Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure.
The tunneling capability of SSH Secure Shell is a feature that allows, for example, company employees to access their email, company intraweb pages and shared files securely by even when working from home or on the road.
Tunneling makes it possible to access email from any type of Internet service (whether accessed via modem, a DSL line or a cable connection, or a hotel Internet service). As long as the user has an IP connection to the Internet she can get her mail and access other resources from anywhere in the world securely.
This often is not the case with more traditional IPSec based VPN technologies because of issues with traversing networks that are implementing Network Address Translation (NAT) - this is especially the case in hotels. NAT breaks an IPSec connection unless special protocols such as NAT-Traversal are implemented on the client and gateway.
The client-server applications using the tunnel will carry out their own authentication procedures, if any, the same way they would without the encrypted tunnel.
The protocol/application might only be able to connect to a fixed port number ( e.g. IMAP 143). Otherwise any available port can be chosen for port forwarding.
- Create and manage mulitiple SSH tunnels.
- SSH Version 1 and Version 2 are supported.
- Comperssion is supported.
- Remote forwarding, local forwarding and dynamic forwarding are supported.
- Hides in the system tray and does not require any desktop space.
- System tray pop up menu for easy access to main functions.
- Online support, online upgrade are supported.
- Windows XP compatible user interface.
» version 18.104.22.168 - posted on 2006-05-29
Update to 2.0
License for use and distribution.
The Internet Secure Tunneling is shareware. This means:
Han-soft Software exclusively owns all copyrights to Internet Secure Tunneling.
Anyone may use this software during a test period of 30 days. Following this test period of 30 days or less, if you wish to continue to use Internet Secure Tunneling, you MUST register.
Once registered, the user is granted a non-exclusive license to use Internet Secure Tunneling on one computer (i.e. a single CPU), for any legal purpose, at a time. The registered Internet Secure Tunneling software may not be rented or leased, but may be permanently transferred, if the person receiving it agrees to terms of this license. If the software is an update, the transfer must include the update and all previous versions.
The Internet Secure Tunneling unregistered shareware version may be freely distributed provided the distribution package is not modified. No person or company may charge a fee for the distribution of Internet Secure Tunneling without written permission from the copyright holder.
INTERNET SECURE TUNNELING IS DISTRIBUTED "AS IS". NO WARRANTY OF ANY KIND IS EXPRESSED OR IMPLIED. YOU USE AT YOUR OWN RISK. THE AUTHOR WILL NOT BE LIABLE FOR DATA LOSS, DAMAGES, LOSS OF PROFITS OR ANY OTHER KIND OF LOSS WHILE USING OR MISUSING THIS SOFTWARE.
You may not use, copy, emulate, clone, rent, lease, sell, modify, decompile, disassemble, otherwise reverse engineer, or transfer the licensed program, or any subset of the licensed program, except as provided for in this agreement. Any such unauthorized use shall result in immediate and automatic termination of this license and may result in criminal and/or civil prosecution.
Han-soft Software reserves all rights not expressly granted here.
Installing and using Internet Secure Tunneling signifies acceptance of these terms and conditions of the license.
If you do not agree with the terms of this license you must remove Internet Secure Tunneling files from your storage devices and cease to use the product.