peer to peer applications

Want to know peer to peer applications? we have a huge selection of peer to peer applications information on alibabacloud.com

Build Peer-to-peer network in Windows XP

Peer-to-peer networks are generally suitable for the interconnection of several or more than 10 computers in a home or small office, and do not require too many public resources, and simply realize the sharing of resources between several computers. When a Peer-to-peer network is built, the user can choose the total li

Peer-to-peer Penetration Research _p2p

The so-called peer-to-peer is point-to-point communication. Search related articles before, a lot of "peer-to-peer network penetration", thinking about whether there are "outside the net penetrate." Intranet is not easy. The extranet is not more difficult and more advanced. Here on the laughable,

How do you use a peer-to-peer terminator?

Peer-to-peer Terminator is a LAN control software, his main function is to control and limit the same LAN other Internet users, such as the restrictions do not let others on the QQ, do not let others open the Web page and do not let others download, as long as he and you within the same network you can control him, and the magic is, Instead of moving his computer or installing something on his computer, you

N2N peer-to-peer VPN Network

The N2N peer-to-peer VPN Network n2n is a two-layer virtual private network that allows users to develop typical P2P applications in the network rather than at the application layer. This means that the user can obtain the local address transparently, as long as the new IP address is in a sub-network, no matter where the two machines are, ping the other side. Mai

Using Java to cheat similar peer-to-peer terminators through ARP to implement data packet listening _java

If there's anything that's not right lately, that's the pain of sharing a network, especially when other people are using peer-to-peer tools to download software, and while you're looking at the Web's progress bar a little bit, that pain can be excruciating for my cyber-worm-level people. Absolutely can not endure, and then the Internet to download Peer-to-

Use Iptables to extend total blocking of peer-to-peer traffic

Linux is a good thing ah! Linux system is not only stable, relatively secure platform, but also open source and is free, which iptables is more powerful, so the author company has been using him to do the company's internal gateway, and through the iptables Setup to do some preliminary security aspects. So from the online query iptables information, oh, many netizens have done related attempts, and due to peer-to-

Peer-to-peer Technology in C # to achieve point-to-point chat

Peer-to-peer previously in the use of VB to achieve multithreading, found that there is a certain degree of difficulty. Although there are also such methods, but not satisfactory, but in C #, to write multithreaded applications is quite simple. This article will give a brief introduction, to play a role in the study! . NET defines the function of multithreading i

Diagram of peer-to-peer wireless network connection settings

Peer-to-Peer wireless network connection settings are a way to achieve wireless Internet sharing. How can this approach be achieved? This article will show you how to configure peer-to-peer wireless network connections. We hope that you can learn this knowledge through the graphic introduction in this article. Note tha

Several ways to disable Peer-to-peer download tools

Method one, by modifying the Group Policy Editor to disable the Peer-to-peer download tool, how to open Group Policy is to hold down the "Win+r" key to open the Run window, then enter "Gpeidit.msc" on the Run input box, and then press ENTER to open Group Policy. As shown in the figure: 1, and then in the Open Group Policy Editor, click the User Configuration-Admin template-system, and then on t

[Reading Notes] iOS-deep anatomy of peer-to-peer networks, Reading Notes ios-

[Reading Notes] iOS-deep anatomy of peer-to-peer networks, Reading Notes ios- The Protocol itself is a custom protocol running on UDP. I decided to use a custom protocol as simple as that. First, the current task seems simple enough, so it is easier to build a custom protocol directly than to try to improve a current protocol. Second, custom protocols can minimize overhead and improve performance as much as

TCP to realize Peer-to-peer communication, TCP pass through NAT and TCP hole

address translation sent to the public network server (such as the "server" in the above), the connection is established after the two-way transmission of data, NAT devices allow private network host to send data to the public network host actively, but the reverse direction of the active transmission, but in a number of special occasions in different private network host to interconnect (such as Peer-to-peer

It value-added services-Customer Stories (iii): Hefei fire Technology, Java and peer-to-peer network lending system development guidance

Customer Overall situation:Hefei Pay-fire technology, Anhui Hefei is a main development and operation of small and medium-sized enterprises,http://weimarket.cn/. the company's preparation, creation, twists and turns of entrepreneurial experience, I have been concerned. Because 2 bosses, are my classmate alumni, are Wuhan University of Science and Technology-computer academy-level 08. customer a customer is to do peer-network borrowing, before they h

Ethernet Square Source Peer-to-peer Network and node discovery mechanism __p2p

Http://www.cnblogs.com/blockchain/p/7943962.html Directory 1 Distributed Network Introduction Introduction of 1.1 Kad network 1.2 Kad network node distance 1.3 K Barrel 1.4 Kad Communication protocol 2 Neighbor Nodes Main members of the 2.1 nodetable class 2.2 Neighbor Node Discovery method 2.3 Neighbor node network topology and refresh mechanism. 1 Distributed Network Introduction Ethernet Square bottom of the distributed network is Peer-to-

Peer-to-peer Seed Finder which version works best

First Baidu "Peer-to-peer seed finder" then appear a lot of search page click 3.5 version, enter can: Then follow the prompts to download the Finder: Then open the software into the Peer-to-peer software interface (which will prompt you for firewall security alerts, this time only to unblock)

Can the wireless network card be transferred on a peer-to-peer basis?

Many users have purchased the wireless network card, want to carry on the Peer-to-peer transmission, then, the wireless network card can transmit equally? There are many types of wireless network card, PCI network card, PCMCIA network card, USB network card, these are support point-to-point mode of Peer-to-peer

How to build Peer-to-peer network under XP system

How to build Peer-to-peer network under XP system Specifically as follows: 1, first, in the Control Panel double-click Open and dial-up connection, if you see the local connection, it proves that the NIC is working properly. Choose to open the properties of the local area connection, and you will see the dialog box shown in Figure 1. The system has already installed the necessary agreement; 2, sel

What if the Peer-to-peer seed Finder can't find anything?

Peer-to-peer Seed Finder can't find a way to do that. There are a lot of friends that use a peer-to-peer seed search artifact Nothing can be found, this is how it? The following is to understand the details of the It is recommended that you use the old version of, such as 1.0, no ads, search efficiency is highe

The Peer-to-peer network communication program implemented by C #

On the internet to see a lot of programs (QQ, Azureus, Ants, PPStream) have achieved peer-to-peer, previously felt that the technology is very advanced. Through this period of study only found that the simple realization of peer-to-peer in the LAN communication is very easy, but to achieve the external network penetrat

A Peer-to-peer seed search artifact--an extraordinary search for resources seed method

Search software, download decompression, get executable program, such as figure. Double-click to open. Peer-to-peer seed Search Artifact Program main interface, first look at the lower left corner of the connection server is normal. Then look at the lower right corner of the search authority, if it is low, click here, you can set the home page according to his requirements, I personally is not set.

[Peer-to-peer technology] Summary of mandatory materials from the front-end to the big God (2), Summary of great god data

[Peer-to-peer technology] Summary of mandatory materials from the front-end to the big God (2), Summary of great god data In the article "technical materials for front-end development and chicken soup Summary (1)", I will introduce you to the basic materials for front-end entry, today, I have summarized five articles on advanced technical practices. Let's take a look! In addition, engineers who prefer to w

Total Pages: 15 1 .... 3 4 5 6 7 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.