Logo
 
   
 
     
 
 

IPTunnelManager

More tags: internet, intranet, telnet, proxy, secure, compress, encrypt, traffic, dbms, database, client, server, network, communication, ftp, ssl, ssh, blowfish, zlib, winsock, ipsec, mac, hash, security, tunnel, tunneling, port, forwarding,
 Sponsored links
IPTunnelManager

IPTunnelManager
  Category : Utilities -  Security
 Sponsored links
 
  Platform : Win95,  Win98,  WinME,  WinXP,  WinNT 4.x,  Windows2000,  Windows2003  
  Price : USD 49  
  Developer:  
  Rating :  
  License : Shareware  
  Limitations: 30 Days  
  Date : 09/26/2006  
  Size : 1.59 MB  
Download
Software Description:
Software In :
Utilities
Security
internet intranet telnet proxy secure compress encrypt traffic dbms database client server network communication ftp ssl ssh blowfish zlib winsock ipsec mac hash security tunnel tunneling port forwarding,
   The program IPTunnelManager is used for IP tunneling with the options for compressing and encrypting traffic. Thus, the program makes it possible to create a secure connection for any application or service using TCP/IP (HTTP, FTP, SMTP, POP, NNTP, SNPP, Telnet, etc.). It is especially important for those TCP/IP services and applications (for example, FTP, Telnet, various DBMS) that transfer passwords openly when establishing a connection between a client and a server. IPTunnelManager starts encrypting traffic from the moment when a TCP/IP connection is established, that is why all data transferred between a client and a server are encrypted. Besides, IPTunnelManager protects transferred data from being changed by checking the integrity of the transferred data using a 128-bit MAC algorithm. Data compression provides a significant (not less than 3 times less) decrease in the volume of data transferred via the network. Multithreaded, highly effective, streaming traffic processing produces practically no negative influence on the channel capacity. To create a secure connection, the program does not require opening additional ports and it does not transfer keys via the network (as it uses a synchronous algorithm to encrypt traffic). In fact, one and the same password is used to authorize a client and to encrypt data.


Wroclaw Offline Guide
LigdeLig

 Sponsored links

Also See

Advanced Drive Protector 1)    Advanced Drive Protector
 Password-protect, hide and lock your local, network, Floppy, CD/DVD and USB drives with Advanced Drive Protector. Disable the AutoRun feature for the selected drives to prevent unauthorized software i...
License:Shareware USD 39 Size:0.53 MB

Free Privacy Fix 2)    Free Privacy Fix
 Free Privacy Fix will securely and permanently delete any traces of your online and offline activity so that you can enjoy the freedom you enjoy in other aspects of your life. No-one watches you when ...
License:Freeware USD 29.95 Size:3.88 MB

PC Locker Pro 3)    PC Locker Pro
 PC Locker Pro V1.2 Copyright(c) Silver Eagle Software,Inc. All Rights Reserved. http://www.SilverEagleSoft.com http://www.cute-cd-dvd-burner.com Email: contact@silvereaglesoft.com Introduction PC Lock...
License:Freeware  Size:0.57 MB pc locker, lock pc, computer locker, lock computer, protect pc, pc protecter, protect computer, computer protecter,

FreeShield 4)    FreeShield
 As well as powerful, extensive customisable parental controls Freeshield also include many other features. FreeShield also provides antivirus/anti-adware protection, a popup blocker and a facility to ...
License:Freeware  Size:0.65 MB

Internet Secure Tunneling 5)    Internet Secure Tunneling
 Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwis...
License:Shareware USD 35.99 Size:0.90 MB

Password strength analyzer and generator 6)    Password strength analyzer and generator
 The Password Strength Analyser and Generator is one application combining three tools - the Analyser (shows the "strength" of your pass phrase regarding some rules), the Generator (generates "strong" ...
License:Freeware USD 0 Size:0.12 MB

Love You Not 7)    Love You Not
 Love You Not! will intercept any request to execute all scripting file types used in email virus attacks. These include: Visual Basic scripts (.VBS, .VBE, .VB), Javascript (.JS, .JSE), Scrap objects (...
License:Shareware USD 5.00 Size:0.87 MB

NetDog Block Porn 8)    NetDog Block Porn
 NetDog Porn blocker,block porn websites on the internet easily! Special Intelligent content Filtering Engine block porn websites on the Internet. The content filtering engine examines in real-time all...
License:Shareware USD 24.99 Size:0.57 MB

Jolly Time and Attendance Software 9)    Jolly Time and Attendance Software
 Lobby Track Time and Attendance Software is a new secure tracking, access control, and visitor management software system. This innovative new technology allows organizations to track employees and eq...
License:Demo USD 799.99 Size:25.47 MB

Word Password Recovery Wizard 10)    Word Password Recovery Wizard
 Word Password Recovery Wizard is a sophisticated solution for recovering all types of passwords in MS Word. The program supports all versions of Microsoft Word, including 2007. You can gain access to ...
License:Shareware USD 29.95 Size:1.61 MB
Tags: password, recovery, protect, microsoft, office, recover, document, remove, lost, doc, open, password recovery, ms, lost password

Undelete xDPicture Card 1)    Undelete xDPicture Card
 Undelete xD-Picture Card guarantees safety of your photos and videos. Modern digital cameras and flash cards allow rewriting photo and video files many times and sometimes important files deleted or l...
License:Demo USD 44.95 Size:2.11 MB

FileRescue Professional 2)    FileRescue Professional
 FileRescue Professional is an easy-to-use yet powerful software utility designed to restore accidentally deleted files and folders. It allows you to recover files that have been deleted from the Recyc...
License:Shareware USD 79.95 Size:1.65 MB

MapKeyboard 3)    MapKeyboard
 MapKeyboard is a free program to remap your keyboard. Using MapKeyboard, you can alter any key on your keyboard to function as a different one or altogether disable it as well. This is an essential to...
License:Freeware USD 0 Size:0.03 MB mapkeyboard, map, keys, keyboard, remapper, free, layout, change, laptop, disable,

Recovery for Exchange 4)    Recovery for Exchange
 Recovery for Exchange is a data recovery program for Microsoft Exchange Server. In case of server crash or deleting a mailbox, Offline Storage Files (.ost) remain on client computer, holding emails, c...
License:Demo USD 599.00 Size:1.07 MB

abylon CRYPTDRIVE 5)    abylon CRYPTDRIVE
 Only encryption of your data can prevent it falling into the wrong hands. abylon CRYPTDRIVE offers a simple procedure to create encrypted drives - the so-called encrypted container. By the using eithe...
License:Shareware USD 50.00 Size:9.87 MB

PowerCmd 6)    PowerCmd
 PowerCmd is a leading Windows Command Prompt replacement with Windows-like behavior, modern and sleek user interface for traditional Windows command line, known as Command Prompt or DOS console. Power...
License:Shareware USD 29.95 Size:0.86 MB

Antilost CD Ejector Lite 7)    Antilost CD Ejector Lite
 Protect yourself from CD loss. What's new in version 2.2 : - multi-drive control using hot keys. Only call Main Menu (by double pressing a hot key) and press a letter of the proper drive; - some inter...
License:Freeware  Size:0.76 MB

O&O CleverCache Professional Edition 8)    O&O CleverCache Professional Edition
 O&O CleverCache V6 is a unique tool to optimize the File Cache Management of Windows Vista, Windows NT, Windows 2000, and Windows XP. This results in an enormous performance boost and may double the o...
License:Shareware USD 29.95 Size:3.62 MB

Batch Rename .EXE 9)    Batch Rename .EXE
 Tired of renaming your files by hand? This wizard makes the busywork that invariably comes with downloading and managing media files disappear. Run your file list through an extensive array of filenam...
License:Freeware USD 0 Size:0.97 MB

IE Cache&History Viewer 10)    IE Cache&History Viewer
 The IE cache contains a kind of travel record of the items you have seen, heard, or downloaded from the Web, including images, sounds, Web pages, even cookies. Typically these items are stored in the ...
License:Freeware  Size:0.63 MB
Tags: internet, privacy, clean, history, ie, track, clear

More tags: internet intranet telnet proxy secure compress encrypt traffic dbms database client server network communication ftp ssl ssh blowfish zlib winsock ipsec mac hash security tunnel tunneling port forwarding,
 
 
Copyright © 2013 Appcolt.com    iOS - iOS
Privacy Policy and Terms of Use   All rights reserved.