Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure.
Dec 26, 2011 12:04:34
Windows 95, Windows 98, Windows ME, Windows NT, Windows 2000, Windows XP, Windows 2003
1D Barcode VCL Components 188.8.131.525 The components set is designed for generating and printing barcode in your Delphi or C++ Builder application. Most popular linear and postal barcode symbologies are supported. Database functionality and most popular reports are supported.
Net Time Server & Client 184.108.40.2060 The time synchronization application synchronize your PC's system clock or all PC's system clock in your LAN using. The Time and SNTP time protocols are supported. It can work as SNTP server or client. It can work as a NT/2000/XP/2003/Vista service.
Description: Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure.
The tunneling capability of SSH Secure Shell is a feature that allows, for example, company employees to access their email, company intraweb pages and shared files securely by even when working from home or on the road.
Tunneling makes it possible to access email from any type of Internet service (whether accessed via modem, a DSL line or a cable connection, or a hotel Internet service). As long as the user has an IP connection to the Internet she can get her mail and access other resources from anywhere in the world securely.
This often is not the case with more traditional IPSec based VPN technologies because of issues with traversing networks that are implementing Network Address Translation (NAT) - this is especially the case in hotels. NAT breaks an IPSec connection unless special protocols such as NAT-Traversal are implemented on the client and gateway.
The client-server applications using the tunnel will carry out their own authentication procedures, if any, the same way they would without the encrypted tunnel.
The protocol/application might only be able to connect to a fixed port number ( e.g. IMAP 143). Otherwise any available port can be chosen for port forwarding.
- Create and manage mulitiple SSH tunnels.
- SSH Version 1 and Version 2 are supported.
- Comperssion is supported.
- Remote forwarding, local forwarding and dynamic forwarding are supported.
- Hides in the system tray and does not require any desktop space.
- System tray pop up menu for easy access to main functions.