• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 709
  • Last Modified:

Firewall Bypasser...

Dear Friends,

     I just want to know about Firewall Bypasser Is it available in net for downloads? Send me the link where to download or any materials regarding this.

D.M
0
dm_oracle
Asked:
dm_oracle
  • 4
  • 3
1 Solution
 
qwaleteeCommented:
http://www.http-tunnel.com

Allows connecting from inside your firewall to outside resources that your firewall does not nornally allow connection to.  Does this via SOCKS proxying.  Applications must either be SOCKified, or you must use a dunamic SOCKSifier.

Free service is slow.  Paid service is inexpensive, and offers OK speed.
0
 
zookeepa1Commented:
Sounds dangerous.
0
 
SteveJCommented:
Netcat can do the same . . . free. You just need enough net knowledge to be able to use it. If you are asking about how to bypass firewalls, I doubt this is the case.

Good luck,
Steve
0
VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

 
qwaleteeCommented:
SteveJ,
Netcat requires that you set up your own listener.  The nice ting about http-tunnel is that you don;t need to know much to set it up, and it works on demand for anything, because the server is always there.
0
 
SteveJCommented:
Good point, qwaletee . . . I was assuming . . .
0
 
qwaleteeCommented:
zookeepa1,
Absolutely.  Isn't the advice here always laced with caveat emptor?
0
 
SteveJCommented:
That's odd, qwaletee. I lace my shoes with caveat emptor.

Steve
0
 
qwaleteeCommented:
Well, Steve, you should use neither full balss of twine nor young rose stems to replace your sholaces.  Then, you would not need caveat emptor when lacing your shoes.
0

Featured Post

Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

  • 4
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now