Knowledge

BNC (software)

Source 📝

133: 59: 93:
Many BNCs remain connected to an IRC server in the event the client should disconnect from the Internet. Often state changes are tracked so that they may be relayed to the client upon reconnection. Some implementations opt to store all messages sent across the network that the client would have
227:
Traffic bouncers relay traffic through the host they are installed on and present themselves as if they were the FTP server, thus hiding the real location of the server completely. Multiple traffic bouncers can be installed parallel in order to balance traffic load across different links. Most
94:
normally received and send them upon the client's reconnection; this is often considered to be much too resource dependent for commercial hosting services to provide. Other logging features and
301: 205:
from each other and to route traffic through a specific location. FTP bouncers can be divided into two different categories, entry and traffic.
50:
as well as the ability to route traffic through a specific location. A BNC can also be used to hide the true target to which a user connects.
109: 269: 213: 90:" or "virtual hosts". The use of a vhost does not conceal the connection any better but merely adds a statement as the hostname. 17: 330: 116: 325: 180: 162: 154: 158: 306: 209: 217: 229: 143: 87: 147: 86:
a BNC may help to hide the original connection source, as well as providing the opportunity for "
266: 194: 212:
to the server, but it does not hide the existence of the actual server. Entry bouncers, like
46:. Using a BNC allows a user to hide the original source of the user's connection, providing 220:. This removes the need to select which FTP server to log into, when trying to access the 8: 75: 202: 79: 63: 198: 39: 98:
like functions may be included with various implementations but are not standard.
296: 273: 319: 291: 335: 241: 43: 38:) is a piece of software that is used to relay traffic and connections in 221: 216:, can be used in a multiserver setup for easy access to each server and 246: 83: 82:. In such an environment, where it is very easy to ascertain a user's 132: 95: 67: 58: 47: 310: 27:
Software to relay traffic and connections in computer networks
114:
User A logs onto IRC indirectly through a BNC and appears as
265:
Lederer, Christian (phrozen77). (December 22, 2009).
317: 107:User A logs onto IRC directly and appears as 161:. Unsourced material may be challenged and 228:elaborate bouncers can even bounce secure 181:Learn how and when to remove this message 300:) is being considered for deletion. See 259: 57: 14: 318: 159:adding citations to reliable sources 126: 24: 78:(IRC) via a BNC running on remote 25: 347: 304:to help reach a consensus. › 283: 276:. IRC-Junkie. December 22, 2009. 131: 62:Scheme of an IRC network with 13: 1: 289: 252: 193:BNCs are also often used for 70:(blue) and bouncers (orange) 7: 235: 208:An entry bouncer acts as a 10: 352: 331:Computer security software 272:February 14, 2015, at the 101: 36:Bounced Network Connection 326:Internet privacy software 197:(FTP), again to hide the 74:One common usage is over 302:templates for discussion 267:"IRC bouncer comparison" 195:File Transfer Protocol 122: 71: 53: 61: 155:improve this section 18:Bouncer (networking) 76:Internet Relay Chat 72: 191: 190: 183: 40:computer networks 16:(Redirected from 343: 277: 263: 186: 179: 175: 172: 166: 135: 127: 118: 111: 21: 351: 350: 346: 345: 344: 342: 341: 340: 316: 315: 305: 286: 281: 280: 274:Wayback Machine 264: 260: 255: 238: 187: 176: 170: 167: 152: 136: 125: 115: 108: 104: 56: 28: 23: 22: 15: 12: 11: 5: 349: 339: 338: 333: 328: 314: 313: 307:BNC (software) 285: 284:External links 282: 279: 278: 257: 256: 254: 251: 250: 249: 244: 237: 234: 218:load balancing 189: 188: 139: 137: 130: 124: 121: 120: 119: 112: 103: 100: 64:normal clients 55: 52: 42:, much like a 26: 9: 6: 4: 3: 2: 348: 337: 334: 332: 329: 327: 324: 323: 321: 312: 308: 303: 299: 298: 293: 288: 287: 275: 271: 268: 262: 258: 248: 245: 243: 240: 239: 233: 232:connections. 231: 225: 223: 219: 215: 211: 206: 204: 200: 196: 185: 182: 174: 164: 160: 156: 150: 149: 145: 140:This section 138: 134: 129: 128: 117: 113: 110: 106: 105: 99: 97: 91: 89: 85: 81: 77: 69: 65: 60: 51: 49: 45: 41: 37: 33: 19: 295: 261: 226: 207: 192: 177: 168: 153:Please help 141: 92: 73: 35: 31: 29: 290:‹ The 222:server farm 34:(short for 320:Categories 253:References 247:Open proxy 84:IP address 171:July 2011 142:does not 66:(green), 292:template 270:Archived 236:See also 294:below ( 230:SSL/TLS 210:gateway 163:removed 148:sources 102:Example 80:servers 48:privacy 311:Curlie 297:Curlie 203:server 88:vhosts 242:Proxy 214:cubnc 44:proxy 201:and 199:user 146:any 144:cite 68:bots 336:IRC 309:at 157:by 123:FTP 96:bot 54:IRC 32:BNC 322:: 224:. 30:A 184:) 178:( 173:) 169:( 165:. 151:. 20:)

Index

Bouncer (networking)
computer networks
proxy
privacy

normal clients
bots
Internet Relay Chat
servers
IP address
vhosts
bot



cite
sources
improve this section
adding citations to reliable sources
removed
Learn how and when to remove this message
File Transfer Protocol
user
server
gateway
cubnc
load balancing
server farm
SSL/TLS
Proxy

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.