Vpn- sudden burst speed limit nets over the wall psiphon vpn high-speed train network Sky cloud wall of Freegate sportsmanship accelerator

Vpn- sudden burst speed limit nets over the wall psiphon vpn high-speed train network Sky cloud wall of Freegate sportsmanship accelerator

✓ Free: permanent free ✓ simple: a key connections without registration ✓ Fast: connects you to the fastest server ✓ Use: vpn proxy, connected to facebook, youtube, google and other sites abroad and accelerate the game speed. ✓ Lightweight: app only 5m s

App details


1.0.7.1
Android 4.0+
Everyone
10,000 - 50,000
Get Vpn- sudden burst speed limit nets over the wall psiphon vpn high-speed train network Sky cloud wall of Freegate sportsmanship accelerator for Free on Google Play
4.1 (82.3%) 227 votes

App description


✓ Free: permanent free ✓ simple: a key connections without registration ✓ Fast: connects you to the fastest server ✓ Use: vpn proxy, connected to facebook, youtube, google and other sites abroad and accelerate the game speed.
✓ Lightweight: app only 5m space, ✓ security: keep your data safe ✓ Unlimited: no traffic and bandwidth limitations ------------------------
----------------------------------------- Disclaimer: our software is only for scientific research
, learning, education, and all other lawful purposes.
Forbidden all acts in violation of Chinese law and the country where the server.
Use of this software is to be construed as an endorsement of the entire contents of this statement.
---------------------------------------------- Have fun
!
Technical Description: Virtual Private Network, which is what we usually refer to the vpn over the wall, not a new network concept.
As its name suggests, vpn private network services over the wall can be defined as a use of public network infrastructure.
A typical example is the call.
When we told friends to call, using the public telephone network between the two sides to establish a virtual private connection.
vpn over the wall in two important concepts are virtual and private.
The so-called virtual, is with the real relative.
In a real private network, so the network equipment belonging to a company or organization.
The virtual private network is to use a public network infrastructure, so it's not really private.
The so-called private, refers to all the real information is not visible to the outside world.
Although both sides communication using a public network, but you can guarantee the security and privacy of data through encryption means.
The first question: Why deploy vpn vpn over the wall over the wall to deploy the main reason is that you can save money.
In modern economic activity, many multinational corporations around the world have their own branches and offices.
They often need for business communications and remote collaboration.
In order to establish such a connection, only two ways: one is established between the various branches of private line, another way is to directly access the internet, set up a vpn over the wall based on the public network.
Obviously, the use of internet is much more economical solution.
If a private line, need to have established a connection point between the two branches each.
If there are n branches, each branch requires at least the n-1 line.
Such structure consisting of a private network not only complex, but also very expensive.
Is not an ordinary company can afford.
The use of internet solutions are simple and economical, each branch is only responsible for their own access to the nearest internet node can be.
vpn technical presentations over the wall over the wall vpn, virtual private network (virtual private network), is defined through a public network (usually the Internet) to establish a temporary, secure connection, is a public network through the secure, stable
tunnel.
Virtual Private Network is an extension of the intranet, it can help remote users, corporate offices, the establishment of credible security business partners and suppliers with the company's internal network, and ensure the security of data transmission.
ietf vpn ip-based organization over the wall interpreted as: a point to point leased line emulation technology in the public data network through a dedicated tunnel encryption technology.
The so-called virtual means users no longer need to have the actual long-distance data lines, but the use of long-distance data line internet public data network.
The so-called private network means users can develop a network that best meet their needs for themselves.
Early private network generally refers to the network and other telecom operators to provide frame relay or atm virtual fixed line (pvc) service, or build your own private network through the carrier's ddn line network.
Vpn is now on the internet to establish a temporary security virtual private network, the user saves the cost of leased lines, as well as over the wall in addition to buying equipment or vpn vpn software products, companies paid only to pay a business location isp
Internet access charges for customer contact in different regions also saves long-distance telephone charges.
This is the reason for low prices vpn over the wall.
Referring to osi standard model, different techniques may be implemented over the wall of vpn in the different protocol layers osi.
As follows: vpn vpn levels over the wall over the wall in the implementation techniques osi application layer session layer Socks5 ssl vpn vpn vpn IPSec network layer and the data link layer pptp l2tp vpn application layer protocol over the wall ssl: Secure Sockets Layer (secure
socket layer, ssl) belongs to the high-level security mechanism, widely used web browser and web server programs, such as providing encryption for authentication and application data.
In ssl, the authentication is based on the certificate.
The authentication server client-side direction is necessary, while ssl version 3 in the direction of the customer service side authentication only option, but has not been widely used.
ssl session contains a handshake stage, at this stage of the communicating parties exchange certificates, generates a session key, encryption algorithm used for communication after the consultation.
After completion of the handshake for the b / s application, the application can securely transfer data without having to make any major changes, except when transmitting data to be called ssl api instead of the traditional socket api, but for the c / s
application software architecture, the solutions to the session layer similar to vpn.
ssl protocol is an end, thus achieving (typically on the client and server) on a communication path endpoints in the machine, without the need to be implemented on the intermediate node of the communication path (such as a router or firewall).
Although theoretically be used to protect ssl tcp / ip communication, but in fact almost exclusively limited to the application ssl http.
In ssl communication, the server side port 443, while client side port is optional.
Vpn over the wall socks4 session layer protocols: socks in the session layer osi model, in socks protocol, the client through the 1080 port socks client initiates a connection through a firewall, establishing a socks server vpn tunnel, and the agent of the client application
communicate with the application server.
In this framework, the protocol can transparently and securely traverse a firewall, and client to the destination host is not visible, so well hidden target host.
The key technology socks are client applications of socks, socks add support for the agreement, then the server re-analyzing the results of socks.
Client / server program socks4 protocol, which is based on tcp protocol telnet, ftp, http, wais and gopher, etc. (not including udp) provides a firewall without authentication, set up a vpn tunnel is not encrypted authentication.
socks5 protocol: socks5 agreement expands socks4, in order to support udp, tcp safety certification program provides the framework, ipv4 address resolution scheme as specified, domain name resolution and ipv6.
To achieve this socks protocol typically involves the recompilation or relinking of tcp client applications to use the library socks corresponding encryption function, and increase the integrity of the data transmission, data packets compression support.
Technical ipsec vpn network layer protocols over the wall: ietf ipsec is one of the standards supported by it, and the first two except that a third layer, i.e. it is encrypted ip layer.
ipsec not a particular authentication algorithm or encryption algorithm, and does not specify a particular authentication algorithm or encryption algorithm in its data structure, it is only an open structure defined in ip packet format, different encryption algorithms
can be defined using ipsec architecture implemented in a network data transmission.
ipsec protocol can be configured to run in two modes: one is the tunnel (Tunnel) mode, one is transmitted (Transport) mode.
In tunnel mode, ipsec ipv4 packet encapsulation in the secure ip frame.
Transmission mode is to protect the security of end to end, that this mode does not hide the routing information.
Tunnel mode is the most secure, but will bring a large overhead.
Vpn technology ptp link layer protocol over the wall: pptp (Point to Point Tunneling Protocol) is a secure point to point tunneling protocol developed by the Forum pptp, vpn to provide security services for Internet users to use the telephone in 1996, the draft ietf.
pptp is an extension ppp protocol provides the communication method to establish secure vpn ip multi-protocol in the Internet, the remote user can access any support isp pptp of corporate private network.
pptp pptp provide secure communication between client and server pptp.
pptp client refers to the pc machine running this protocol, pptp server is a server running this protocol.
By pptp, customers can use dial-up access to public ip network.
First, dial-up customers to dial a conventional manner isp access server, establish a connection ppp; Based on this, the client establishes a connection to the secondary dial pptp server, the connection is called Tunnel pptp.
pptp tunnel is essentially based on another protocol ppp connection ip, where ip data packet can encapsulate a variety of protocols, including tcp / ip, ipx and netbeui.
For direct connection to the client ip network is not required for the first time ppp dial-up connection, you can establish a virtual path directly with the pptp server.
The biggest advantage is microsoft's pptp support, another advantage is that it supports flow control, to ensure that no congestion between the client and the server, to improve communication performance and minimize packet loss and retransmission phenomenon.
pptp tunnel to establish the initiative to customers, but customers need to configure pptp on their pc machine, this will only increase the workload of users, the network would pose a security risk.
Further, PPTP only work in IP, does not end with a tunnel authentication, relies on the user authentication.
l2f / l2tp protocol: l2f (layer 2 forwarding) proposed by the company cisco, vpn secure communication may be established multi-protocol on a variety of media (e.g. atm, fr, ip).
It link layer protocol (e.g. hdlc, ppp, async, etc.) encapsulated transmitted, the link layer of the network and therefore is completely independent of the user's link layer protocol.
The agreement, submitted in 1998 to the ietf, become rfc2341.

Changelog / What's New


修复应用符合google最新政策问题

You may also like these apps