Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • netcat ... . nc -L -p 53 -e cmd.exe Then from outside the firewall connect to the listening machine: nc -v xxx.xxx.xxx.xx 53 ... a machine that may have port filtering enabled in the TCP/IP Security Network control panel. Unlike Unix, NT does not seem to have any ...
  • LiipCacheControlBundle ... with a 200 "OK" for HEAD requests right after the security firewall has finished. This is useful when one uses Varnish ... obviously means that it only works with path based Security. Any additional security implemented inside the Controller will be ignored. ...
  • tollgate ... to work with newer version of Django, as there may be security issues in the old version of it that this software ... running programs as root directly. It also abstracts calls to the firewall, and maintains the list of unmetered and blacklisted hosts. This ...
  • ublog ... MIT Overview ======== ublog was created specifically to address the information security concerns that corporations have when using cloud based ... original URL. Since this server is inside the Company firewall, it is safe to shrink Companyinternal URL's ...
  • perl-poe-component-simpleftp ... usually need "passive" mode if you are behind a firewall. The default is: passive =head1 METHODS =head2 yield ... and NATs" * EPRT * EPSV =head2 RFC 2577 "FTP Security Considerations" * unimplemented =head2 RFC 2640 "Internationalization of the ...
  • FacebookCanvasAppBundle ... as it first your requirements. Note that these match from the top. security: access_control: - { path: /secure-1/, role: [FACEBOOK_PERMISSION_READ_STREAM,FACEBOOK_PERMISSION_PUBLISH_STREAM] } - { path: /secure-2/, ...
  • WinRM ... file. Add the following entry WinRMClient { com.sun.security.auth.module.Krb5LoginModule required doNotPrompt=false useTicketCache=false ... 3. Add the following property to the JVM -Djava.security.auth.login.config=/path/to/login.conf 4. ...
  • vayacondios ... | v1, v2 (current) | | organization | required | Name of organization, service, or app | `security`, `accounting`, `customerX` | | type | required | Request type | `event`, `stash`, `events`, `stashes` ...
  • grun ... to jobs (like disk i/o, user limits, etc.) * Features to avoid: No security Grun has no security. It has to be behind a firewall on dedicated machines. This limits it, and keeps it simple. It's not hard ...
  • OpenSRF ... / --------------------------------------------------------------------------- Define your public and private OpenSRF domains ---------------------------------------------- For security purposes, OpenSRF uses Jabber domains to separate services ...