(sometimes we provide two download links because it may happen that the main server / link is overloaded or slow or non responding - the files are identical. Just choose one, save to the Desktop, double click to install)
: to our best knowledge this download comes from a website that is safe
(the last time we checked it, it was), but for your peace of mind (and better safe than sorry) we advise you to run an antivirus
on the downloaded file. Do not rely on MSWindows, Internet explorer, or on the electronic signature: a unsigned download is usually as safe as a signed one, signed just means the author paid Microsoft or Verisign for a stamp, it does not mean verified. Please kindly report us problems with detail (click here to report)
, if any.
The program IPTunnelManager is used for IP tunneling with the options for compressing and encrypting traffic. Thus, the program makes it possible to create a secure connection for any application or service using TCP/IP. Data compression provides a significant decrease in the volume of data transferred via the network.
(Compressing and encrypting traffic
The program IPTunnelManager is used for IP tunneling with the options for compressing and encrypting traffic.
Thus, the program makes it possible to create a secure connection for any application or service using TCP/IP (HTTP, FTP, SMTP, POP, NNTP, SNPP, Telnet, etc.). It is especially important for those TCP/IP services and applications (for example, FTP, Telnet, various DBMS) that transfer passwords openly when establishing a connection between a client and a server. IPTunnelManager starts encrypting traffic from the moment when a TCP/IP connection is established, that is why all data transferred between a client and a server are encrypted. Besides, IPTunnelManager protects transferred data from being changed by checking the integrity of the transferred data using a 128-bit MAC algorithm.
Data compression provides a significant (not less than 3 times less) decrease in the volume of data transferred via the network.
Multithreaded, highly effective, streaming traffic processing produces practically no negative influence on the channel capacity.
To create a secure connection, the program does not require opening additional ports and it does not transfer keys via the network (as it uses a synchronous algorithm to encrypt traffic). In fact, one and the same password is used to authorize a client and to encrypt data.
Internet program and intranet internet program and telnet intranet program and proxy telnet program