platform: | Size: 1492992 | Author: mackerel | Hits:

[Windows DevelopTCPHole

Description: 网络tcp打洞技术,可以穿过过NAT进行直接点对点通信。-Tcp holes network technology, can be had through direct peer-to-peer communications NAT.
Platform: | Size: 168960 | Author: 罗丰 | Hits:

[Internet-NetworkXSTUNT_server

Description: XSTUNT函数库,做了在 "Characterization and Measurement of TCP Traversal through NAT and Firewalls" 中所述的"STUNT #2"方法,提供了程序员一些简单的函数以实现TCP穿透NAT的功能。此为服务端函数库-Library XSTUNT done in the " Characterization and Measurement of TCP Traversal through NAT and Firewalls" described in " STUNT# 2" method, the programmer provides a simple function in order to achieve the functions of TCP penetrate NAT. This is the client library services
Platform: | Size: 32768 | Author: 黄菲 | Hits:

[Internet-NetworkXSTUNT_client_win32_linux

Description: XSTUNT函数库,做了在 "Characterization and Measurement of TCP Traversal through NAT and Firewalls" 中所述的"STUNT #2"方法,提供了程序员一些简单的函数以实现TCP穿透NAT的功能。此为客户端函数库。-Library XSTUNT done in the " Characterization and Measurement of TCP Traversal through NAT and Firewalls" described in " STUNT# 2" method, the programmer provides a simple function in order to achieve the functions of TCP penetrate NAT. This is the client library.
Platform: | Size: 168960 | Author: 黄菲 | Hits:

[Sniffer Package capture1.2.4.2

Description: 1. Sniffer traffic for the protocol TCP. 1.1. Interception of FTP logins on any port. 1.2. Interception of POP3 logins on any port. 1.3. The interception of any data from the traffic (a personal request). 2. Intercepting HTTP / HTTPS requests to wininet.dll, ie all programs working with this library. This includes Internet Explorer (any version), Maxton, etc. 2.1. Substitution .. 3. The functions of the server. 3.1 Socks4/4a/5. 3.2 Backconnect for any services (RDP, Socks, FTP, etc.) on the infected machine. You can access to a computer that is behind a NAT, or, for example, that banned from the internet connection. 3.3 Getting a screenshot of your screen in real time. -For research and academic purposes ONLY. WARNING: USE AT YOUR OWN RISK
Platform: | Size: 1634304 | Author: aidj | Hits:

[P2Pstunt

Description: TCP P2P nat traversal
Platform: | Size: 80896 | Author: zhangjunshao | Hits:

[Internet-NetworkTCP

Description: 基于VC++的NAT穿透技术,已经验证好使,可以放心下载使用-VC++ based on the NAT through technology, has been verified so you can rest assured download
Platform: | Size: 5971968 | Author: 马仲甜 | Hits:

[P2PFBNetworkLibrary_1.2

Description: TCP实现P2P通信、TCP穿越NAT的方法、TCP打洞 -P2P communication TCP implementation, TCP through the NAT method, TCP hole punching
Platform: | Size: 761856 | Author: vince | Hits:

[P2PCPP_TCP_NAT

Description: TCP实现P2P通信、TCP穿越NAT的方法、TCP打洞-TCP punch hole on NAT using C++
Platform: | Size: 47104 | Author: jemmy | Hits:

[TCP/IP stacktcp-hole

Description: 自己实现的tcp nat穿透方式,较好的完成了tcpnat穿透功能-The realization of our own TCP NAT penetration, completed the tcpnat penetration function
Platform: | Size: 6181888 | Author: shf | Hits:

[TCP/IP stackcross-the-nat

Description: 利用打洞的方式实现处在两个不同NAT后的主机的TCP通信-To realize the communication between two host behind different NAT by TCP
Platform: | Size: 14836736 | Author: 丁伟 | Hits:
« 1 23 4 5 »

CodeBus www.codebus.net