Difference between revisions of "Ostiary"
(Created page with "{{Entry |Name=Ostiary |Short description=Executes secure remote scripts |Full description=Ostiary lets a client run scripts on a server in a secure, authenticated manner, using a...") |
(Added Ruby link) |
||
(One intermediate revision by one other user not shown) | |||
Line 3: | Line 3: | ||
|Short description=Executes secure remote scripts | |Short description=Executes secure remote scripts | ||
|Full description=Ostiary lets a client run scripts on a server in a secure, authenticated manner, using an extremely simple protocol that is immune to buffer-overflow attacks. It is useful as a limited ssh/lsh replacement, or to selectively enable full remote shell access on a temporary basis. | |Full description=Ostiary lets a client run scripts on a server in a secure, authenticated manner, using an extremely simple protocol that is immune to buffer-overflow attacks. It is useful as a limited ssh/lsh replacement, or to selectively enable full remote shell access on a temporary basis. | ||
+ | |Homepage URL=https://github.com/L2G/ostiary | ||
|User level=intermediate | |User level=intermediate | ||
− | | | + | |Is High Priority Project=No |
− | |||
− | |||
− | |||
|Computer languages=C | |Computer languages=C | ||
− | | | + | |Accepts cryptocurrency donations=No |
− | |||
− | |||
− | |||
− | |||
|Related projects=Vnc | |Related projects=Vnc | ||
|Keywords=shell,SSH,remote,scripts,execution,lsh,buffer overflow | |Keywords=shell,SSH,remote,scripts,execution,lsh,buffer overflow | ||
− | | | + | |Version identifier=4.0 |
− | |Last review by= | + | |Version date=2012/10/16 |
− | |Last review date= | + | |Version status=stable |
+ | |Version download=https://github.com/L2G/ostiary/archive/master.zip | ||
+ | |Version comment=4.0 stable released 2012-10-16 | ||
+ | |Last review by=Bendikker | ||
+ | |Last review date=2018/03/30 | ||
|Submitted by=Database conversion | |Submitted by=Database conversion | ||
|Submitted date=2011-04-01 | |Submitted date=2011-04-01 | ||
− | | | + | |Is GNU=No |
− | | | + | |License verified date=2004-01-28 |
− | | | + | }} |
− | | | + | {{Project license |
+ | |License=GPLv2orlater | ||
+ | |License verified by=Janet Casey | ||
|License verified date=2004-01-28 | |License verified date=2004-01-28 | ||
− | |||
}} | }} | ||
{{Person | {{Person | ||
+ | |Real name=Ray Ingles | ||
|Role=Maintainer | |Role=Maintainer | ||
− | + | }} | |
− | | | + | {{Resource |
− | |Resource URL= | + | |Resource audience=Ruby (Ref) |
+ | |Resource URL=https://rubygems.org/gems/ostiary | ||
}} | }} | ||
{{Resource | {{Resource | ||
Line 42: | Line 43: | ||
|Interface=command-line | |Interface=command-line | ||
|Internet-application=security | |Internet-application=security | ||
− | |Use=internet-application,security | + | |Use=internet-application, security |
− | |||
− | |||
− | |||
− | |||
− | |||
}} | }} | ||
+ | {{Featured}} |
Latest revision as of 03:29, 30 March 2018
Ostiary
https://github.com/L2G/ostiary
Executes secure remote scripts
Ostiary lets a client run scripts on a server in a secure, authenticated manner, using an extremely simple protocol that is immune to buffer-overflow attacks. It is useful as a limited ssh/lsh replacement, or to selectively enable full remote shell access on a temporary basis.
Licensing
License
Verified by
Verified on
Notes
Leaders and contributors
Contact(s) | Role |
---|---|
Ray Ingles | Maintainer |
Resources and communication
Audience | Resource type | URI |
---|---|---|
Bug Tracking,Developer,Support | Homepage | http://ingles.homeunix.net/contact.html |
Ruby (Ref) | https://rubygems.org/gems/ostiary |
Software prerequisites
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.