Gtk-gnuthttp://www.aliyun.com/zixun/aggregation/39811.html ">ella is a fully functional Gnutella client, using GTK +. It contains all the Gnutella features that are widely deployed, including DHT support. This is very effective and takes up very little CPU time and memory. 7x24-hour operation. It is fully compatible with UPnP and NAT-PMP, so it is easy to use and supports the firewall's port map ...
Gtk-gnuthttp://www.aliyun.com/zixun/aggregation/39811.html ">ella is a fully functional Gnutella client that uses gtk++. It contains all the features that deploy Gnutella, and supports DHT. It features minimal CPU time and memory, 7x24-hour uptime, fully compliant UPnP and NAT-PMP, and supports firewall port mapping technology. Currently supported operating system: L ...
Peer-to-peer is a technology, but it's more of a thought that has the potential to change the fundamentals of the Internet. (1) Peer-to-peer concept of Peer-to-peer is peer-to-peer abbreviation, peer in English has "(status, ability, etc.) equivalent", "colleagues" and "partner" and so on. In this way, Peer-to-peer can also be understood as the meaning of "partner to partner", or Peer-to-peer networking. At present, it is believed that it has great future in enhancing the communication, file Exchange and distribution calculation of the people in the network. Simply put, the Peer-to-peer direct ...
MLDonkey is an open source, free, cross-platform, multi-protocol peer-to-peer sharing software. was initiated by Fabrice Le Fessant and Simon Patarin from January 2002. Originally a clone of an electric Donkey (eDonkey2000) under UNIX and Linux. Later transplanted to the http://www.aliyun.com/zixun/aggregation/11691.html ">macosx and wind ...
As enterprise management becomes more and more dependent on the efficiency of the network and the applications running on the network, Managing enterprise network bandwidth becomes increasingly important. Wilton launched the Flow management products are committed to protect the enterprise's key business bandwidth resources, to limit the misuse of the bandwidth of the business, to avoid network congestion, for enterprises to create transparent visibility of the network application environment. One of the key to this type of equipment is the analysis of existing customer traffic, which is based on the analysis of the Application Layer network protocol. Based on the DPI (depth packet detection)/DFI (deep flow detection) technology, we have a wide range of current network ...
Summary: When tens of thousands of your viewing process by the fast-seeding is spoiled into three steps: Search the movie, click on the website, fast playback, artifact achievement legend. This is the fast-seeding company's evaluation of the fast-seeding software it has developed. Today, this legendary artifact in relation to the map "when tens of thousands of your viewing process was fast broadcast ' spoiled ' into three steps: Search movies, click on the website, Fast play, ' artifact ' achievement legend." "This is the fast-seeding company's evaluation of the fast-seeding software it has developed." Now, this "achievement legend" of the "artifact" in the phase ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.