This is a greate helper to debug or learn network protocol. Log protocol data that go through Port Tunnel Wizard into log file.For example: HTTP, SMTP, POP, TELNET, NETBIOS and SSL. Infinite port tunnel until the destination ip address is achieved.The top float window show current traffic of Port Tunnel Wizard.Voice notify when illegal ip address connect in.Then Port Tunnel Wizard will run as a ssl tunnel to encrypt communication data between computer A and B. The second step is just deploy Port Tunnel Wizard on Computer B or some computer that in the same network with Computer B and make it run as a SSL server. The first step is deploy Port Tunnel Wizard on Computer A or some computer that in the same network with Computer A and make it run as a SSL client. SSL Tunnel function of Port Tunnel Wizard is very easy to be used and will encrypt network data for you.įrom above figure you can see that using Port Tunnel Wizard to encrypt communication data of non-SSL is very simple. Now using Port Tunnel Wizard, you can easily turn those softwares of non-SSL aware into safely softwares by ssl tunnel technology. That means when you are using those softwares,your data can be easily be stolen. But there is a lots of softwares are non-SSL aware. SSL Tunnel or SSL Port Forwarding is a very important technology to make sure your data is transfered safely, specially when your data must go through internet. #Free com port redirector software software#But if you deploy our port tunnel software on Gateway and set port tunnel, then now you can directly access a local computer from outside. In this case, you can not directly access a local computer located in a private LAN. Sometime you want to access some computers behind firewalls, gateways, or routers that you don't have right to configure. Now, you can deploy this Port Tunnel software on those computers, this will let you directly access computer D easily. Under this situation, maybe you need to go through a lots of computer to finally access the destination. When you try to access some remote computer,maybe this computer located in a private LAN or this computer are configured to deny your computer's ip address.įor example, Computer A is your own computer and you want to access some service located on Computer D, you must firstly access Computer B and secondly Computer C. Secure your communication, turn non-SSL aware softwares into safely softwares by ssl port tunnel Share the same internet connection to surfe internet. it integrated with http proxy function, let your computers Until the destination ip address is achieved. That can help you do Infinite port tunnel(TCP/UDP)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |