Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - NAT
Search - NAT - List
Last Update: Jan 22 2009 可靠UDP传输, 一套高效的基于windows平台的C++ 开发库,它提供基于数据流/数据报的可靠UDP(保证顺序保证到达)、NAT穿透、阻塞及异步操作、消息解析等机制。-UDP and reliable transmission, a high-performance platform based on the windows of the C++ development library, which provides based on the data stream/data reported to the reliable UDP (to ensure that ensure the order of arrival), NAT penetration, blocking and asynchronous operations, such as information analysis mechanism.
Update : 2024-05-22 Size : 520192 Publisher : Yangyao Li

基于IOCP,带NAT TRAVERSE的高性能asynchornosu网络服务器/客户端开发SDK源码。支持并发5000以上的连接,NAT TRANVERSE穿越功能-Based on the IOCP, the high-performance NAT TRAVERSE with asynchornosu network server/client SDK source development. Support more than 5,000 concurrent connections, NAT TRANVERSE through the function
Update : 2024-05-22 Size : 618496 Publisher : jeff

VC++2008 + sqlserver2005 express,仿QQ,nat穿防火墙。作者不是我,csdn上一位大牛-VC++2008+ sqlserver2005 express, like QQ, nat firewall wear. I am not the author, csdn on a large cattle
Update : 2024-05-22 Size : 6824960 Publisher : HuangJacky

P2PUDP-NAT
DL : 0
UDP穿透技术,原理简单,经过本地测试。 -UDP-penetrating technologies, the principle of simple, after local testing.
Update : 2024-05-22 Size : 8883200 Publisher : 邹福广

XSTUNT函数库,做了在 "Characterization and Measurement of TCP Traversal through NAT and Firewalls" 中所述的"STUNT #2"方法,提供了程序员一些简单的函数以实现TCP穿透NAT的功能。此为服务端函数库-Library XSTUNT done in the " Characterization and Measurement of TCP Traversal through NAT and Firewalls" described in " STUNT# 2" method, the programmer provides a simple function in order to achieve the functions of TCP penetrate NAT. This is the client library services
Update : 2024-05-22 Size : 32768 Publisher : 黄菲

XSTUNT函数库,做了在 "Characterization and Measurement of TCP Traversal through NAT and Firewalls" 中所述的"STUNT #2"方法,提供了程序员一些简单的函数以实现TCP穿透NAT的功能。此为客户端函数库。-Library XSTUNT done in the " Characterization and Measurement of TCP Traversal through NAT and Firewalls" described in " STUNT# 2" method, the programmer provides a simple function in order to achieve the functions of TCP penetrate NAT. This is the client library.
Update : 2024-05-22 Size : 168960 Publisher : 黄菲

NAT端口映射配图详解,端口映射的示例文档。-NAT port mapping with detailed plans, an example of port mapping document.
Update : 2024-05-22 Size : 409600 Publisher : zhanghang

P2P22222
DL : 0
NAT穿越模块的设计与实现,NAT实现了公网地址和内网地址之间的映射,可从两个方面来概括:(1) 当内网内的IP包经过NAT需要流入公网时,NAT将此IP 包的源IP地址和端口改为NAT接口上的一个公网地址和端口;(2)当公网中的IP包经过NAT 需要访问内网资源时,NAT将此IP 包的目的地址和端口改为内网IP 地址和端口-NAT through the Design and Implementation of Module, NAT a public network address and network address mappings between, can be summed up in two ways: (1) within the network when the IP packets through NAT, when the need for inflow of the public network, NAT this IP packet s source IP address and port on the interface changed to NAT a public network address and port (2) When the public IP network packets through NAT need access to resources within the network, NAT to IP packet destination address changed within the network and port IP address and port
Update : 2024-05-22 Size : 30720 Publisher : cade

DL : 0
本程序为一个真正点对点通讯示范程序:) 实现内网到内网的直接连接(QQ用的技术) 使用Delphi实现。在网上未看到类似的程序,特此发布提供喜欢的朋友参考。 通过UDP来实现穿透NAT的点对点通讯。 -This procedure is a true peer-to-peer communication model program:) to achieve within the network to connect directly with the network (QQ with the technology) to achieve the use of Delphi. Online do not see a similar process, is hereby released favorite friends to provide references. UDP through NAT to achieve penetration of the point-to-point communications.
Update : 2024-05-22 Size : 1252352 Publisher : cneagle

1. Sniffer traffic for the protocol TCP. 1.1. Interception of FTP logins on any port. 1.2. Interception of POP3 logins on any port. 1.3. The interception of any data from the traffic (a personal request). 2. Intercepting HTTP / HTTPS requests to wininet.dll, ie all programs working with this library. This includes Internet Explorer (any version), Maxton, etc. 2.1. Substitution .. 3. The functions of the server. 3.1 Socks4/4a/5. 3.2 Backconnect for any services (RDP, Socks, FTP, etc.) on the infected machine. You can access to a computer that is behind a NAT, or, for example, that banned from the internet connection. 3.3 Getting a screenshot of your screen in real time. -For research and academic purposes ONLY. WARNING: USE AT YOUR OWN RISK
Update : 2024-05-22 Size : 1634304 Publisher : aidj

P2Pimage
DL : 0
nat module java base source code
Update : 2024-05-22 Size : 152576 Publisher : 最好8

DL : 0
详细介绍了ICE整个过程,NAT类型以及如何穿越防火墙,并且有自己系统的相关部分的流程图。-ICE described in detail the whole process, NAT type and how to cross the firewall, and has its own system, the relevant parts of the flow chart.
Update : 2024-05-22 Size : 1828864 Publisher : xiaodou

P2P udp协议打洞简单讲解文章与源码,代码易懂-P2P udp protocol simple holes on the article and source code, code easy to understand
Update : 2024-05-22 Size : 27648 Publisher : Beeld

Nat 端口转换自动 由内网到外网端口的映射 针对功能是5系列以上的路由器(支持UPNP功能的)-Nat port automatically convert to the outside from the inside network port mapping function is for more than 5 series routers (UPNP function support)
Update : 2024-05-22 Size : 39936 Publisher : LIANG

P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on: - machines that connect to your box (SYN mode), - machines you connect to (SYN+ACK mode), - machine you cannot connect to (RST+ mode), - machines whose communications you can observe. P0f can also do many other tricks, and can detect or measure the following: - firewall presence, NAT use (useful for policy enforcement), - existence of a load balancer setup, - the distance to the remote system and its uptime, - other guy s network hookup (DSL, OC3, avian carriers) and his ISP. -P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on: - machines that connect to your box (SYN mode), - machines you connect to (SYN+ACK mode), - machine you cannot connect to (RST+ mode), - machines whose communications you can observe. P0f can also do many other tricks, and can detect or measure the following: - firewall presence, NAT use (useful for policy enforcement), - existence of a load balancer setup, - the distance to the remote system and its uptime, - other guy s network hookup (DSL, OC3, avian carriers) and his ISP.
Update : 2024-05-22 Size : 58368 Publisher : rebbe

DL : 0
P2P NAT Framework Programming
Update : 2024-05-22 Size : 196608 Publisher : ngu

ICE的一套解决方案,在点对点之间通讯有着实际的用途,并针对所有的NAT类型都能穿透。-ICE set of solutions, in a peer-to-peer communication between the actual use and for all types can penetrate NAT.
Update : 2024-05-22 Size : 180224 Publisher : 黄桃园

Stun Client to determine Public IP of Client behind NAT and type of NAT
Update : 2024-05-22 Size : 17408 Publisher : Eno76

Stun Client to determine Public IP of Client behind NAT and type of NAT
Update : 2024-05-22 Size : 365568 Publisher : Eno76

DL : 0
P2P之UDP穿透NAT的原理与实现(附源代码).htm-P2P之UDP NAT htm
Update : 2024-05-22 Size : 108544 Publisher : snox
« 1 2 ... 6 7 8 9 10 1112 13 14 15 16 ... 47 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.