Torifier 1.02 Details


Publisher Description

Window 10 CompatibleTorifier lets you tunnel network applications through Tor without the need to reconfigure them. An application is not required to have native proxy support in order to work with Torifier. Torifier is a Tor bundle, meaning the program will install the Tor software and will manage it for you. Main features: Torify any application; Intuitive graphical user interface; Flexible firewall-bypass options; Route DNS requests through Tor; Automatically block UDP requests; Optionally, torify all programs; Emulate system-wide support for .onion names;

Download and use it now: Torifier

Related Programs

MDM Bypass iActivate Sofware

Most small businesses, big corporations, and educational institutions install mobile device Remote Management (MDM) system on Apple devices, including iPhone and iPad. Since 2016, our team has been offering a trusted and easy-to-use iActivate tool that bypasses such MDM lock...


JRecoverer Database Bundle

JRecoverer Database Bundle is a user account password auditing and recovery tool for Oracle Database, MySQL, PostgreSQL, Microsoft SQL Server database. The key advantage of the application is that its cross-platform. It can be successfully installed and run on various...


Max PC Privacy

Max PC Privacy is a comprehensive solution to boost your system performance and clear all your, online and offline activities. It is exclusively designed to clear all the Internet history, system history & cache, registry data. Max PC Privacy provide...


Hide IP Privacy

Nowadays online security is a necessity and prone to be vulnerable. The ensuing Hide IP Privacy program is fighting to create an online environment of trust and to promote the individuals? privacy online rights. Hide IP Privacy is user-friendly software...


Privacy Hide

Privacy Hide is a utility that allows the user to quickly hide specific applications from the computer screen with a single keystroke. This way, the user can keep his privacy and stop being watched accidentally by others. The user has...


Screenshot


Details

Keywords