Search N5 Net Software Repository:
Search Files
Sponsor:
Browse:
- Audio & Multimedia (1643)
- Business (3971)
- Communications (1197)
- Desktop (222)
- Development (607)
- Education (291)
- Games & Entertainment (731)
- Graphic Apps (698)
- Home & Hobby (108)
- Network & Internet (593)
- Security & Privacy (536)
- Servers (69)
- System Utilities (31267)
- Web Development (297)
Areas Of Interest
Authors Area
Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.
wodSSHTunnel 1.9.6
wodSSHTunnel component is server-type component that will add secure tunneling (based on SSH protocol) capabilities to your application. Based on your rules and definitions, it will accept local connections, encrypt it and forward to SSH server (where they will be decrypted and sent to destination host). SSH server is required for this component to work - encryption will take place between local computer (running wodSSHTunnel) and SSH server of your choice. It can work in both sides - it can accept local connections and forward them to the server, or can initiate connections towards local services when notification is received from SSH server for 'remote port forwarding' request - based on your previous request. Basically, to understand what happens: instead of using direct connections to the server, through insecure internet,you would connect to your SSH server using encrypted connection, and SSH server would connect to services you require. Usually, most of those services will reside on same server as SSH server, or will be in protected network. Also, not only it will secure connections - but it will also allow you to create VPN to your services. How does it work? You setup any number of Channels - these are objects that will keep information about specific port forwarding request. For example, you can create Channel that will listen on local port 80, and forward all requests to SSH server on his port 80. After you Start that channel, you can try to connect using your web browser to http://localhost and you should see web contents as held on SSH server. Cute, isn't it? After Channel is created and started, it will accept Users. Each channel stores collection of users connected to it.Once new User tries to connect to the channel, you will receive event where you can allow or deny user to use secure channel - once again, it's your decision. If you allow user to connect and use channel, everything is done by wodSSHTunnel, and you don't need to do anything else
Specifications:
Version: 1.9.6 |
Download
|
Similar Products:
VISCOM IMAGE VIEWER CP GOLD SDK ACTIVEX 21.0
Development :: Active X
Powerful document imaging sdk activex, good quality pdf viewer, view tiff, pdf, image files, read Barcode, Write Barcode, OCR searchable PDF for C++ , C#, VB.NET , VB, Delphi, Vfp, MS Access.
Windows | Shareware
Read More
VISCOMSOFT IMAGE VIEWER CP PRO SDK 23.0
Development :: Active X
Document Imaging SDK for WinForms, VB6, VFP, MS Access, PDF Creator, Loading and printing PDF, BMP, GIF, ICO, JPEG, JPEG 2000, PCX, PNG, PSD, TIF, WMF, WBMP, TGA. Read, write EXIF image information.Including TIFF tags. OCR to searchable PDF. TIFF PDF to docx, Convert PDF, BMP, GIF, JPG, PNG, ICO, TIF image files to PDF file. Convert multipage TIF to multipage PDF. Autofill PDF form fields, save to image file
Windows | Shareware
Read More
Development :: Active X
wodTelnetDLX is a telnet client component ready to connect to various terminal based clients, most commonly to UNIX telnet daemon. Besides supported Telnet protocol, it also supports secured communication (through encryption) using well known SSH (SSH1 and SSH2 are supported), as well as SSL/TLS (Secure Socket Layer protocol). ActiveX version of the component has its own Terminal GUI that supports VT100 and Linux emulation.
Windows | Shareware
Read More
Development :: Active X
Lightweight component that provides strong encryption for your applications. It provides supports for most common crypto algorithms, such as AES, DES, TripleDES, Blowfish, Cast, RC2, RC4, RC5 for symmetric encryption and decryption, RSA, DSA, for making and verifying signatures, and MD5, SHA1 for creating hashes
Windows | Shareware
Read More