Network & comms
 » Proxy apps
Sections : Network & comms > Proxy apps
Good visitors rating

Get & buy 3proxy 0.7.1.1

proxy server HTTP, HTTPS, SOCKS v4/4a/5, FTP

Advertisement


Thank you for downloading 3proxy from our download portal.

Current files are located on the following IPs: 95.79.31.239

Outer mirror site one (3proxy.ru)

NOD32 Antivirus report :

Scan started at: 05/22/14 01:11:19
name="C:\Temp\3proxy-0.7.zip", threat="a variant of Win32/3Proxy.NAB potentially unsafe application", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » bin/rus-koi8-r.3ps", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » bin/rus-win1251.3ps", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » bin/3proxy.key", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » bin/server.key", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » bin/3proxy.pem", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » bin/3proxy.exe", threat="a variant of Win32/3Proxy.NAB potentially unsafe application", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » bin/FilePlugin.dll", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » bin/PCREPlugin.dll", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » bin/SSLPlugin.dll", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » bin/StringsPlugin.dll", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » bin/TrafficPlugin.dll", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » bin/WindowsAuthentication.dll", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » bin/lastFripper.dll", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » bin/utf8tocp1251.dll", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » bin/dighosts.exe", threat="a variant of Win32/3Proxy.AB potentially unsafe application", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » bin/countersutil.exe", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » bin/mycrypt.exe", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » cfg/0.scenario.txt", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » cfg/3proxy.cfg.sample", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » cfg/counters.sample", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » cfg/sql/3proxy.cfg", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » cfg/sql/create.sql", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » cfg/sql/report.xls", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/ru/3proxy_for_dummies.rtf", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/ru/example1.txt", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/ru/iodbc.txt", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/ru/odbc.txt", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/html/faqe.html", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/html/faqr.html", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/html/howtoe.html", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/html/howtor.html", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/html/index.html", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/html/securityen.html", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/html/man8/3proxy.8.html", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/html/man8/3proxy.conf.3.html", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/html/man8/ftppr.8.html", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/html/man8/icqpr.8.html", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/html/man8/pop3p.8.html", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/html/man8/proxy.8.html", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/html/man8/smtpp.8.html", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/html/man8/socks.8.html", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/html/man8/tcppm.8.html", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/html/man8/udppm.8.html", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/html/man3/3proxy.cfg.3.html", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » doc/devel/devref.rtf", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » copying", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » authors", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » Readme", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » news", threat="is OK", action="", info=""
name="C:\Temp\3proxy-0.7.zip » ZIP » Changelog", threat="is OK", action="", info=""

Scan completed at: 05/22/14 01:11:20
Scan time: 1 sec (0:00:01)
Total: files - 1, objects 50
Infected: files - 1, objects 2
Cleaned: files - 0, objects 0

Note: We prefer to use WinZip, WinRar, WinAce, 7zip to extract zip, rar, 7z, ace files. For data iso files we recommend you use freeware Daemon Toos lite.

Note: All files listed on this site are tested by the ESET Smart Security. If you like to test this file by another security software we recommend you select some in our antivirus section.


Sponsored download:

Development of the 3proxy was probably finished, try the other options

Socks Proxy Checker 1.14
...proxy is versatile proxy for all usage...while the http proxy can only be...You can use socks proxy to send...find the proper socks proxy for you...also change the socks proxy of your...

eScan Internet Security Suite with Cloud Security for SMB 14.x
eScan ISS with Cloud Security for SMB

Internet Access Monitor for Proxy+ 3.9c
...most corporations provide Internet access through proxy...areas where wasteful bandwidth consumption may be...

Internet Access Monitor for MS Proxy Server 3.9c
...most corporations provide Internet access through proxy...areas where wasteful bandwidth consumption may be...

IE Internet Security 10.0
...features of the Internet Explorer Web browser...certain tabs of Internet Options dialog box...to customize the Internet Explorer web browser...

3proxy categories

traffic limitation, bandwidth limitation, internet, proxy, socks

3proxy permissions

3proxy 0.7.1.1 Public License Agreement

(c) 2000-2014 by 3APA3A (3APA3A@3proxy.ru)
(c) 2000-2014 by SecurityVulns.com (http://3proxy.ru/)
(c) 2000-2014 by Vladimir Dubrovin (vlad@sandy.ru)

This software uses:
RSA Data Security, Inc. MD4 Message-Digest Algorithm
RSA Data Security, Inc. MD5 Message-Digest Algorithm

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This software is FREEWARE.

Redistribution and use in source and binary forms, with or without
modification, are permitted provided that following conditions
are met (BSD style license):

* Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation
and/or other materials provided with the distribution.
* Neither the name of the SecurityVulns.COM nor the names of its
contributors may be used to endorse or promote products derived from this
software without specific prior written permission.


Insted of this license, you can also use and redistribute this software under
terms of compatible license, including:

1. Apache License, Version 2.0
You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

2. GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
You may obtain a copy of the License at

http://www.gnu.org/licenses/gpl.txt

3. GNU Lesser General Public License as published by the
Free Software Foundation; either version 2.1 of the License, or
(at your option) any later version.
You may obtain a copy of the License at

http://www.gnu.org/licenses/lgpl.txt


$Id: License,v 1.3 2007/04/05 11:59:47 vlad Exp $