搜索资源列表
fivechess
- C#4.0 点对点五子棋 一个文件包括了服务端和客户端,不支持内网穿透,-C# 4.0-point backgammon file includes server and client do not support the internal network penetration,
P2P_by_shootingstars
- shootingstar的P2P,包括Client和Server,能穿透nat。-shootingstar of P2P, including Client and Server, can penetrate nat.
DrawInDesktop
- c++builder实现屏幕上绘图,代码是纯C++的,有鼠标穿透效果-c++ builder to achieve drawing on the screen
communication
- QQ通信原理及QQ是怎么穿透内网进行通信的-QQ QQ is a communication theory and how to communicate within the network through
WithinthenetworkthroughUDP
- 利用P2P点对点技术实现UDP内网穿透 只要是数据量很大,而一般利用中转服务器又需要一定规模投入的应用,我们都可以考虑用P2P技术。 好处: 1.降低成本与投入。 2.提高传输性能。 -The use of P2P technology for point to point within the network through UDP as long as a large amount of data, and the general use of transit
P2PFile
- P2P通讯,NAT分类,nat穿透 TCp-P2P tRANSFER
hh
- 含穿透损伤复合材料蜂窝夹芯修补结构强度分析-With penetrating injury repair honeycomb sandwich composite structural strength analysis
penetratevirus
- 一种可以穿透还原卡和还原软件的,用汇编语言编写的病毒-Recovery Card can penetrate the virus and restore software
tcp-hole
- 自己实现的tcp nat穿透方式,较好的完成了tcpnat穿透功能-The realization of our own TCP NAT penetration, completed the tcpnat penetration function
Delphi_DataSnap
- 多层开发文档(包括远程调用技术代码追踪(socket).doc、P2P穿透防火墙源码分析等)-Three-tier development document
201141822308740
- P2P之UDP穿透NAT的原理与实现--增强篇(附源代码)-Of UDP through NAT P2P and implementation of the principle- enhanced article (with source code)
STC51-touch--rc
- 使用单片机IO口实现电容触摸按键功能 保证功能有效,灵敏度很高,能穿透5mm钢化玻璃-Using microcomputer GPIO capacitance touch keys function Ensure effective function, high sensitivity, can penetrate 5 mm toughened glass
udp
- 通过udp技术简单的实现防火墙穿透,有详细的注释说明-udp throughing fire wall with detailed
Show-the-mouse-pointer
- 实现了VB.NET下的鼠标穿透 并实时获取鼠标位置-Achieved through VB.NET and mouse under the real-time access to the mouse position
Desktop-snow-optimization
- 在电脑桌面下雪,对之前网上的程序进行了修改,用GetDIBits函数代替GetPixel函数并使用桌面穿透技术来解决前一版本不能再win7上运行的问题。-Snow in the computer desktop,online before the procedures were modified, GetDIBits function instead of GetPixel function and use the desktop penetration technology to solve
SIP_cross_symmetricasymmetric_NAT
- 基于ICE方式SIP信令穿透Symmetric_NAT技术研究-SIP cross symmetric/asymmetric NAT
RESEARCH-ON-HTTP-TUNNEL
- 在总结分析应用层的几种防火墙穿透技术基础上,提出了反向 连接结合 HTTP 隧道的防火墙穿透通信方法,设计并实现了 HTTP 隧道 防火墙穿透通信模块。 -after reviewing and analyzing several technologies of application-layer firewall penetration, this paper presents the firewall penetrating technology based on HTT
The-firewall-penetrating-technique
- 基于防火墙的基本原理,通过分析防火墙穿透的主要技术,利用防火墙的可信关系,实现了反 向连接加HTTP隧道和共享DNS套接字句柄来穿透防火墙 -Based on the basic firewall principle, firstly, themain firewall penetrating techniqueswas ana- lysed.Then using inverse connection andHTTP-tunnel to pass through firewallsw
P2PtoUDP
- 使用p2p原理,采用UDP协议穿透NAT的原理与实现,附加源代码-UDP
P2PDemo
- 这个是演示采用UDP协议进行P2P打洞对话原理的演示程序,参考的资料是: 1)P2P 之 UDP穿透NAT的原理与实现(附源代码)--http://www.cnpaf.net/Class/hack/0512182034513804825.htm 2)王艳平<<Windows网络与通信程序设计>>-This is a demonstration using the UDP protocol P2P holes dialogue principle demonstra