Web Proxy EH-1.3.6

CG Web Proxy allows you to Secure and Optimize the Web traffic. It can be implemented in forwarding mode for Web users or in reverse mode for Web applications. CG Web Proxy can be powered by an antivirus, a Web cache, a Web traffic compression facility, a Web traffic logger, a URL filtering facility and a WAF (Web Application Firewall). ...

Author CacheGuard Technologies Ltd
License Free To Try
Price $9.99
Released 2017-03-09
Downloads 191
Filesize 185.83 MB
Requirements Dedicated x84/x64 based Hardware or Virtual Machine with at least 1.5 GB RAM, 16 GB HDD and 2xNIC.
Installation Install and Uninstall
Keywords web proxy, http proxy, https proxy, reverse proxy
Users' rating
(7 rating)
Web ProxyFirewall & Proxy ServersWindows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, Windows 2003, Windows Server 2012, Windows Tablet PC Edition 2005, Windows Media Center Edition 2005, Windows Vista, Windows
Web Proxy shareware - Download Notice

Using Web Proxy Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of Web Proxy on rapidshare.com, depositfiles.com, megaupload.com etc. All Web Proxy download links are direct Web Proxy full download from publisher site or their selected mirrors.
Avoid: shareware oem software, old version, warez, serial, torrent, Web Proxy keygen, crack.
Consider: Web Proxy full version, shareware full download, premium download, licensed copy.

Web Proxy shareware - The Latest User Reviews

Most popular Firewall & Proxy Servers downloads

Portable DNS Cache and Firewall

2.44 download

Monitor, block, and cache DNS requests locally. Use wildcards to specify the names to be blocked or allowed. Save rules and load them with a single click on a file. Use ...

5 award

Gate-and-Way Internet

2.2 download

Quiet navigation, with the safety of a powerful firewall, using only one account with your ISP for all the users on the LAN. Redundant connections in order to obviate to possible ...

Proxy Switcher PRO

7.4.0 download

Different internet connections do often require completely different proxy server settings and it's a real pain to change them manually. Proxy Switcher provides proxy settings management solution and anonymous surfing capabilities. ...

CacheGuard OS

NG-1.2.6 download

CacheGuard is an All-in-One Web Security Gateway providing firewall, web antivirus, caching, web compression, URL filtering, forward/reverse proxy, web load balancing, WAF, antivirus, bandwidth shaping and more. The High Availability function ...

Geo Router

1.0 download

A geography based router that can work with a single network card having a single IP address. This is a perfect router for the cloud environment when partitioning or isolation of ...

5 award

Super Network Tunnel

4.5.1.3 download

Super Network Tunnel is a professional http tunnel solution,include client/server,it equal SocksCap+Bidirectional Http Tunnel +Remote Control. Normally used in building a network tunnel between the home and office computer,it's alias name ...

Jordy Proxy Changer

1.05 download

Jordy Proxy Changer is a proxy server software that automatically finds proxies and uses them in order to keep your privacy safe. This software includes a proxy management tool that allows ...

Hide ALL IP Portable Version

2020.01.13 download

Hide ALL IP is the worlds best IP hide software, hide all your applications and games IP from snoopers & hackers, allows you to surf anonymously, prevent identity theft, and guard ...

Bandwidth Manager and Firewall

3.6.2.0 download

BMF is tool for network administrators who needs central control over traffic shaping, amount of transferred data and security in company physical or virtual network. It is suitable tool for internet ...

Vov Syslog Server

2.1 download

Network devices send syslog messages about any number of events. These can be informational messages, such as user login events, or they can be critical messages, like a failure. By using ...