NAT协议完整源代码,可以应用在vxworks或linux上作为IP地址转发的源程序-integrity agreement NAT source code can be applied to VxWorks or Linux IP addresses as a source of transponders Update : 2008-10-13
Size : 1.12mb
Publisher : 曹长斌
经常有对P2P原理的讨论,但是讨论归讨论,很少有实质的东西产生(源代码)。呵呵,在这里我就用自己实现的一个源代码来说明UDP穿越NAT的原理。-often principle of peer-to-peer discussions, but the discussions under discussion, with little substantive things have (source code). Oh, I am here on their own to achieve one of the source code to illustrate the UDP Through NAT principle. Update : 2008-10-13
Size : 4.39kb
Publisher : 吴花
用UDP实现了p2p是的穿透,P2PServer运行在一个拥有公网IP的计算机上,P2PClient运行在两个不同的NAT后(注意,如果两个客户端运行在一个NAT后,本程序很可能不能运行正常,这取决于你的NAT是否支持loopback translation,详见http://midcom-p2p.sourceforge.net/draft-ford-midcom-p2p-01.txt,当然,此问题可以通过双方先尝试连接对方的内网IP来解决,但是这个代码只是为了验证原理,并没有处理这些问题),后登录的计算机可以获得先登录计算机的用户名,后登录的计算机通过send username message的格式来发送消息。如果发送成功,说明你已取得了直接与对方连接的成功。-achieved using UDP p2p is the piercing, P2PServer operation in a public IP with the computer, P2PClient running in two different NAT after (Note If two clients running on a NAT, the procedure may not be operating normally, It depends on whether you support the loopback NAT translation, see http : / / midcom-p2p.sourceforge.net/draft-ford- midcom - p2p - 01.txt, of course, this problem can be made by the two sides try to connect with each other to resolve the IP network, but the code is to verify principle, not dealing with these issues), after the computer can log logged in a computer user name, after logged by the computer username send the message format to send information. If the success of this show that you have made a direct link with each other's success. Update : 2008-10-13
Size : 31.16kb
Publisher : 刘冰
金山毒霸6的三大另类用法;看看你用的XP是不是原版;利用WINDOWS2003的NAT功能配置简单的防火墙;你想知道谁在偷窥你的电脑吗?;您必须知道的WINDOWS XP的一些小秘密等。-hand over six of the three alternative usage; You look at the XP is not original; the use of NAT function WINDOWS2003 simple firewall configuration; you want to know who is peeping at your computer? ; You need to know Windows XP some small secrets. Update : 2008-10-13
Size : 21.39kb
Publisher : 林
一个模拟P2P聊天的过程的源代码,过程很简单,P2PServer运行在一个拥有公网IP的计算机上,P2PClient运行在两个不同的NAT后(注意,如果两个客户端运行在一个NAT后,本程序很可能不能运行正常,这取决于你的NAT是否支持loopback translation,详见http://midcom-p2p.sourceforge.net/draft-ford-midcom-p2p-01.txt,当然,此问题可以通过双方先尝试连接对方的内网IP来解决,但是这个代码只是为了验证原理,并没有处理这些问题),后登录的计算机可以获得先登录计算机的用户名,后登录的计算机通过send username message的格式来发送消息。如果发送成功,说明你已取得了直接与对方连接的成功。
程序现在支持三个命令:send , getu , exit
send格式:send username message
功能:发送信息给username
getu格式:getu
功能:获得当前服务器用户列表
exit格式:exit
功能:注销与服务器的连接(服务器不会自动监测客户是否吊线)-a peer-to-peer chatting simulation of the process of source code, the process is very simple. P2PServer operation in a public IP with the computer, P2PClient running in two different NAT after (Note If two clients running on a NAT, the procedure may not be operating normally, It depends on whether you support the loopback NAT translation, see http : / / midcom-p2p.sourceforge.net/draft-ford- midcom - p2p - 01.txt, of course, this problem can be made by the two sides try to connect with each other to resolve the IP network, but the code is to verify principle, not dealing with these issues), after the computer can log logged in a computer user name, after logged by the computer username send the message format to send information. If the success of this show that you have made a direct link Update : 2008-10-13
Size : 30.48kb
Publisher : 李俊升
论坛上经常有对P2P原理的讨论,但是讨论归讨论,很少有实质的东西产生(源代码)。-regular forum for the discussion of P2P principle, but the discussion under discussion, Few things have real (source code). Update : 2008-10-13
Size : 31.46kb
Publisher : 3Q
本程序为一个真正点对点通讯示范程序:) 实现内网到内网的直接连接(QQ用的技术)
使用Delphi实现。在网上未看到类似的程序,特此发布提供喜欢的朋友参考。
通过UDP来实现穿透NAT的点对点通讯。
>>原定
程序设置一个共享目录里边所有文件都可供别人多点下载(类似BT)
独立服务端 负责消息中转、用户登陆
客户端从服务端获取用户列表 然后直连各个用户 以实现 聊天 语音 视屏 文件传输等可能的一切服务
>>>结果
由于工作太忙<一个小借口^O^>,文件传输、语音 视频等服务一直没去实现。
希望有朋友在此基础上完善后能发布了给大家学习:)
使用2个第3方控件
DXSock
Rzaize 3.10
作者:马敏钊 QQ 22900104 Email: mmzmagic@sina.com
为心爱的DELPHI出一点力,共同提高,共同进步-the procedures for a real point-to-point communication model : ) within the network to achieve within the network directly connected (QQ the technology used) using Delphi. The Internet has not seen a similar procedure, is hereby issued to provide information like friends. UDP through NAT to achieve penetration of point-to-point communications. Update : 2008-10-13
Size : 1.22mb
Publisher : 郑敏福
介绍网络通讯的文章很多,但他们的代码大都没有解决地址转化问题,本程序可以穿越NAT进行网络通讯.-on network communications are many articles, but most of their code into address unresolved issues, The procedure to pass through the NAT for network communications. Update : 2008-10-13
Size : 15.59kb
Publisher : 龚希鹏
ANts P2P realizes a third generation P2P net.
It protects your privacy while you are connected and makes you not trackable,
hiding your identity (ip) and crypting everything you are sending/receiving from others.
Features
Open Source Java implementation (GNU-GPL license)
Multiple sources download
Swarming from partial files
Automatic resume and sources research over the net
Search by hash, string and structured query
Completely Object-Oriented routing protocol
Point to Point secured comunication: DH(512)-AES(128)
EndPoint to EndPoint secured comunication: DH(512)-AES(128)
Serverless GWebCache-based peer dicovery procedure
IRC based peer discovery system
IRC embeded chat system
Full text search of indexed documents (pdf, html, txt, doc etc) -> QUERY REFERENCE.
Distributed/Decentralized Search engine
HTTP tunneling
ANts allow P2P communications through any kind of HTTP Proxy
ANts allow P2P communications through any kind of NAT or traffic filtering system
-ANts P2P realizes a third generation P2P ne t. It protects your privacy while you are connec ted and makes you not trackable, hiding your identity (ip) and crypting everyth ing you are sending / receiving from others. Fea tures Open Source Java implementation (GNU-GP L license) Multiple sources download Fog from Automatic resume partial files and source 's research over the net Search by hash. and structured query string Completely Object - Oriented routing protocol Point to Point secu red comunication : DH (512) - AES (128) EndPoint to secure EndPoint d comunication : DH (512) - AES (128) Serverless GWebCache-base d peer dicovery procedure IRC based peer discov ery system IRC chat system embeded Full text sea rch of indexed documents (pdf, html, txt, doc etc) - Update : 2008-10-13
Size : 7.38mb
Publisher : 谭朋柳
P2P 之 UDP穿透NAT的原理与实现(附源代码)。用源代码来说明UDP穿越NAT的原理。这是一个不错的用于研究P2P原理程序。
-P2P UDP penetrate NAT's Theory and Implementation (source code). With the source code to illustrate the UDP Through NAT principle. This is a good principle for the study of P2P procedures. Update : 2008-10-13
Size : 30.72kb
Publisher : Arnold
P2P穿透NAT的一次探讨和局部实现,希望有兴趣的同志可以在此基础上真正实现peertopeer!-P2P NAT a penetrating exploration and partial realization, hope that the comrades are interested in the real basis of this realization peertopeer! Update : 2008-10-13
Size : 16.89kb
Publisher : 叶盼盼
这是对穿透NAT原理描述的文档。来自deltathree公司的资源-This is the principle of NAT penetrating description files. From the resources deltathree Update : 2008-10-13
Size : 687.12kb
Publisher : 凌建发
P2P之UDP穿透NAT的原理与实现,希望对初学者有帮助.-P2P UDP penetrate NAT's Principle and realize, and I hope to help beginners. Update : 2008-10-13
Size : 1.9mb
Publisher : lixtt
P2P之UDP穿透NAT的原理与实现,包括客户端和服务端,以及相关技术文档-P2P UDP penetrate NAT's Theory and Implementation, including the client and server, and the relevant technical documentation Update : 2008-10-13
Size : 34.77kb
Publisher : 张梁
经常有对P2P原理的讨论,但是讨论归讨论,很少有实质的东西产生(源代码)。在这里我就用自己实现的一个VC源代码来说明UDP穿越NAT的原理。-often principle of peer-to-peer discussions, but the discussions under discussion, with little substantive things have (source code). Here, I used one of its own to achieve VC source code to illustrate the UDP Through NAT principle. Update : 2008-10-13
Size : 29.85kb
Publisher : 何智峰