Pages

Tuesday, September 3, 2013

Proxifer-Tool for fake IP

Operating Systems and Hardware Requirements
  • Windows Family 2000, XP, Vista (32- and 64-bit), 7 (32- and 64-bit).
  • Windows Server Family 2003, 2008 (32- and 64-bit).
  • Windows 8 (32- and 64-bit) Desktop applications only.
  • Windows 8 Windows Store (Metro) applications. ETA Q1 2013.
  • Proxifier for Mac OS X is available.
  • IA-32 or x86_64 processor family. Legacy version for PowerPC G3, G4 and G5 is available (Mac).
  • 10 MB of free disk space.
  • TCP/IP network.

    Link 1 : Download Now
    Link 2 : Download Now
    Link 3 : Download Now

Installation
  • Installation pack in a single exe-file (3.5 MB approx.)
  • Installation requires administrator rights. Can be run from any user after that.
  • Silent (unattended) mode support.
  • All Proxifier binaries are signed with Initex digital certificate issued by a trusted root CA.
  • Special Portable Edition does not need installation and can be run from a removable media.
  • Custom installation packs (MSI, ZIP, XCOPY deployment, etc.) can be provided on demand for a reasonable fee.
  • Personal settings are preserved during the update.
  • Check for updates on start.

Network
  • Proxifier can process all outgoing TCP connections.
  • Full IPv6 support.
  • Tunnel IPv4 connections through IPv6 proxy and vice versa.

Proxy Servers
  • SOCKS 4 and SOCKS 4A (hostnames support) with User ID authentication.
  • SOCKS 5 with Username/Password authentication.
  • HTTPS with Basic and NTLM authentication (explicit and transparent modes).
  • HTTP with Basic authentication (HTTP connections only).
  • Tested with all major proxy server implementations including Microsoft ISA, Blue Coat, WinGate, Dante, Squid, Apache and others.
  • Failover (redundancy list) allows assigning any number of back up proxies. Timeout is configurable.
  • Proxy failure is transparent for the client application if redundancy is enabled.
  • Each proxy can be assigned a short name (label) that can be conveniently used in other parts of Proxifier.

Proxy Chains
  • Arbitrary length.
  • Different proxy protocols can be used within one chain.
  • Selected proxies in the chain can be enabled/disabled.
  • Convenient UI that allows chain creation and reordering with drag-and-drop.
  • New proxy chain type: load balancing.

Client Applications
  • 32- and 64-bit applications support.
  • Windows Services and applications run by other users (configurable).
  • Proxification is absolutely transparent for the applications.
  • Best possible compatibility with 3d party software. Automatic conflict-resolution logic.

DNS
  • System DNS and DNS over proxy modes.
  • Hybrid mode.
  • Automatic DNS mode detection.
  • DNS over Proxy is supported for all proxy protocols.
  • DNS exclusion list with wildcards (e.g. *.example.net).

Flexible Configuration
  • Proxification rules can be based on application names, IP addresses, hostnames and port numbers.
  • Each rule can be assigned to proxy, chain, block or direct connection.
  • Rules are processed from top to bottom and can be reordered.
  • Wildcards and masks are supported for applications, IP addresses and hostnames (e.g. *app.exe; 192.168.*.*; *.example.net).
  • Ranges are supported for IP addresses and port numbers (e.g. 10.1.1.1�10.1.1.255; 80�1234).
  • On-the-fly syntax check with highlighting.
  • Individual rules can be enabled/disabled.
  • Proxifier context menu (right-click on arbitrary .exe file) allows dynamic choosing of a proxy for the selected application within a session.

Configuration Deployment and Management
  • Configuration is stored in profile files (*.ppx).
  • Human readable XML format.
  • Unlimited length.
  • Fast profile switching from a list.
  • Profiles can be managed as files. Import and export is supported.
  • Silent profile load with �Proxifier.exe profile-name.ppx silent-load� command.
  • Profiles proxy passwords encryption with current user login credentials or master password.
  • Basic and AES 256-bit encryptions are supported.
  • System-wide profile that is forcibly used for all users.
  • User can enter login details interactively if login/password is blank in the profile.
  • Proxifier re-asks login/password again if authentication on proxy fails.
  • Automatic profile update from a remote Web server. User�s proxy login details get preserved.
  • An option to force profile passwords encryption via system registry.
  • Fully compatible Proxifier profiles of Windows and Mac versions.

User Interface and Interaction
  • Live information about connections including application name, target host, time/status, rule/proxy, received/sent bytes and more.
  • Live traffic (bandwidth) graph.
  • Live global statistics.
  • Live output with 3 levels of verbosity.
  • Color indication.
  • System tray icon with traffic view.
  • Adjustable UI that is persistent during restart (windows sizes, panes layout, etc).

Logs and Troubleshooting
  • Detailed error messages.
  • Log-file.
  • Verbose mode for screen and log-file with extremely detailed output.
  • Traffic dumps.
  • Automatic self-check testing on each start.
  • Automatic conflict detection logic.
  • Custom crash reporter.

License Control
  • Text license keys (XXXXX-XXXXX-XXXXX-XXXXX-XXXXX).
  • Multiple licenses can be coded on a single key.
  • Automatic license deployment.
  • Key can be directly written to the system registry before or after the installation.
  • 31-day free trial (no limitations).

Support and Documentation
  • Detailed documentation with images and examples.
  • Online and offline (integrated) versions are available.
  • Fast and professional support over email.
  • English only.

Development and Copyrights
  • All copyrights to Proxifier are exclusively owned by Initex.
  • Proxifier does not contain or link any open source, freeware or third party code.
  • Windows version is built with Microsoft Visual C++ 2008.
  • Mac version is built with Apple Xcode 4.
  • Windows install package is built with Inno Setup.

No comments:

Post a Comment