Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would...
The program IPTunnelManager is used for IP tunneling with the options for compressing and encrypting traffic.
Thus, the program makes it possible to create a secure connection for any application...
Tunnels Windows Applications onto remote desktops (including Linux and Mac): Install the application once on the server & eliminate the administration hassle of deploying the applications on all...
wodSSHTunnel component is server-type component that will add secure tunneling (based on SSH protocol) capabilities to your application. Based on your rules and definitions, it will accept local...
Private Shell is an advanced and easy-to-use SSH and SFTP client for Windows providing remote computer access with SSH1 and SSH2 protocols. Major features include full SSH protocol support, public...
Increase your privacy and freedom with this filtering proxy. You control site access for the kids while letting you view your webmail from work even when its blocked. Lets you help friends surf...
YBridge allows:
Home PC users:
- Securely access your home PC from outside your home or while traveling
- Map your home drive on the work PC (some bosses might not like it ;)
-...
ViPNet TUNNEL is designed for making protected virtual private networks between offices or LANs to communicate confidentially over a public network, like Internet or other network environment based...
TunnelEx is innovative software designed to redirect data removing all the obstacles that can be thrown in its way, bypass firewalls and any restrictions imposed by the local security policy....
SecureBridge is a library of nonvisual components for Delphi, Delphi for .NET and C++Builder. They provide support for secure connection with remote services using SSH protocol.
Avira Antivirus for WebGate reliably secures plain HTTP and FTP connections, by scanning, filtering and blocking the access to all unwanted programs and viruses from the Internet. It checks emails,...