SuggestSoft.com

Proxy Analyzer

Surf Anonymous 1.0.1.0

Surf Anonymous 1.0.1.0: SurfAnonymous is an internet utilities that hides your IP address Over the Net proxy connections. Just "drag the mouse" over the application you want to change it`s IP and watch. SurfAnonymous includes the following functional parts: Proxy Hunter, Proxy Analyzer, Proxy Capture, and Proxy Pool. Just add the url of the page which contain proxies and Proxy Hunter will bring all the proxies within it using advanced HTML parser. Using Proxy Analyzer you are able to detect the type of the proxies (Socks4, Socks5, Http, Https), Anonymous






No Image
ProxyChain 1

ProxyChain includes a customizable proxy managing tool called Proxy Analyzer. Proxy Analyzer allows you to select the proxy servers you wish to include in your proxy list(s), and allows for automatic validation of each proxy according to functionality, anonymity, speed, and tunneling. It can then exclude all unqualified proxy servers from your connection list with one mouse click. Proxy Analyzer automatically runs periodical checks on your proxy

free proxies, anonymous proxys, free proxy list, proxy list, free proxy





AllProxy Lite 1.6.202: Use any proxy servers you like to as system wide proxy with AllProxy Lite.
AllProxy Lite 1.6.202

proxy and much more important options. Basic features of AllProxy Lite are: * Independent rules with separate proxy settings, list of programs to connect using proxy; * Rules priority support; * Support of different types of proxys: free proxy, proxy 3128, free anonymous proxy, proxy 80, proxy 8080, proxy 1080, transparent proxy, elite proxy, etc. * Support of DNS or ip proxy addresses; * Compatibility with proxy servers: http proxy, socks proxy (

proxifier download, allproxy lite, http proxify, bypass firewall, proxy switcher, proxifier, allproxy, proxy manager, switch proxy, allproxy verysoft, proxy setting, proxy configure, proxified



Proxy Log Storage 3.5: The Proxy Log Explorer is application for monitoring usage of Proxy server.
Proxy Log Storage 3.5

Proxy Log Explorer is the fastest and most powerful analysis application for monitoring the efficiency corporate Internet usage of your Proxy server. Proxy Log Explorer creates dynamic reports on-the-fly. Also, you can easily get virtually any subreport by just right-clicking the item you need and selecting the subreport you need. Needless to say, it can recognize log file formats automatically, extract compressed log files, process multiple log

log analyzer, proxy servers, proxy analyzer, proxy



Proxy Log Explorer 3.62: The Proxy Log Explorer is application for monitoring usage of Proxy server.
Proxy Log Explorer 3.62

Proxy Log Explorer is the fastest and most powerful analysis application for monitoring the efficiency corporate Internet usage of your Proxy server. Proxy Log Explorer creates dynamic reports on-the-fly. Also, you can easily get virtually any subreport by just right-clicking the item you need and selecting the subreport you need. Needless to say, it can recognize log file formats automatically, extract compressed log files, process multiple log

log analyzer, proxy servers, proxy analyzer, proxy



No Image
Protoport Proxy Chain 1.1

Proxy Chain chains proxy servers, you can download proxy list, verify proxy servers, switch proxy chains, build proxy chains, and create proxy lines, surf anonymously. Protoport Proxy Chain allows to surf anpnymously. You can get anonymous proxy list for free, HTTP proxy servers are supported. Proxy types supported: high anonymity, anonymous, transparent, and elite anonymous servers. Protoport ProxyChan allows you to download anonymous proxy list

socks, smtp, https, chain, switcher, http, protoport, switch, proxy



Advanced Administrative Tools 5.92: Essential security diagnostic tool for everyone who wishes to protect his system
Advanced Administrative Tools 5.92

Advanced Administrative Tools investigates and gathers information about your computer, network status, and service availability. That is a layman`s way of saying it performs an inspection on everything vital to network security as it pertains to the protection of your computer, including the utilization of tools to check open ports, proxies, email lists, Internet applications, and general system information.

email verifier, port scanner, rbl locator, trace route, links analyzer, proxy analyzer, network monitor


More Results: 1  2  3  4  5  6  

World IT News