Update README.md
This commit is contained in:
parent
f323941276
commit
08f0f61840
@ -35,7 +35,8 @@ pingtunnel.exe -type client -l :4455 -s www.yourserver.com -sock5 1
|
|||||||
* 大功告成,然后你就可以开始和本机的:4455端口通信,数据都被自动转发到远端,如同连接到www.yourserver.com:4455一样。 Then you can start communicating with the local: 4455 port, the data is automatically forwarded to the remote, as you connect to www.yourserver.com:4455.
|
* 大功告成,然后你就可以开始和本机的:4455端口通信,数据都被自动转发到远端,如同连接到www.yourserver.com:4455一样。 Then you can start communicating with the local: 4455 port, the data is automatically forwarded to the remote, as you connect to www.yourserver.com:4455.
|
||||||
|
|
||||||
## Download
|
## Download
|
||||||
https://github.com/esrrhs/pingtunnel/releases
|
cmd: https://github.com/esrrhs/pingtunnel/releases
|
||||||
|
qt: https://github.com/esrrhs/pingtunnel-qt
|
||||||
|
|
||||||
# Usage
|
# Usage
|
||||||
通过伪造ping,把tcp/udp/sock5流量通过远程服务器转发到目的服务器上。用于突破某些运营商封锁TCP/UDP流量。
|
通过伪造ping,把tcp/udp/sock5流量通过远程服务器转发到目的服务器上。用于突破某些运营商封锁TCP/UDP流量。
|
||||||
|
Loading…
Reference in New Issue
Block a user