-
-
netcat
... .
nc -L -p 53 -e cmd.exe
Then from outside the firewall connect to the listening machine:
nc -v xxx.xxx.xxx.xx 53 ... a
machine that may have port filtering enabled in the TCP/IP Security Network
control panel. Unlike Unix, NT does not seem to have any ...
-
LiipCacheControlBundle
... with a 200 "OK" for HEAD
requests right after the security firewall has finished. This is useful when
one uses Varnish ... obviously means that it only works with path based Security. Any
additional security implemented inside the Controller will be ignored. ...
-
tollgate
... to work with newer version of Django, as there may be
security issues in the old version of it that this software ... running programs as root directly. It also abstracts calls to the firewall, and maintains the list of unmetered and blacklisted hosts.
This ...
-
ublog
... MIT
Overview
========
ublog was created specifically to address the information security concerns
that corporations have when using cloud based ... original URL. Since this server is
inside the Company firewall, it is safe to shrink Companyinternal URL's ...
-
perl-poe-component-simpleftp
... usually need "passive" mode
if you are behind a firewall.
The default is: passive
=head1 METHODS
=head2 yield
... and NATs"
* EPRT
* EPSV
=head2 RFC 2577 "FTP Security Considerations"
* unimplemented
=head2 RFC 2640 "Internationalization of the ...
-
FacebookCanvasAppBundle
... as it first your requirements. Note that these match from the top.
security:
access_control:
- { path: /secure-1/, role: [FACEBOOK_PERMISSION_READ_STREAM,FACEBOOK_PERMISSION_PUBLISH_STREAM] }
- { path: /secure-2/, ...
-
WinRM
... file. Add the following entry
WinRMClient {
com.sun.security.auth.module.Krb5LoginModule required
doNotPrompt=false
useTicketCache=false
...
3. Add the following property to the JVM -Djava.security.auth.login.config=/path/to/login.conf
4. ...
-
vayacondios
... | v1, v2 (current) |
| organization | required | Name of organization, service, or app | `security`, `accounting`, `customerX` |
| type | required | Request type | `event`, `stash`, `events`, `stashes` ...
-
grun
... to jobs (like disk i/o, user limits, etc.)
* Features to avoid:
No security Grun has no security. It has to be behind a firewall on dedicated machines. This limits it, and keeps it simple. It's not hard ...
-
OpenSRF
... /
---------------------------------------------------------------------------
Define your public and private OpenSRF domains
----------------------------------------------
For security purposes, OpenSRF uses Jabber domains to separate services
...
-