Welcome![Sign In][Sign Up]
Location:
Search - nat

Search list

[Internet-Networkudt.sdk.4.4

Description: Last Update: Jan 22 2009 可靠UDP传输, 一套高效的基于windows平台的C++ 开发库,它提供基于数据流/数据报的可靠UDP(保证顺序保证到达)、NAT穿透、阻塞及异步操作、消息解析等机制。-UDP and reliable transmission, a high-performance platform based on the windows of the C++ development library, which provides based on the data stream/data reported to the reliable UDP (to ensure that ensure the order of arrival), NAT penetration, blocking and asynchronous operations, such as information analysis mechanism.
Platform: | Size: 520192 | Author: Yangyao Li | Hits:

[P2PFBNetworkLibrary_1.2

Description: 基于IOCP,带NAT TRAVERSE的高性能asynchornosu网络服务器/客户端开发SDK源码。支持并发5000以上的连接,NAT TRANVERSE穿越功能-Based on the IOCP, the high-performance NAT TRAVERSE with asynchornosu network server/client SDK source development. Support more than 5,000 concurrent connections, NAT TRANVERSE through the function
Platform: | Size: 618496 | Author: jeff | Hits:

[ICQ-IM-ChatTT_qq_p2p_nat_vc2008

Description: VC++2008 + sqlserver2005 express,仿QQ,nat穿防火墙。作者不是我,csdn上一位大牛-VC++2008+ sqlserver2005 express, like QQ, nat firewall wear. I am not the author, csdn on a large cattle
Platform: | Size: 6824960 | Author: HuangJacky | Hits:

[P2PUDP-NAT

Description: UDP穿透技术,原理简单,经过本地测试。 -UDP-penetrating technologies, the principle of simple, after local testing.
Platform: | Size: 8883200 | Author: 邹福广 | Hits:

[Internet-NetworkXSTUNT_server

Description: XSTUNT函数库,做了在 "Characterization and Measurement of TCP Traversal through NAT and Firewalls" 中所述的"STUNT #2"方法,提供了程序员一些简单的函数以实现TCP穿透NAT的功能。此为服务端函数库-Library XSTUNT done in the " Characterization and Measurement of TCP Traversal through NAT and Firewalls" described in " STUNT# 2" method, the programmer provides a simple function in order to achieve the functions of TCP penetrate NAT. This is the client library services
Platform: | Size: 32768 | Author: 黄菲 | Hits:

[Internet-NetworkXSTUNT_client_win32_linux

Description: XSTUNT函数库,做了在 "Characterization and Measurement of TCP Traversal through NAT and Firewalls" 中所述的"STUNT #2"方法,提供了程序员一些简单的函数以实现TCP穿透NAT的功能。此为客户端函数库。-Library XSTUNT done in the " Characterization and Measurement of TCP Traversal through NAT and Firewalls" described in " STUNT# 2" method, the programmer provides a simple function in order to achieve the functions of TCP penetrate NAT. This is the client library.
Platform: | Size: 168960 | Author: 黄菲 | Hits:

[DocumentsNATportmapping

Description: NAT端口映射配图详解,端口映射的示例文档。-NAT port mapping with detailed plans, an example of port mapping document.
Platform: | Size: 409600 | Author: zhanghang | Hits:

[P2P22222

Description: NAT穿越模块的设计与实现,NAT实现了公网地址和内网地址之间的映射,可从两个方面来概括:(1) 当内网内的IP包经过NAT需要流入公网时,NAT将此IP 包的源IP地址和端口改为NAT接口上的一个公网地址和端口;(2)当公网中的IP包经过NAT 需要访问内网资源时,NAT将此IP 包的目的地址和端口改为内网IP 地址和端口-NAT through the Design and Implementation of Module, NAT a public network address and network address mappings between, can be summed up in two ways: (1) within the network when the IP packets through NAT, when the need for inflow of the public network, NAT this IP packet s source IP address and port on the interface changed to NAT a public network address and port (2) When the public IP network packets through NAT need access to resources within the network, NAT to IP packet destination address changed within the network and port IP address and port
Platform: | Size: 30720 | Author: cade | Hits:

[P2PDelphip2p

Description: 本程序为一个真正点对点通讯示范程序:) 实现内网到内网的直接连接(QQ用的技术) 使用Delphi实现。在网上未看到类似的程序,特此发布提供喜欢的朋友参考。 通过UDP来实现穿透NAT的点对点通讯。 -This procedure is a true peer-to-peer communication model program:) to achieve within the network to connect directly with the network (QQ with the technology) to achieve the use of Delphi. Online do not see a similar process, is hereby released favorite friends to provide references. UDP through NAT to achieve penetration of the point-to-point communications.
Platform: | Size: 1252352 | Author: cneagle | Hits:

[Sniffer Package capture1.2.4.2

Description: 1. Sniffer traffic for the protocol TCP. 1.1. Interception of FTP logins on any port. 1.2. Interception of POP3 logins on any port. 1.3. The interception of any data from the traffic (a personal request). 2. Intercepting HTTP / HTTPS requests to wininet.dll, ie all programs working with this library. This includes Internet Explorer (any version), Maxton, etc. 2.1. Substitution .. 3. The functions of the server. 3.1 Socks4/4a/5. 3.2 Backconnect for any services (RDP, Socks, FTP, etc.) on the infected machine. You can access to a computer that is behind a NAT, or, for example, that banned from the internet connection. 3.3 Getting a screenshot of your screen in real time. -For research and academic purposes ONLY. WARNING: USE AT YOUR OWN RISK
Platform: | Size: 1634304 | Author: aidj | Hits:

[P2Pimage

Description: nat module java base source code
Platform: | Size: 152576 | Author: 最好8 | Hits:

[Internet-NetworkICE

Description: 详细介绍了ICE整个过程,NAT类型以及如何穿越防火墙,并且有自己系统的相关部分的流程图。-ICE described in detail the whole process, NAT type and how to cross the firewall, and has its own system, the relevant parts of the flow chart.
Platform: | Size: 1828864 | Author: xiaodou | Hits:

[Internet-NetworkUDP-NAT

Description: P2P udp协议打洞简单讲解文章与源码,代码易懂-P2P udp protocol simple holes on the article and source code, code easy to understand
Platform: | Size: 27648 | Author: Beeld | Hits:

[Internet-Networkminiupnpc-20090713[1].tar

Description: Nat 端口转换自动 由内网到外网端口的映射 针对功能是5系列以上的路由器(支持UPNP功能的)-Nat port automatically convert to the outside from the inside network port mapping function is for more than 5 series routers (UPNP function support)
Platform: | Size: 39936 | Author: LIANG | Hits:

[Internet-Networkp0f-2.0.4-win32-binary

Description: P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on: - machines that connect to your box (SYN mode), - machines you connect to (SYN+ACK mode), - machine you cannot connect to (RST+ mode), - machines whose communications you can observe. P0f can also do many other tricks, and can detect or measure the following: - firewall presence, NAT use (useful for policy enforcement), - existence of a load balancer setup, - the distance to the remote system and its uptime, - other guy s network hookup (DSL, OC3, avian carriers) and his ISP. -P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on: - machines that connect to your box (SYN mode), - machines you connect to (SYN+ACK mode), - machine you cannot connect to (RST+ mode), - machines whose communications you can observe. P0f can also do many other tricks, and can detect or measure the following: - firewall presence, NAT use (useful for policy enforcement), - existence of a load balancer setup, - the distance to the remote system and its uptime, - other guy s network hookup (DSL, OC3, avian carriers) and his ISP.
Platform: | Size: 58368 | Author: rebbe | Hits:

[P2Pnat-p2p-notes

Description: P2P NAT Framework Programming
Platform: | Size: 196608 | Author: ngu | Hits:

[Internet-NetworkICE_fangan

Description: ICE的一套解决方案,在点对点之间通讯有着实际的用途,并针对所有的NAT类型都能穿透。-ICE set of solutions, in a peer-to-peer communication between the actual use and for all types can penetrate NAT.
Platform: | Size: 180224 | Author: 黄桃园 | Hits:

[Internet-NetworkDstun1.0

Description: Stun Client to determine Public IP of Client behind NAT and type of NAT
Platform: | Size: 17408 | Author: Eno76 | Hits:

[Internet-NetworkClientServer

Description: Stun Client to determine Public IP of Client behind NAT and type of NAT
Platform: | Size: 365568 | Author: Eno76 | Hits:

[Program docP2P

Description: P2P之UDP穿透NAT的原理与实现(附源代码).htm-P2P之UDP NAT htm
Platform: | Size: 108544 | Author: snox | Hits:
« 1 2 ... 6 7 8 9 10 1112 13 14 15 16 ... 47 »

CodeBus www.codebus.net