diff --git a/README.md b/README.md index f423ac9..6daa2d7 100644 --- a/README.md +++ b/README.md @@ -34,6 +34,9 @@ pingtunnel.exe -type client -l :4455 -s www.yourserver.com -sock5 1 ``` * 大功告成,然后你就可以开始和本机的:4455端口通信,数据都被自动转发到远端,如同连接到www.yourserver.com:4455一样。 Then you can start communicating with the local: 4455 port, the data is automatically forwarded to the remote, as you connect to www.yourserver.com:4455. +## Download +https://github.com/esrrhs/pingtunnel/releases + # Usage 通过伪造ping,把tcp/udp/sock5流量通过远程服务器转发到目的服务器上。用于突破某些运营商封锁TCP/UDP流量。 By forging ping, the tcp/udp/sock5 traffic is forwarded to the destination server through the remote server. Used to break certain operators to block TCP/UDP traffic. diff --git a/cmd/main.go b/cmd/main.go index 1c65185..5af1823 100644 --- a/cmd/main.go +++ b/cmd/main.go @@ -150,6 +150,8 @@ func main() { *tcpmode_buffersize = 0 *tcpmode_maxwin = 0 *tcpmode_resend_timems = 0 + *tcpmode_compress = 0 + *tcpmode_stat = 0 } c, err := pingtunnel.NewClient(*listen, *server, *target, *timeout, *key,