syscon-nc is just the same as syscon in the same version, only without the cryptographic functions.
You should only use syscon-nc, if you are not allowed to use strong cryptography (AES) or if you want to analyse the data sent by syscon. Otherwise, it is much safer to use normal syscon
Using syscon-nc can open the remote computer to any attacks from people with internet access who know the remote machine’s IP and the port you specified unless you use your own cryptography tool. If you want to be sure that this does not happen, the remote machine must not be connected to the internet. If this is not possible, you might use syscon instead of syscon-nc.
THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
TODO: Figure out how to actually get changelog content.
Changelog content for this version goes here.
TODO: Brief introduction on what you do with files - including link to relevant help section.
|File Name & Checksum SHA256 Checksum Help||Version||File Type||Upload Date|
|syscon-nc-0.4.tar.gz (6.1 kB) Copy SHA256 Checksum SHA256||–||Source||Jun 24, 2011|
|syscon-nc-0.4.zip (8.0 kB) Copy SHA256 Checksum SHA256||–||Source||Jun 24, 2011|