Forum Romania Inedit
Romania Inedit - Resursa ta de Fun
|
Lista Forumurilor Pe Tematici
|
Forum Romania Inedit | Reguli | Inregistrare | Login
POZE FORUM ROMANIA INEDIT
Nu sunteti logat.
|
Nou pe simpatie: Kalifa
| Femeie 23 ani Ialomita cauta Barbat 24 - 65 ani |
|
drwatson
MEMBRU VIP
Din: Purgatoriu
Inregistrat: acum 14 ani
|
|
Proxifier is a program that allows network applications that do not support working through proxy servers to operate through an HTTPS or SOCKS proxy or a chain of proxy servers.
There are many network applications that do not support working through proxy servers and thus cannot be used behind a LAN or firewall(s). These can compromise corporate privacy and lead you to many other restrictions. Proxifier solves all of these problems and gives you the opportunity to work with your favorite software without any restrictions. Additionally, it lets you gain extra control over network security, create a proxy tunnel and add more power to network functionality.
With Proxifier you can work with any Internet client (browsers, FTP, IRC, BitTorrent, messengers, telnet, SSH, video/audio, games...) through a network that is separated from Internet by a firewall (only one open port is required for a proxy tunnel to bypass firewall).
Proxifier will provide you with added privacy in all your Internet activities. An example is sending and receiving email through a proxy server or by chaining multiple proxy servers together. Proxifier supports all mail clients while allowing you to remain anonymous.
Proxifier allows you to:
- Run any network applications through proxy server; no special configuration is required for the software. - Access the Internet from restricted local area network through a proxy server gateway. - Bypass firewall restrictions (connect to restricted ports). - Use three types of proxy servers: SOCKS v4, SOCKS v5, and HTTP. - "Tunnel" the entire system (force all network connections in the system work through a proxy server). - Resolve DNS names through a proxy server. - Use flexible Proxification Rules. - Secure privacy by hiding your IP address. - Work through a chain of proxy servers using different protocols. - Use NTLM authentication on HTTP proxy - View information on current connections (addresses, rate, data transfer, connection time, etc.) in real-time. - View information on bandwidth usage as a colored diagram in real-time. - Maintain log files. - Log incoming and outgoing traffic. - Get detailed reports on network errors. - … and much more.
TESTED - Xp SCANNED - AVAST
DOWNLOAD:
OR
_______________________________________ People are made to be loved & things are made to be used. The confusion in this world is that people are used & things are loved!
|
|
pus acum 12 ani |
|