To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

BNC (software)

From Wikipedia, the free encyclopedia

A BNC (short for Bounced Network Connection) is a piece of software that is used to relay traffic and connections in computer networks, much like a proxy. Using a BNC allows a user to hide the original source of the user's connection, providing privacy as well as the ability to route traffic through a specific location. A BNC can also be used to hide the true target to which a user connects.[1]

YouTube Encyclopedic

  • 1/3
    Views:
    10 499
    3 750
    1 286
  • See Why You Should Work at BMC Software
  • Why BMC?
  • BMC Software – The Role of Performance & Analytics in Modern IT

Transcription

IRC

Scheme of an IRC network with normal clients (green), bots (blue) and bouncers (orange)

One common usage is over Internet Relay Chat (IRC) via a BNC running on remote servers. In such an environment, where it is very easy to ascertain a user's IP address a BNC may help to hide the original connection source, as well as providing the opportunity for "vhosts" or "virtual hosts". The use of a vhost does not conceal the connection any better but merely adds a statement as the hostname.

Many BNCs remain connected to an IRC server in the event the client should disconnect from the Internet. Often state changes are tracked so that they may be relayed to the client upon reconnection. Some implementations opt to store all messages sent across the network that the client would have normally received and send them upon the client's reconnection; this is often considered to be much too resource dependent for commercial hosting services to provide. Other logging features and bot like functions may be included with various implementations but are not standard.

Example

User A logs onto IRC directly and appears as [email protected]
User A logs onto IRC indirectly through a BNC and appears as [email protected]

Software

A list of bouncer software.

  • Bip IRC Proxy maintains a persistent connection and shows a backlog on reconnect.[2]
  • bnc is the original IRC bouncer.[3]
  • ezbounce's features include password protection, remote administration, logging and listening on multiple ports.[3]
  • JBouncer for IRC, written in Java. Supports logging.[4]
  • muh bnc is a smart and versatile irc-bouncing tool that will also go on IRC as soon as it is launched, guarding or attempting to get one's nick.[3]
  • psyBNC is said to be the oldest and most well-known IRC bouncer.[1] It is easy to use, runs on Linux[5] and became popular on FreeBSD,[6] supports IPv4, IPv6, SSL, logging, multiple users and networks etc. Although psyBNC is like any other IRC proxy, it is often installed on compromised systems by the attacker.[7]
  • shroudBNC (IRC) supports SSL connections and offers a web interface. [8]
  • ZNC (IRC) is easy to use,[1] supports SSL connections, IPv6 and logging and offers a web interface. It is extendible by modules and scripts in C++, Python, Perl and Tcl.
  • Bouncer written in Java is a generic bouncer/proxy. Supports SSL tunneling, Failover and LoadBalancing of destinations.[9]
  • dircproxy
  • The Lounge acts like a bouncer and a progressive web app (PWA) client combined. It is open source.
  • soju is a simple and easy-to-configure IRC bouncer. The project is hosted on SourceHut.

FTP

BNCs are also often used for File Transfer Protocol (FTP), again to hide the user and server from each other and to route traffic through a specific location. FTP bouncers can be divided into two different categories, entry and traffic.

An entry bouncer acts as a gateway to the server, but it does not hide the existence of the actual server. Entry bouncers, like cubnc, can be used in a multiserver setup for easy access to each server and load balancing. This removes the need to select which FTP server to log into, when trying to access the server farm.

Traffic bouncers relay traffic through the host they are installed on and present themselves as if they were the FTP server, thus hiding the real location of the server completely. Multiple traffic bouncers can be installed parallel in order to balance traffic load across different links. Most elaborate bouncers can even bounce secure SSL/TLS connections.

See also

References

  1. ^ a b c Lederer, Christian (phrozen77). (December 22, 2009). "IRC bouncer comparison" Archived February 14, 2015, at the Wayback Machine. IRC-Junkie. December 22, 2009.
  2. ^ Friedman, Nat (June 17, 2011). "Instant company" Archived June 24, 2011, at the Library of Congress Web Archives. nat.org.
  3. ^ a b c "Linux IRC mini-HOWTO: IRC Bouncers (IRC Proxy)". The Linux Documentation Project. TLDP.org.
  4. ^ "JBouncer". Jibble.org. Retrieved May 24, 2012.
  5. ^ "psyBNC documentation". Ubuntu.com. Retrieved September 14, 2008.
  6. ^ "irc/psyBNC". Freshports. Retrieved September 14, 2008.
  7. ^ Mierau, Caspar Clemens (April 2007). "Looking for intruders with lsof" (PDF). Linux Magazine.
  8. ^ "shroudBNC". shroudbnc.info.
  9. ^ "Bouncer". Github. Retrieved November 2, 2012

External links

This page was last edited on 22 September 2023, at 13:55
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.