tunneling shareware downloads
Search results for «tunneling»:
Internet Secure Tunneling 2.0.0.244
… e…
wodSSHTunnel 1.9.6
… p to each application to decide its destination dynamically.
Limitations
30 days trial.…
JSecureConnect 2.0
… d to communicate securely or to take advantage of existing secure protocols. JSecureConnect provides the best answer to enable JDBC to communicate with data sources protected behind security solutions.
JSecureConnect provides secure and firewall tunneling JDBC to a range of databases such as Ora…
IPTunnelManager 1.5
… the network (as it uses a synchronous algorithm to encrypt traffic). In fact, one and the same password is used to authorize a client and to encrypt data.
Limitations
Only 5 clients can be connected…
JDBTunnel 2.0
… …
LinxMonitor 1.1
… on (HEAD) depending on user choice. The program provides all logs about monitor and transfer activity.
LinxMonitor supports several Internet protocols: FTP, HTTP and HTTPS. In addition, It supports following proxies: SOCKS4, SOCKS5, HTTP and HTTP tunneling (HTTP CONNECT). Program operates under M…
Yonc 1.28
… email account (or in multiple accounts), the speed with which data is transmitted to and from your computer and the modification date and text parts of www pages.
Yonc features
VT220, Linux (Xterm), TN3270, TN5250 emulations
SSH V1 and V2 with tunneling
Scripting and automation features
User…
MySQL Turbo Manager Enterprise 3.7.1.5
… any enhancements.
The MySQL Turbo Manager includes the most advanced module for the data manipulation, it has options like the direct copy records from MS Excel, reports generation, ilters definition and data groups.
Limitations
30 days trial…
Anon-Encrypt 1.6
… you; and can be traced back to you very easily. Its basically the same idea as a license plate on your car. That means, everywhere you go, everything you see online can be traced back to you with little effort.
Anon-Encrypt! gets around this by tunneling your requests through our servers. Meani…
Personal File Server 1.0
… visitors and user authentication system, password protection of directories and files, ban management system, client and session based bandwidth control, session status, files and folders virtual files system, user limits, session limits and router tunneling support.
It is much easier to setup…
Related: tunneling data tunneling firewall tunneling