搜索资源列表
tunnel
- http-tunnel 代码 ,不是很全可也有帮助的
firepass-1.1.2a.tar
- Firepass - 一种隧道技术工具,通过它可以避开防火墙的规则约束,将数据流封装在合法的HTTP POST请求中。任何基于TCP/UDP协议的子协议可以通过它来穿越HTTP代理服务器对HTTP协议的严格审查。到目前为止,客户端和服务器端仅用PERL语言编写。服务器端作为一个CGI脚本运行在WEB服务器上。Firepass的主要特点是用户可以在外网使用几种方法安装服务器端脚本。用户无需在外网计算机上帮定任何端口。当服务端脚本被置于企业WEB服务器上,客户端脚本从外部网络和它通信时,Firepa
http.rar
- http隧道 技术 有连接http资料,http tunnel
httptunnel-1.3.2
- 打通http隧道的代码,可以把所有的协议封装成http请求,可以穿透防火墙,非常强大!-Open up http tunnel code, you can encapsulate all the protocols http request, can penetrate the firewall, very powerful!
Javatunnel-0.1
- java实现的代理程序 socket 编程实现的http 和socket 代理程序-java proxy you can lean how to write java proxy
HTTPTunneling_demo
- windows http tunnel source code
HTTPTUNNEL
- http tunnel codes, only for research htt p tunnel codes, only for research http tunnel codes, only for research -http tunnel codes, only for research http tunnel codes, only for research http tunnel codes, only for research http tunnel co
AVGateService_EMail
- 监控服务器上运行的HTTP、FTP、SMTP、POP3等所有应用服务; 监控服务器上文件和目录是否被修改,监控WEB网站是否被黑; 监控DDN专线、VPN隧道的可用性、丢包率和延时; 分析和管理内网流量情况; 监控机房内温度和湿度等环境参数; 监控UPS不间断电源的各种数据及状态; 监控到故障,通过手机短信、电话、电子邮件、发出报警声音和监控屏幕警告等方式通知管理员-Monitoring server running on HTTP,
hcovert-0.5.tar
- 在应用层建立隐蔽通道,建立http-tunnel,实现隐蔽通信。-In the application layer to establish covert channels, the establishment of http-tunnel, to achieve covert communication.
hrd_http_tunnel
- fetch row from mysql on the web using HTTP tunnel using indy, delphi 7 and SQLyogTunnel.php
HTTPTUNNEL1
- When we want create HTTP connection through proxy server, the client sends a request to the proxy server using HTTP protocol CONNECT method that it wants to establish a connection to some host (Destination) on some port. Now proxy server if allows tr
RESEARCH-ON-HTTP-TUNNEL
- 在总结分析应用层的几种防火墙穿透技术基础上,提出了反向 连接结合 HTTP 隧道的防火墙穿透通信方法,设计并实现了 HTTP 隧道 防火墙穿透通信模块。 -after reviewing and analyzing several technologies of application-layer firewall penetration, this paper presents the firewall penetrating technology based on HTT
The-firewall-penetrating-technique
- 基于防火墙的基本原理,通过分析防火墙穿透的主要技术,利用防火墙的可信关系,实现了反 向连接加HTTP隧道和共享DNS套接字句柄来穿透防火墙 -Based on the basic firewall principle, firstly, themain firewall penetrating techniqueswas ana- lysed.Then using inverse connection andHTTP-tunnel to pass through firewallsw
HTTP-TUNNEL-DETECTING-TECHNIQUE
- 研究了恶意软件常采用的通信方式———隧道技术,并提出了一种基于C4.5的HTTP 隧道检测算法。该算法采用决策支持树算法 C4.5提取网络流特征字段,根据特征字段生成训练数据建立HTTP隧道分类的决策树检测模型,采用该分类模型检测HTTP隧道流,为检测恶意软件提供依据。-Malicious software often used means of communication--- tunneling technology, and a HTTP based on C4.5 Tunne
barbatunnel-5.3-sourceocde(2)
- A layer that hide, redirect. forward, re-encrypt internet packet to keep VPN, Proxies and other p2p software hidden from Firewall. Free implementation for HTTP-Tunnel, UDP-Tunnel, port forwarding, port redirecting and packet re-encryption that can wo
httptunnel-3.3
- 基于防火墙的基本原理,通过分析防火墙穿透的主要技术,利用防火墙的可信关系,实现了反 向连接加HTTP隧道和共享DNS套接字句柄来穿透防火墙-Based on the basic firewall principle, firstly, themain firewall penetrating techniqueswas ana- lysed.Then using inverse connection andHTTP-tunnel to pass through firewallswas prop
Http-tunnel-technology
- 基于HTTP隧道的个人防火墙穿透技术研究 硕士论文,对HTTP隧道穿透防火墙技术有深入介绍 下载cajviewer打开-First,it introduces definition and function of the firewall then it points out the weakness of the firewall,which provides the consideration of the further study for firewall penet
httptunnel-3.0.5
- http隧道源代码,比较简单,非常值得学习。-http tunnel source code is relatively simple, and well worth learning.
Tunnel-based-on-http
- 本文详细研究了HTTP协议报文的内容,对于HTTP协议 有了全面深入的了解;在此基础上,本文给出了构建HTTP隐蔽通道 的三种通用模型(简单HTTP模型、代理模型、CGI模型)和四种常用 的方法(GET方法、HEAD方法、POST方法、PUT方法)- The thesis structure is as follows: Firstly, this dissertation not only investigates the message structure of
http-tunnel-based-tech
- 基于HTTP协议的隧道技术的设计与实现,利用http隧道技术-The Designed and Realization of Tunnel Based on HTTP