asteroza + proxy + software   132

miniwebproxy
Interesting minimizer/rewriter/web proxy
bandwidth  reduction  minimizing  web  proxy  software 
november 2017 by asteroza
gravitational/teleport: Modern SSH server for clusters and teams.
Interesting authentication proxy/SSH bastion host software, for allowing distributed teams to safely access distributed resources
SSH  bastion  host  authentication  proxy  SSO  cloud  management  devops  kubernetes  security  certificate  sysadmin  software 
september 2017 by asteroza
Istio
Linkerd does traffic management, this does that plus more policy control (layer 7 proxy and management)
Istio  alternative  linkerd  devops  container  VM  management  software  control  plane  traffic  policy  circuit  breaker  coordination  kubernetes  orchestration  cloud  service  mesh  routing  network  networking  proxy  load  balancer  analytics  metrics  monitoring  platform  microservice  security  Delicious 
may 2017 by asteroza
ellotheth/pipethis - Go
Trying to be less owned during a piped shell install from the intarwebz
shell  pipe  installer  proxy  opensource  software  security  Delicious 
january 2016 by asteroza
kdzwinel/betwixt
Interesting extension to Chrome, to monitor web traffic not passing through Chrome but be able to use Chrome debugging tools. Effectively a bridge to a local MitM proxy though.
web  HTTP  traffic  proxy  analysis  analyzer  software  network  debugging  chrome  browser  addon  plugin  extension  packet  sniffer  programming  development  webdev  sysadmin  tips  tricks  Delicious 
december 2015 by asteroza
apenwarr/sshuttle
Interesting adminless VPN SSH tunnel using some interesting packet tricks, well, non-root at the server end...
SSH  VPN  transparent  proxy  software  security  mac  OSX  linux  DNS  networking  tunnel  sysadmin  tips  tricks  tools  utilities  Delicious 
june 2015 by asteroza
ZeroTier One
Some sort of UDP tunnel VPN, formerly Hamachi?
UDP  tunnel  VPN  proxy  service  software  hamachi  Delicious 
august 2014 by asteroza
uProxy
Trying to get over Tor exit node visibility by forcing all proxy overlay network users to be exit nodes, similar in vein to freenet and bittorrent.
google  uproxy  firefox  chrome  privacy  security  network  software  P2P  overlay  proxy  anonymity  decentralized  Delicious 
october 2013 by asteroza
Adblock Plus - Android Apps on Google Play
Not clear if it is using a local proxy server when running on a rooted phone, rather than iptable tricks. Chews too much RAM on unrooted phones though, so better off using a hosts file based solution for lower spec phones.
server  proxy  local  blocker  advertisement  advertising  plus  AdBlock  software  app  android  Delicious 
november 2012 by asteroza
EMail .NET components (POP3, SMTP, IMAP, MIME, SSL, Proxy)
Quick and dirty way to build apps for testing email connectivity in C#. The authentication demo is useful for forcing a particular authentication mechanism. No NTLM demo however.
Email.NET  C#  sample  demo  source  code  email  SMTP  POP3  IMAP  SSL  MIME  proxy  client  software  programming  development  Delicious 
september 2011 by asteroza
UltraSurf
Apparently high school kids use this for bypassing websense...
UltraSurf  firewall  content  filter  proxy  bypass  VPN  software  windows  security  privacy  tools  utilities  Delicious 
may 2010 by asteroza
Named Pipe TCP Proxy Utility
neat little utility to allow telnet access to VMware named pipe serial consoles
NPTP  named  pipe  TCP  proxy  utility  windows  sysadmin  software  tools  utilities  programming  development  debug  freeware  VMware  serial  console  telnet  remote  access  Delicious 
november 2009 by asteroza
http://www.exstatic.org.nyud.net:8080/proxybox/
Somebody packaged up a nice little VM that's a swiss army knife of proxies and whatnot, to help activists in troubled countries. The intended audience being Iranians during their problematic elections. The actual end user who deploys the VM is usually somebody in a democratic country with too much bandwidth, and not enough freeetime on their hands, who wants to help out their fellow man.
proxybox  packaged  virtual  machine  VM  proxy  gateway  tunnel  exit  software  internet  privacy  anonymity  censorship  Delicious 
june 2009 by asteroza
hashcache.pdf (application/pdf Object)
This hurts my head because, in a way, this is so simple and awesome. Use a specialized/tweaked hashing algorithm to generate the actual hard disk location of the cached webpage (hash the URL into a filepath for example). Skips the index lookup stage so obviates the need for a web cache index. I wonder if you can do filesystem tricks like altering the create time to match the web server's file age response, so that doing a cache file age check is a compare.
hashcache  edgeXL  web  cache  proxy  indexless  software  algorithm  research  programming  development  webdev  high  performance  caching  WAN  HTTP  accelerator  server  filetype:pdf  media:document  Delicious 
april 2009 by asteroza
« earlier      
per page:    204080120160

related tags

0.5  3proxy  acceleration  accelerator  access  accesspoint  adapter  AdBlock  addon  address  admin  administration  advertisement  advertising  AIM  airlock  AJAX  algorithm  algorithms  alternative  amazon  AN.ON  analysis  analytics  analyzer  android  anon  anonimization  anonymity  anonymizer  anonymizing  anonymous  antiIDS  antiIPS  antimalware  antiphishing  antiproxy  antispam  antispyware  antivirus  apache  API  app  application  arbitrary  asp.net  asterisk  asynchronous  attack  auditing  auth  authentication  availability  B2BUA  balancer  balancing  bandwidth  bastion  blacklist  blocker  blocking  bluetooth  border  breaker  browser  build  builder  burpsuite  bypass  C  C#  cache  caching  Calamaris  CalDAV  calendar  captive  capture  CardDAV  CAS  cascade  censor  censorship  censorware  central  certificate  CGI  cgiproxy  chain  chained  chaos  chat  check  chrome  circuit  circumventer  circumvention  clamAV  client  cloud  cluster  clustering  code  comet  communication  compliance  compression  conservation  console  container  content  control  conversion  coordination  Core  darknet  data  DavMail  deb  debian  debug  debugging  decentralized  decryption  Delicious  demo  desktop  detection  development  devices  devops  DHCP  DLL  DNS  docker  domain  download  e-mailrelay  Echo  edge  edgeXL  electronics  email  Email.NET  encrypted  encryption  Endian  endpoint  engine  engineering  environment  ethernet  exchange  exfiltration  exit  exploit  extension  external  file  filetype:pdf  filter  filtering  firefox  firewall  flat  force  fork  forward  forwarding  fragmented  framework  freedom  Freeproxy  FreeSWITCH  freeware  frontend  fronting  ftp  function  fuzzer  Gadu-Gadu  gateway  general  generic  GIF  GIFC  gmail  gmail-lite  gmail-mobile  go  google  Guacamole  guide  gzip  h.323  HA  hacking  hacks  hamachi  HAProxy  hardware  hashcache  HAVP  header  hidden  high  hole  hooking  host  hosted  hotspot  HotSpotShield  howto  HTML  HTML5  http  HttpCore  https  hyprid  I2P  IAX  ICAP  ICMP  ICQ  IIS  IM  image  IMAP  IMspector  indexless  injection  inline  inspection  install  installer  instant  integrated  integration  interception  internet  IP  IP-PBX  iPhone  IPPBX  IPS  iptables  IPv6  IRC  Istio  IVR  jabber  Janus  JanusVM  JAP  java  javascript  JonDo  JonDonym  JonDos  JPEG  JPEG2000  kerberos  kernel  keylogger  Knuth  kubernetes  L7  layer  ldap  level  LightSquid  lighttpd  linkerd  linux  list  livejournal  load  local  localhost  log  logging  login  low  Lua  mac  machine  ManagedFUsion  management  mapping  media  media:document  memory  mesh  message  metered  metrics  microservice  MIME  minimization  minimizing  Mirage  MitM  MITM  mix  mobile  monitoring  MSN  multiple  multiplexer  multitier  mvirtual  MySQL  named  NAT  native  network  networking  nginx  node  node.js  nondeterministic  NPTP  nstx  NTP  onion  Openfount  OpenSBC  opensource  operation  optimization  orchestration  OS  OSCKS  OSX  overlay  OWA  p2p  PAC  package  packaged  packet  page  paging  Paros  passthrough  patch  PBX  penetration  pentest  pentesting  performance  perl  Perlbal  phantom  PHP  phpproxy  PHProxy  piercing  ping  pipe  plaintext  plane  platform  plugin  plus  policy  POP  POP3  portal  portalable  postfix  preprocessor  print  privacy  private  programming  proof-of-concept  protocol  proxy  proxybox  ProxyChains  ProxyFuzz  proxytunnel  psiphon  ptunnel  punching  python  QA  quid  recompression  redhat  redirect  redirection  redirector  reduction  reference  relay  remote  request  research  REST  reverse  reversy  rewrite  route  router  routing  rphd  RPM  S3  sample  sarge  scalability  script  scripting  security  serial  server  service  settings  setup  shalla  sharing  shell  shield  sigle  signon  simultaneous  SIP  SMB  SMTP  sniffer  sniffing  SOCKS  SOCKS5  software  solaris  source  speed  SQL  squid  squidguard  ssh  ssl  sslstrip  SSO  stack  stacked  stacking  standalone  stream  suite  Sun  support  switching  symbian  sysadmin  T.38  tandem  TCP  telnet  test  testing  text  theft  thunderbird  tips  titus  TLS  tools  toonel  toonel.net  tor  tor2web  torpark  TPROXY  tracking  traffic  transparent  transport  tricks  trusted  tunnel  tunneled  tunneler  tunneling  tutorial  UA  UDP  ultramonkey  Ultrasurf  UltraSurf  unreliable  untangle  unwrapping  uproxy  URL  utilites  utilities  utility  utiltiies  UTM  Varnish  violation  virtual  virtualization  VM  VMware  VNC  VoIP  VPN  WAN  WAP  web  webdev  webfilter  website  WebSockets  wif  wifi  windows  wireless  WPAD  XML  XMPP  yahoo  YIM  ZeroTier  Ziproxy  zlib 

Copy this bookmark:



description:


tags: