133:
59:
93:
Many BNCs remain connected to an IRC server in the event the client should disconnect from the
Internet. Often state changes are tracked so that they may be relayed to the client upon reconnection. Some implementations opt to store all messages sent across the network that the client would have
227:
Traffic bouncers relay traffic through the host they are installed on and present themselves as if they were the FTP server, thus hiding the real location of the server completely. Multiple traffic bouncers can be installed parallel in order to balance traffic load across different links. Most
94:
normally received and send them upon the client's reconnection; this is often considered to be much too resource dependent for commercial hosting services to provide. Other logging features and
301:
205:
from each other and to route traffic through a specific location. FTP bouncers can be divided into two different categories, entry and traffic.
50:
as well as the ability to route traffic through a specific location. A BNC can also be used to hide the true target to which a user connects.
109:
269:
213:
90:" or "virtual hosts". The use of a vhost does not conceal the connection any better but merely adds a statement as the hostname.
17:
330:
116:
325:
180:
162:
154:
158:
306:
209:
217:
229:
143:
87:
147:
86:
a BNC may help to hide the original connection source, as well as providing the opportunity for "
266:
194:
212:
to the server, but it does not hide the existence of the actual server. Entry bouncers, like
46:. Using a BNC allows a user to hide the original source of the user's connection, providing
220:. This removes the need to select which FTP server to log into, when trying to access the
8:
75:
202:
79:
63:
198:
39:
98:
like functions may be included with various implementations but are not standard.
296:
273:
319:
291:
335:
241:
43:
38:) is a piece of software that is used to relay traffic and connections in
221:
216:, can be used in a multiserver setup for easy access to each server and
246:
83:
82:. In such an environment, where it is very easy to ascertain a user's
132:
95:
67:
58:
47:
310:
27:
Software to relay traffic and connections in computer networks
114:
User A logs onto IRC indirectly through a BNC and appears as
265:
Lederer, Christian (phrozen77). (December 22, 2009).
317:
107:User A logs onto IRC directly and appears as
161:. Unsourced material may be challenged and
228:elaborate bouncers can even bounce secure
181:Learn how and when to remove this message
300:) is being considered for deletion. See
259:
57:
14:
318:
159:adding citations to reliable sources
126:
24:
78:(IRC) via a BNC running on remote
25:
347:
304:to help reach a consensus. ›
283:
276:. IRC-Junkie. December 22, 2009.
131:
62:Scheme of an IRC network with
13:
1:
289:
252:
193:BNCs are also often used for
70:(blue) and bouncers (orange)
7:
235:
208:An entry bouncer acts as a
10:
352:
331:Computer security software
272:February 14, 2015, at the
101:
36:Bounced Network Connection
326:Internet privacy software
197:(FTP), again to hide the
74:One common usage is over
302:templates for discussion
267:"IRC bouncer comparison"
195:File Transfer Protocol
122:
71:
53:
61:
155:improve this section
18:Bouncer (networking)
76:Internet Relay Chat
72:
191:
190:
183:
40:computer networks
16:(Redirected from
343:
277:
263:
186:
179:
175:
172:
166:
135:
127:
118:
111:
21:
351:
350:
346:
345:
344:
342:
341:
340:
316:
315:
305:
286:
281:
280:
274:Wayback Machine
264:
260:
255:
238:
187:
176:
170:
167:
152:
136:
125:
115:
108:
104:
56:
28:
23:
22:
15:
12:
11:
5:
349:
339:
338:
333:
328:
314:
313:
307:BNC (software)
285:
284:External links
282:
279:
278:
257:
256:
254:
251:
250:
249:
244:
237:
234:
218:load balancing
189:
188:
139:
137:
130:
124:
121:
120:
119:
112:
103:
100:
64:normal clients
55:
52:
42:, much like a
26:
9:
6:
4:
3:
2:
348:
337:
334:
332:
329:
327:
324:
323:
321:
312:
308:
303:
299:
298:
293:
288:
287:
275:
271:
268:
262:
258:
248:
245:
243:
240:
239:
233:
232:connections.
231:
225:
223:
219:
215:
211:
206:
204:
200:
196:
185:
182:
174:
164:
160:
156:
150:
149:
145:
140:This section
138:
134:
129:
128:
117:
113:
110:
106:
105:
99:
97:
91:
89:
85:
81:
77:
69:
65:
60:
51:
49:
45:
41:
37:
33:
19:
295:
261:
226:
207:
192:
177:
168:
153:Please help
141:
92:
73:
35:
31:
29:
290:‹ The
222:server farm
34:(short for
320:Categories
253:References
247:Open proxy
84:IP address
171:July 2011
142:does not
66:(green),
292:template
270:Archived
236:See also
294:below (
230:SSL/TLS
210:gateway
163:removed
148:sources
102:Example
80:servers
48:privacy
311:Curlie
297:Curlie
203:server
88:vhosts
242:Proxy
214:cubnc
44:proxy
201:and
199:user
146:any
144:cite
68:bots
336:IRC
309:at
157:by
123:FTP
96:bot
54:IRC
32:BNC
322::
224:.
30:A
184:)
178:(
173:)
169:(
165:.
151:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.