Monthly Archives: March 2017

[G] Luna Injector V-1.2

This tool is equipped with specific tutorials which make your connection is unlimited.  Our tool has been tested before.  We are sorry if there are no successful use of our tools. We just want to share. There is no risk of using tools from us, but if anything, the risk is only a matter of success or not success of his course using our tools.

This tool includes some hosts, including: Luna Jabar and Luna Non Jabar. Probably, work for Ajis 0p0k also.  Just try it one by one which host that work in your location. This inject support for SSH and VPN. It’s also support original proxy or squid proxy.  For now, these inject just work for our account from GlobalSSH only.  You can’t use this inject with another account from another SSH Provider.  🙂

When you are finished extracting this file, please read our notepad first (readme.txt).  You can found important information about this inject in our notepad.  So, don’t forget to read our notepad first which included in this file. When you open this inject, please see the tutorial tab. It may help you when you want to use this inject. Our default listen port is 100. Our entire tools has been set like that. You must remember it to avoid wrong setting.

Screenshot Tool:

 

Screenshot VirusTotal:

 

We’re sorry, all of our tools which available on this site, have to use a password rar or HWID.  We have a purpose why we have to do this.  It does because, we don’t want this inject being reupload on another site.

How to get the password or HWID?
If you want to know about the password or HWID of this inject, you can contact us via facebook message to this account: fb.me/dikaputrileo.      We have to say sorry if we can’t reply your message shortly after your message sent to us.  We can’t online in facebook for 24 hours of course.  But, we promise we’ll reply all of the message which sent to us.

Below are the download link for this tool:
[G] Luna Injector V-1.2

 

[G] Eksis Injector V-2.1 RevA

This tool is equipped with specific tutorials which make your connection is unlimited.  Our tool has been tested before.  We are sorry if there are no successful use of our tools. We just want to share. There is no risk of using tools from us, but if anything, the risk is only a matter of success or not success of his course using our tools.

This tool includes some hosts, including: Eksis Zero and Eksis KZL (Chat-Socmed) for jabar. Probably, work for Eksis Non Jabar also.  Just try it one by one which host that work in your location. This inject support for SSH and VPN. It’s also support original proxy or squid proxy.  For now, these inject just work for our account from GlobalSSH only.  You can’t use this inject with another account from another SSH Provider.  🙂

When you are finished extracting this file, please read our notepad first (readme.txt).  You can found important information about this inject in our notepad.  So, don’t forget to read our notepad first which included in this file. When you open this inject, please see the tutorial tab. It may help you when you want to use this inject. Our default listen port is 100. Our entire tools has been set like that. You must remember it to avoid wrong setting.

Screenshot Tool:

 

 

 

Screenshot VirusTotal:

 

 

 

We’re sorry, all of our tools which available on this site, have to use a password rar or HWID.  We have a purpose why we have to do this.  It does because, we don’t want this inject being reupload on another site.

How to get the password or HWID?
If you want to know about the password or HWID of this inject, you can contact us via facebook message to this account: fb.me/dikaputrileo.      We have to say sorry if we can’t reply your message shortly after your message sent to us.  We can’t online in facebook for 24 hours of course.  But, we promise we’ll reply all of the message which sent to us.

Below are the download link for this tool:
[G] Eksis Injector V-2.1 RevA

[G] Luna Injector V-1.1 RevA

This tool is equipped with specific tutorials which make your connection is unlimited.  Our tool has been tested before.  We are sorry if there are no successful use of our tools. We just want to share. There is no risk of using tools from us, but if anything, the risk is only a matter of success or not success of his course using our tools.

This tool includes some hosts, including: Luna Jabar and Luna Non Jabar. Probably, work for Ajis 0p0k also.  Just try it one by one which host that work in your location. This inject support for SSH and VPN. It’s also support original proxy or squid proxy.  For now, these inject just work for our account from GlobalSSH only.  You can’t use this inject with another account from another SSH Provider.  🙂

When you are finished extracting this file, please read our notepad first (readme.txt).  You can found important information about this inject in our notepad.  So, don’t forget to read our notepad first which included in this file. When you open this inject, please see the tutorial tab. It may help you when you want to use this inject. Our default listen port is 100. Our entire tools has been set like that. You must remember it to avoid wrong setting.

Screenshot Tool:

 

Screenshot VirusTotal:



 

We’re sorry, all of our tools which available on this site, have to use a password rar or HWID.  We have a purpose why we have to do this.  It does because, we don’t want this inject being reupload on another site.

How to get the password or HWID?
If you want to know about the password or HWID of this inject, you can contact us via facebook message to this account: fb.me/dikaputrileo.      We have to say sorry if we can’t reply your message shortly after your message sent to us.  We can’t online in facebook for 24 hours of course.  But, we promise we’ll reply all of the message which sent to us.

Below are the download link for this tool:
[G] Luna Injector V-1.1 RevA

OpenVPN – Open Source VPN

OpenVPN is a full-featured open source SSL VPN solution that accommodates a wide range of configurations, including remote access, site-to-site VPNs, Wi-Fi security, and enterprise-scale remote access solutions with load balancing, failover, and fine-grained access-controls. Starting with the fundamental premise that complexity is the enemy of security, OpenVPN offers a cost-effective, lightweight alternative to other VPN technologies that is well-targeted for the SME and enterprise markets.

OpenVPN’s lightweight design sheds many of the complexities that characterize other VPN implementations. The OpenVPN security model is based on SSL, the industry standard for secure communications via the internet. OpenVPN implements OSI layer 2 or 3 secure network extension using the SSL/TLS protocol, supports flexible client authentication methods based on certificates, smart cards, and/or 2-factor authentication, and allows user or group-specific access control policies using firewall rules applied to the VPN virtual interface. OpenVPN is not a web application proxy and does not operate through a web browser.

OpenVPN runs on Linux, Windows XP/Vista/7 and higher, OpenBSD, FreeBSD, NetBSD, Mac OS X, and Solaris. With OpenVPN you can:

  • tunnel any IP subnetwork or virtual ethernet adapter over a single UDP or TCP port
  • configure a scalable, load-balanced VPN server farm using one or more machines which can handle thousands of dynamic connections from incoming VPN clients
  • use all of the encryption, authentication, and certification features of the OpenSSL library to protect your private network traffic as it transits the internet
  • use any cipher, key size, or HMAC digest (for datagram integrity checking) supported by the OpenSSL library
  • choose between static-key based conventional encryption or certificate-based public key encryption
  • use static, pre-shared keys or TLS-based dynamic key exchange
  • use real-time adaptive link compression and traffic-shaping to manage link bandwidth utilization
  • tunnel networks whose public endpoints are dynamic such as DHCP or dial-in clients
  • tunnel networks through connection-oriented stateful firewalls without having to use explicit firewall rules
  • tunnel networks over NAT
  • create secure ethernet bridges using virtual tap devices, and
  • control OpenVPN using a GUI on Windows or Mac OS X.

 

ScreenShot:

 

 

 

With those explanations, OpenVPN will give you many advantages. Here are some of them:

  • OpenVPN’s principal strengths include cross-platform portability across most of the known computing universe, excellent stability, scalability to hundreds or thousands of clients, relatively easy installation, and support for dynamic IP addresses and NAT.
  • OpenVPN provides an extensible VPN framework which has been designed to ease site-specific customization, such as providing the capability to distribute a customized installation package to clients, or supporting alternative authentication methods via OpenVPN’s plugin module interface (For example the openvpn-auth-pam module allows OpenVPN to authenticate clients using any PAM authentication method — such methods may be used exclusively or combined with X509 certificate-based authentication).
  • OpenVPN offers a management interface which can be used to remotely control or centrally manage an OpenVPN daemon. The management interface can also be used to develop a GUI or web-based front-end application for OpenVPN.
  • On Windows, OpenVPN can read certificates and private keys from smart cards which support the Windows Crypto API.
  • OpenVPN uses an industrial-strength security model designed to protect against both passive and active attacks. OpenVPN’s security model is based on using SSL/TLS for session authentication and the IPSec ESP protocol for secure tunnel transport over UDP. OpenVPN supports the X509 PKI (public key infrastructure) for session authentication, the TLS protocol for key exchange, the OpenSSL cipher-independent EVP interface for encrypting tunnel data, and the HMAC-SHA1 algorithm for authenticating tunnel data.
  • OpenVPN is built for portability. At the time of this writing, OpenVPN runs on Linux, Solaris, OpenBSD, FreeBSD, NetBSD, Mac OS X, and Windows (2000/XP and later versions). Because OpenVPN is written as a user-space daemon rather than a kernel module or a complex modification to the IP layer, porting efforts are dramatically simplified.
  • OpenVPN is easy to use. In general, a tunnel can be created and configured with a single command (and without any required configuration files). OpenVPN’s documentation contain illustrative of its ease of use.
  • OpenVPN has been rigorously designed and tested to operate robustly on unreliable networks. A major design goal of OpenVPN is that it should be as responsive, in terms of both normal operations and error recovery, as the underlying IP layer that it is tunneling over. That means that if the IP layer goes down for 5 minutes, when it comes back up, tunnel traffic will immediately resume even if the outage interfered with a dynamic key exchange which was scheduled during that time.
  • OpenVPN has been built with a strongly modular design. All of the crypto is handled by the OpenSSL library, and all of the IP tunneling functionality is provided through the TUN/TAP virtual network driver. The benefits of this modularity can be seen, for example, in the way that OpenVPN can be dynamically linked with a new version of the OpenSSL library and immediately have access to any new functionality provided in the new release. For example, when OpenVPN is built with the latest version of OpenSSL (0.9.7), it automatically has access to new ciphers such as AES-256 (Advanced Encryption Standard with 256 bit key) and the encryption engine capability of OpenSSL that allows utilization of special-purpose hardware accelerators to optimize encryption, decryption, and authentication performance. In the same way, OpenVPN’s user-space design allows straightforward porting to any OS which includes a TUN/TAP virtual network driver.
  • OpenVPN is fast. Running Redhat 7.2 on a Pentium II 266mhz machine, using TLS-based session authentication, the Blowfish cipher, SHA1 authentication for the tunnel data, and tunneling an FTP session with large, pre-compressed files, OpenVPN achieved a send/receive transfer rate of 1.455 megabytes per second of CPU time (combined kernel and user time).
  • While OpenVPN provides many options for controlling the security parameters of the VPN tunnel, it also provides options for protecting the security of the server itself, such as –chroot for restricting the part of the file system the OpenVPN daemon has access to, –user and –group for downgrading daemon privileges after initialization, and –mlock to ensure that key material and tunnel data is never paged to disk where it might later be recovered.

 

You Can download OpenVPN software here.

 

 

How to Use [G] Injector with Bitvise and Proxifier – Part2 (Mode No Kejut)

In previous article (part1), we have already learned about How to Use [G] Injector with Bitvise and Proxifier – Mode Kejut. So, it’s time for us to learn Part2 that is How to Use [G] Injector with Bitvise and Proxifier – Mode No Kejut.

How to connect SSH with Bitvise  (Mode No Kejut)
=================================

1. Open MMD. Make sure that your MMD Settings is right. If you don’t have MMD, you can download here

Press Connect when you have finished the settings on MMD

2.Open the [G] Injector, select the most suitable Host that work in your location, and then click “Start”.  You can download our injector in here.

Sett your proxy , choose your payload then start

3.Open Bitvise Profile, make sure that your Settings in the Proxy Settings section, reconnection option, and Socks forwarding are right, and then click “Login”. Wait until Bitvise -SSH connected to the port that you have been set before. If you don’t have bitvise, you can download here.

fill with your SSH account

Sett your Upstream Proxy (127.0.0.1:100 is your [G] Injector Listen Port)

Adjust your Reconnect Timer (“0” for fast reconnect, no delay)

Adjust your Socks Proxy and Port Forwarding (will be use on proxy setting proxifier)

Push Login button, and goes to next step

 

Log when Bitvise is Connected on Forwarder which have we sett before

4.Open Proxifier, make sure the settings are correct too (proxifier rules, proxy-server settings). You can download proxifier here.

    

Sett your Proxy server

Add your Proxy Server as same as your bitvise service Forwarding

Press Yes, and OK to set your proxy server as your default Connection

goes to proxification rules to see your default connection is sett corectly

you can choose by click on the dropdown combox (action), then press OK button

6.Done. You can try to browse anything now with your favorite browser.


See this Video Tutorial for more information:


 

 

 

How to Use [G] Injector with Bitvise and Proxifier – Part1 (Mode Kejut)

In previous article, we have already learned about bitvise and proxifier. So, it’s time for us to learn more how to use both of applications that I said before. We divide how to connect SSH wit Bitvise in 2 way. There are Mode Kejut and Mode Non Kejut. You can see the difference below.

How to connect SSH with Bitvise  (Mode Kejut)
=================================
1.Open the [G] Injector, select the most suitable Host that work in your location, and then click “Start”.  You can download our injector in here.

Sett your proxy , choose your payload then start

 

2.Open Bitvise Profile, make sure that your Settings in the Proxy Settings section, reconnection option, and Socks forwarding are right, and then click “Login”. If you don’t have bitvise, you can download here.

fill with your SSH account

Sett your Upstream Proxy (127.0.0.1:100 is your [G] Injector Listen Port)

Adjust your Reconnect Timer (“0” for fast reconnect, no delay)

Adjust your Socks Proxy and Port Forwarding (will be use on proxy setting proxifier)

Push Login button, and goes to next step

Log when not yet Connected

3.Open MMD. Make sure that your MMD Settings is right. If you don’t have MMD, you can download here

Press Connect when you have finished the settings on MMD

4.Connect MMD (Dial up Connection), wait until Bitvise -SSH connected to the port that you have been set before. If not connect then try again, by disconnect your modem, wait for a while (5-10 seconds) and then connect your MMD again. We called it with reconnect modem.

Log when Bitvise is Connected on Forwarder which have we sett before

5.Open Proxifier, make sure the settings are correct too (proxifier rules, proxy-server settings). You can download proxifier here.

    

Sett your Proxy server

Add your Proxy Server as same as your bitvise service Forwarding

Press Yes, and OK to set your proxy server as your default Connection

goes to proxification rules to see your default connection is sett corectly

you can choose by click on the dropdown combox (action), then press OK button

6.Done. You can try to browse anything now

 


See this Video Tutorial for more information:

—————————————————————————————————————–

See Also the part2 for:

How to connect SSH with Bitvise  (Mode Non Kejut) on another post.

 

 

What you need to know about the Internet – part1

If you will be using the more advanced features of our products, such as tunneling, you will need to understand the basics of how the Internet is structured. This guide is an attempt at relaying some of that understanding on part1.

  • IP addresses
  • DNS names
  • Subnets
  • Types of IP addresses and subnets
  • TCP and UDP
  • Direction of TCP connections

 

IP addresses

Every computer connected to the internet has an Internet Protocol or IP address which identifies the computer on the internet. In the currently most widely used version of the Internet Protocol – version 4 – IP addresses are 4 bytes long and are expressed in the form nn.nn.nn.nn. Each nn is a number between 0 and 255. When you connect to a web server to browse a web page, the DNS name of the web server, e.g. www.bitvise.com, is automatically translated by the software in your machine to an IP address in the nn.nn.nn.nn form. This address is then used to connect to the actual web server.

For example, the IP address of the server hosting www.globalssh.com at the time of this writing is 112.215.52.66. Our primary website, on the other hand, is hosted on several servers, and their IP addresses 107.154.85.120.

In a Windows Command Prompt session, you can discover the IP addresses associated with DNS names using the nslookup command: e.g. ‘nslookup www.globalssh.com’.

 

DNS names

IP addresses are difficult to remember, so the internet provides a translation service which translates memorable names into associated IP addresses. This facility is called the Domain Name System or DNS. You use DNS implicitly every time you type in an address such as ‘www.globalsshcom’ – your browser asks your operating system for translation into an IP address, and the operating system either returns a cached result, or inquires with a DNS server operated by your ISP. This server in turn either returns a cached result or inquires with another DNS server.

 

Subnets

No computer is directly connected to every other computer on the internet. Instead, each computer is a member of one or more subnets. Subnets, in turn, are connected to each other by machines called routers or gateways, which belong to multiple subnets, forwarding internet traffic from one subnet to the other and reverse. In order to successfully communicate with other computers throughout the internet, your computer must know what subnet it is part of, so that it knows what IP addresses are outside your local subnet and must be relayed through the gateway. In addition, your computer must of course also know the IP address of the gateway.

Typically, a subnet is a group of consecutive IP addresses, such as all IP addresses from 11.22.33.0 to 11.22.33.255. This is commonly expressed in either of two formats:

  • The subnet mask format. Here, the subnet is expressed as 11.22.33.0 with subnet mask 255.255.255.0. The subnet mask indicates what bits of the subnet IP address indicate the actual subnet, and what bits are variable, indicating individual computers in the subnet. A byte consists of 8 bits, and 255 is 1111 1111 in binary. Therefore, 255.255.255.0 means that the first 3 bytes of the subnet IP address (11.22.33) indicate the actual subnet, and the last byte can be variable (and indicates computers in the subnet). If the subnet mask were 255.255.0.0, that would mean that the last two bytes are variable.
  • The significant bits format. Here, the subnet is expressed as 11.22.33.0/24, which means subnet 11.22.33.0 with 24 significant bits. The 24 means that the first 24 bits of the subnet mask are 1, and all the following bits are 0. Thus, /24 is equivalent to a subnet mask of 255.255.255.0. /16 is equivalent to a subnet mask of 255.255.0.0. And because there are just 32 bits in an IP address, /32 indicates an IP address with no variable part: a fixed, constant IP address.

 

Types of IP addresses and subnets

There are three major types of IP addresses (or subnets) that you need to be aware of.

  • Public IP addresses. Most IP addresses in the 32-bit address range have the purpose of uniquely identifying a computer on the internet. The IP address 112.215.52.66, for example, is a public IP address that uniquely identifies one of the servers hosting the www.globalssh.com website (and others). This is the type of IP address through which a server must be reachable in order to be accessible to computers throughout the internet.
  • Private subnets. Special ranges of the 32-bit IP address range have been set aside for use in private networks, where the computers in such a network do not need to be directly accessible from the internet as servers (but may nevertheless access the internet through a gateway, as clients). These ranges include:
    10.0.0.0/8 (addresses from 10.0.0.0 to 10.255.255.255)
    172.16.0.0/12 (addresses from 172.16.0.0 to 172.31.255.255)
    192.168.0.0/16 (addresses from 192.168.0.0 to 192.168.255.255)
  • Special IP ranges. There are several special purpose IP ranges, but the one you need to know about is 127.0.0.0/8 (addresses from 127.0.0.0 to 127.255.255.255). This is the local loopback range and is used to connect two programs running on the same machine. Any address in this range can be used for this kind of purpose, but the most commonly used are 127.0.0.1 and 127.0.0.2. The special DNS name ‘localhost’ translates to 127.0.0.1.

 

TCP and UDP

The Internet Protocol itself is a relatively rudimentary protocol which provides only the capability of delivering small chunks of data to other computers. The Internet Protocol does not provide reliability: chunks of data that are sent using the Internet Protocol may be lost. They also may arrive in an order different to the order in which the chunks were sent.

For some types of data transfer, the (un)reliability afforded by the Internet Protocol is fine. When streaming video, for example, it does not matter if chunks that make up intermediate frames of the video are lost. What matters is that most of the data arrives relatively quickly, allowing the video to be played with reasonable quality and on the fly. The User Datagram Protocol, or UDP, is a simple protocol layered on top of the Internet Protocol that provides this level of reliability. UDP is used for purposes such as relaying video and audio streams as well as for networked games; all environments where responsiveness and fast delivery are more important than perfect reliability.

For other types of data transfer, however, this level of reliability is not enough. When transferring a file, for example, you want to transfer all of its contents in perfect order and integrity; you don’t want any chunks of it to accidentally be lost. When accessing a web page, likewise, you want all the text to be transferred without error. Data transfers that require this higher level of reliability use the Transmission Control Protocol, or TCP. Like UDP, TCP is a protocol layered on top of the Internet Protocol, but it is more complex than UDP: it contains mechanisms to ensure that data is received in order and that, if any chunks are lost, they are resent. The reliability provided by TCP has costs in terms of responsiveness. Before any data can be sent using TCP, the two computers must engage in a short back-to-forth to establish a TCP connection. If any data are lost during transmission, delivery of subsequent data awaits until the data that were lost are retransmitted and delivered. When there is a high rate of data loss on a connection, this may cause transmission to be jerky.

The majority of widely known protocols used on the internet are layered on top of TCP. These include:

  • the Simple Mail Transfer Protocol (SMTP), used for email delivery;
  • the Post Office Protocol (POP) and IMAP, used for email retrieval;
  • the Hypertext Transfer Protocol (HTTP), used for accessing websites;
  • as well as, of course, the Secure Shell protocol (SSH).

 

Direction of TCP connections

TCP connections are like phone calls: they are always initiated by one party and accepted (or not) by the other. The computer that originates the TCP connection is usually the client, and the computer that accepts it is usually the server. Sometimes, notably in the FTP protocol, a secondary TCP connection will be established in the reverse direction, from the server to the client. But, in protocols other than FTP, connections are almost always initiated by the client.

Regardless of the direction in which a TCP connection is established, data can always flow both ways. However, the direction of the TCP connection matters because it determines who the initiating party is, and is also used by network components to impose rules on whether a connection can be established.

 

This article summarized from this site: https://www.bitvise.com/how-the-net-works

What Is SSH – SecureShell?

 

The Secure Shell protocol version 2, or SSH2, specifies how a client can connect securely to an SSH server, and then use the resulting secure link to access the server’s resources. Among other things, the client can run programs; transfer files; and forward other TCP/IP connections over the secure link. The SSH2 protocol is a descendant of the SSH v1.x series of protocols. SSH version 2 is standardized at IETF, and the vast majority SSH implementations now support SSH version 2. SSH version 1 is less secure, and is almost no longer being used.

SSH and TLS/SSL are different protocols used for similar purposes. Both protocols are used to authenticate communicating parties and secure data during transport. SSL/TLS tend to use X.509 certificates, is based on ASN.1 encodings, and is most commonly used to as a security layer for HTTP, SMTP, and FTP traffic. The SSH protocol tends to use public keys without a certificate infrastructure, is based on a simpler binary encoding, and tends to be used as a security layer for SFTP and SCP file transfers, terminal shell access, and forwarding of connections for other applications. SSH can be perceived as a less clunky version of TLS. Due to its deliberate independence from X.509 certificates, SSH lends itself well to connections between entities with an existing trust relationship, where TLS does poorly. TLS lends itself better to connections between strangers.

How Secure Is SSH?

 

 

The SSH v2 protocol provides the services of server authentication; encryption; data integrity verification; and client authentication. Server authentication is performed using DSA, RSA or ECDSA public key algorithm. For encryption and data integrity verification, a number of algorithms are provided which every SSH product can implement in a modular fashion. Client authentication can be performed using a password, a public key, single sign-on Kerberos, and other methods. The SSH2 protocol specification is publicly available and has been reviewed by several independent implementors. When properly implemented and used, the protocol is believed to be secure against all known cryptographic attacks, passive as well as active.

SSH is a highly flexible protocol, and many different types of services can use it. The protocol’s open architecture allows these services to run at the same time without impeding one another. An SSH client and server can transfer files using the protocols SCP and SFTP, which run on top of an established SSH session. While SCP is the old Unix rcp utility transplanted onto a different transport, SFTP is a flexible remote file access protocol that can be used in advanced ways. SFTP is better standardized and widely supported, so often software that provides an SCP-like interface really uses SFTP instead. Note that SFTP is unrelated to FTP, or to FTP over TLS/SSL. The protocols are independent and very different. A frequently used service is the remote console. This involves allocating a channel within the SSH session, which is then used as transport for a terminal protocol such as vt100 or xterm. The client displays to the user a console window within which the user can execute command line programs on the server. SSH also provides exec requests. An exec request executes a program on the server like a remote console, but without expectation of interactive input. Exec requests are useful for automated remote administration. Another popular SSH function is port forwarding, or TCP/IP connection tunneling. With SSH port forwarding, it is possible to secure a TCP/IP connection established by an independent application that would otherwise be vulnerable to network attacks.

 

This article summarized from this site: https://www.bitvise.com/ssh2

Proxifier – The most advanced proxy client

HI,

I think some of us have been used proxifier already. But, not all of us really know about proxifier. So, now we will explain more about proxifier.

What is Proxifier?

 

 

Proxifier allows network applications that do not support working through proxy servers to operate through a SOCKS or HTTPS proxy and chains. Features include work with any Internet client through a proxy, improve network performance or ensure privacy, easy yet powerful UI with live data, and up to date with new technologies.

Other features include proxifier can process all outgoing TCP connections, full IPv6 support, tunnel IPv4 connections through IPv6 proxy and vice versa, SOCKS 4 and SOCKS 4A (hostnames support) with User ID authentication, HTTPS with Basic and NTLM authentication, proxy failure is transparent for the client application if redundancy is enabled, selected proxies in the chain can be enabled or disabled, convenient UI that allows chain creation and reordering with drag-and-drop, system DNS and DNS over proxy modes, automatic DNS mode detection, and proxification rules can be based on application names, IP addresses, hostnames, and port numbers.

ScreenShot:

Proxy Settings

Proxy-Chain

 

 Proxification Rule List

 

With those descriptions, proxifier has many advantages that will help us in entering IP addresses, scouring the internet for batches of free proxies, downloading content and accessing the internet under the guise of anonymity. We will explain more about some of proxifier function

1.Check Proxy Connection

The first thing you have to do to get Proxifier to work is load in all the proxies you want to use.

2.HTTP, HTTPS, SOCKS 4/5 Functionality with Authentication

Often these two types of proxies have to be used exclusively and separately by programs.
When you add a proxy to be used in Proxifier, you can easily select which type of proxy it is, with HTTP, HTTPS, SOCKS 4, or SOCKS 5 as options. You’ll want to make sure you know what kind of proxies you are using, because it will matter when entering it. Most proxies are HTTP proxies, but you can usually contact your provider to find out. Free proxies are almost always HTTP proxies.

3.Assign Proxies to Individual Applications and IPs with Rules

When you enter your proxy, whatever kind it is, Proxifier will automatically pop up with a box that makes this particular proxy “used by default.”If you have just one proxy and want to use Proxifier with only that proxy, click OK and start to use the internet.However, for most people interested in Proxifier, you’ll be adding more than one proxy.The way to organize the use of each of these proxies is through Rules.

4.Proxifier Rules

The rules allow you a very high level of customization for your proxy usage while also automating the process so that, once you set the rules up for your scenario, you won’t have to worry about which proxies are being used for what process.

5.Make Proxy Chains

This is when multiple proxies you own are entered into the system and, with a given set of rules and actions, those proxies are used together in a chain

6.Ordering the Chains

In the same box that you add individual proxies you’ll be able to add proxy chains. You simply create a chain, then drag and drop proxies to match how you want Proxifier to use them. The top proxy will be used first, the last proxy used last.

7.Use Profiles for Multiple Scenarios

This is great for those who love to tinker, or those who have a ton of proxies and use them for very different things. Simply switch between Profiles you’ve already set up based on your current functionality.

8.Real Time Usage

Once everything is in place you can start to run browsers and applications that access the internet. The moment this happens you’ll see the main screen of Proxifier, a generally empty white box, start to light up with action.Open the Connections tab, and it shows you an easy-to-read layout of everything that’s connecting to the internet through Proxifier on your computer. It’s broken down into Program Name, Target, Time/Status and Rule: Proxy. Each of these will help you to see what specific thing is being run through Proxifier at any given time.Below that you’ll see the Output window, which has a constantly updating stream of data that logs messages in real time. Use this to track what is happening.It’s the combination of these two windows (and a Traffic tab, which is also handy) that makes Proxifier incredibly transparent. You can see everything you’ve created so far in action, and make any adjustments as necessary.

9.Portable Version

You can download a portable version of the program, which means it can exist on any thumb drive. This makes it so you can take and use Proxifier at work, school, or just about anywhere.

 

You can download this app  here.

If you want to make this apps being full version, you can use this key.

This article summarized from this site:

 www.proxifier.com

 http://ghostproxies.com/blog/2016/07/advantages-using-proxifier/

 

 

 

 

Bitvise SSH Client (Tunnelier)

Bitvise SSH Client always use encrypts data during transmission. Thus, no one can sniff your password or see what files you are transferring when you access your computer over SSH. This program is designed for Windows. Bitvise SSH Client for Windows includes state of the art terminal emulation, graphical as well as command-line SFTP support, an FTP-to-SFTP bridge, powerful tunneling features including dynamic port forwarding through integrated proxy, and remote administration.

Bitvise SSH Client is used to initiate connections to SSH servers. It is usually used interactively, so it will only run when a user runs it, but it can also be launched unattended to run scripted commands or file transfers, or to maintain an SSH connection for port forwarding. The SSH client is used to access a terminal console on an SSH server, to initiate port forwarding, or to initiate file transfers to and from SSH servers using SFTP.

SSH and SFTP client for Windows incorporates:

  • One of the most advanced graphical SFTP clients.
  • Single-click Remote Desktop forwarding.
  • State-of-the-art terminal emulation with support for the bvterm, xterm, and vt100 protocols.
  • Support for corporation-wide single sign-on using SSPI (GSSAPI) Kerberos 5 and NTLM user authentication, as well as Kerberos 5 host authentication.
  • Support for ECDSA, RSA and DSA public key authentication with comprehensive user keypair management.
  • FIPS 140-2 validation: When FIPS is enabled in Windows, uses Windows built-in cryptography, validated by NIST to FIPS 140-2 under certificates #1892, #2357, and #2606. On Windows XP and 2003, uses the Crypto++ 5.3.0 FIPS DLL, originally validated by NIST under certificate #819 (historical). When Windows cryptography is used, but FIPS mode is not enabled in Windows, additional algorithms may be available.
  • Obfuscated SSH with an optional keyword. When supported and enabled in both the client and server, obfuscation makes it more difficult for an observer to detect that the protocol being used is SSH. (Protocol; OpenSSH patches)
  • Powerful SSH port forwarding capabilities, including dynamic forwarding through integrated SOCKS and HTTP CONNECT proxy.
  • Powerful command-line parameters which make the SSH client highly customizable and suitable for use in specific situations and controlled environments.
  • An FTP-to-SFTP bridge allowing you to connect to an SFTP server using legacy FTP applications.
  • An advanced, scriptable command-line SFTP client, sftpc.
  • A scriptable command-line remote execution client, sexec, and a command-line terminal console client, stermc.
  • A scriptable command-line tunneling client, stnlc, with support for static port forwarding rules, dynamic SOCKS-based tunneling, and FTP-to-SFTP bridge.
  • Bitvise SSH library, FlowSshNet, with example PowerShell scripts showing how to use the SSH library for file transfer and remote program execution from PowerShell.
  • Bitvise SSH Server remote administration features.
  • Supported platforms include all desktop and server versions of Windows, starting from Windows XP, to the most recent; including Windows 10 and Windows Server 2016. Both 32-bit and 64-bit versions of Windows are supported.

 

Bitvise SSH Client is a powerful SSH2 port forwarding client with many features, including:

  • Dynamic tunneling via integrated proxy supporting SOCKS4, SOCKS4A, SOCKS5 and HTTP CONNECT proxy tunneling protocols. Configure your applications to connect to target hosts through the SSH Client’s proxy, and no manual tunneling rules need be configured.

ScreenShot:

SSH Client: Login Settings

 

SSH Client: Proxy Settings, Host Keys, Keypairs

SSH Client: xterm Console

 

SSH Client: Remote Desktop, Help

 

SSH Client: SFTP interface

 

How to set up programs for dynamic tunneling?

  • Port forwarding settings can be saved to and loaded from a profile. One can maintain multiple complex tunneling configurations without having to manually enter parameters before each session.
  • Bitvise SSH Client minimizes its presence by displaying only a system tray icon when running in the background. If an error is encountered while the program is minimized, the icon reflects that.
  • Server-side forwarding: with Bitvise SSH Server and Client, a server and multiple clients can be set up so that all port forwarding rules are configured centrally at the server, without requiring any client-side setting updates. The SSH clients only need to be configured once, and port forwarding rules can easily be changed when necessary.
  • Command-line parameters are supported. Using command-line automation, a port forwarding session can be started from a link in the Startup menu without requiring any user interaction whatsoever. Help with the command-line parameters can be found in the SSH client log area when it is first started, or by executing ‘BvSsh /?’ from a command prompt.
  • After an SSH session is established, any external application can be launched automatically.
  • If an SSH session is interrupted, Bitvise SSH Client can automatically reconnect to the server.

 

Bitvise SSH Client is free for use of all types, including in organizations. You can download it here.

This article summarized from this site: https://www.bitvise.com/