Title:
research-of-network-penetrating Download
Description: Firstly,this paperanalyzes and esearches the popular application tools like
Privoxy,Stunnel and TOR,then,apenetrating proxy system which called
PROProxy has been designed and implemented.This system uses TOR as the
platform to communicate anonymously
with outside,implements them utuaI conversion between HTTP and SOCKS5
proxymodules,and solve the problem
of leaking address of visiting server
by local DNS.
To Search:
File list (Check if you may need any files):
网络穿透技术的研究.pdf