Internet Secure Tunneling can forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure. The tunneling capability of SSH Secure Shell is a feature that allows, for example, company employees to access their email, company intraweb pages and shared files securely by even when working from home or on the road. Tunneling makes it possible to access email from any type of Internet service (whether accessed via modem, a DSL line or a cable connection, or a hotel Internet service). As long as the user has an IP connection to the Internet she can get her mail and access other resources from anywhere in the world securely. This often is not the case with more traditional IPSec based VPN technologies because of issues with traversing networks that are implementing Network Address Translation (NAT) - this is especially the case in hotels. NAT breaks an IPSec connection unless special protocols such as NAT-Traversal are implemented on the client and gateway. The client-server applications using the tunnel will carry out their own authentication procedures, if any, the same way they would without the encrypted tunnel. The protocol/application might only be able to connect to a fixed port number ( e.g. IMAP 143). Otherwise any available port can be chosen for port forwarding. Features - Create and manage mulitiple SSH tunnels. - SSH Version 1 and Version 2 are supported. - Comperssion is supported. - Remote forwarding, local forwarding and dynamic forwarding are supported. - Hides in the system tray and does not require any desktop space. - System tray pop up menu for easy access to main functions. - Online support, online upgrade are supported. - Windows XP compatible user interface.
Free Secure Tunnel Service.
GoTrusted Secure Tunnel 18.104.22.168
GoTrusted VPN Service client software.
Encrypt to existing PDFs, pdf secure
Graphical SSH client and terminal emulator.
P-Encrypt Secure Drive 22.214.171.124
Create virtual encrypted disk drives.