Skip to main content

syscon without cryptography

Project description

syscon-nc is just the same as syscon in the same version, only without the cryptographic functions.

You should only use syscon-nc, if you are not allowed to use strong cryptography (AES) or if you want to analyse the data sent by syscon. Otherwise, it is much safer to use normal syscon

Warning

Using syscon-nc can open the remote computer to any attacks from people with internet access who know the remote machine’s IP and the port you specified unless you use your own cryptography tool. If you want to be sure that this does not happen, the remote machine must not be connected to the internet. If this is not possible, you might use syscon instead of syscon-nc.

Warning

THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

Project details


Release history Release notifications

This version
History Node

0.4

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Filename, size & hash SHA256 hash help File type Python version Upload date
syscon-nc-0.4.tar.gz (6.1 kB) Copy SHA256 hash SHA256 Source None Jun 24, 2011
syscon-nc-0.4.zip (8.0 kB) Copy SHA256 hash SHA256 Source None Jun 24, 2011

Supported by

Elastic Elastic Search Pingdom Pingdom Monitoring Google Google BigQuery Sentry Sentry Error logging CloudAMQP CloudAMQP RabbitMQ AWS AWS Cloud computing Fastly Fastly CDN DigiCert DigiCert EV certificate StatusPage StatusPage Status page