Search N5 Net Software Repository:
Search Files
Sponsor:
Browse:
- Audio & Multimedia (1643)
- Business (3971)
- Communications (1197)
- Desktop (222)
- Development (607)
- Education (291)
- Games & Entertainment (731)
- Graphic Apps (698)
- Home & Hobby (108)
- Network & Internet (593)
- Security & Privacy (536)
- Servers (69)
- System Utilities (31267)
- Web Development (297)
Areas Of Interest
Authors Area
Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.
wodSSHServer 2.5.4
wodSSHServer is an SSH Server ActiveX component (but also Telnet Server ActiveX as well) that will give you ability to easily add SSH2 (and SFTP) server capabilities to your application, as well as old TELNET server protocol. SSH protocol provides strong encryption of data, and authentication of users over insecure networks, such as Internet. Using it is really easy. Add it to your form (or create instance on the fly), use internal methods to generate pair of keys for the server (or import existing ones from other SSH servers) and start the server. From that moment, clients will be able to connect to your server, and do the following: enter chat that you created for them, start command prompt and execute commands inside (just as they would do it from the console window), start some program of their choice use internally provided SFTP (secure ftp) server, or open port forwarding for other programs All of this, of course, can be adjusted by your needs. By default, server will not allow anyone to login unless you specify so (using LoginPassword event that is fired when someone wants to login to your server). Once connected, you will get the information about service type user requests. At this point, you can accept, reject or even change the service he requested. Or, you can just leave him alone and not interfere with his actions at all. Using wodSSHServer is ideal if you need server side of encrypted communication, and don't want to hassle with certificates (used in SSL communication). Almost everyone today has some sort of SSH client which can be used to connect to your server. Included samples will show you, step by step, how to manually respond to client's actions. You can make an interface that will talk to the clients (like an BBS system), they will enter commands and different type of values in your program where you can evaluate them. This is ideal for making restricted access area where users will be allowed only to, login and change passwords
Specifications:
Version: 2.5.4 |
Download
|
Similar Products:
VISCOM IMAGE VIEWER CP GOLD SDK ACTIVEX 21.0
Development :: Active X
Powerful document imaging sdk activex, good quality pdf viewer, view tiff, pdf, image files, read Barcode, Write Barcode, OCR searchable PDF for C++ , C#, VB.NET , VB, Delphi, Vfp, MS Access.
Windows | Shareware
Read More
VISCOMSOFT IMAGE VIEWER CP PRO SDK 23.0
Development :: Active X
Document Imaging SDK for WinForms, VB6, VFP, MS Access, PDF Creator, Loading and printing PDF, BMP, GIF, ICO, JPEG, JPEG 2000, PCX, PNG, PSD, TIF, WMF, WBMP, TGA. Read, write EXIF image information.Including TIFF tags. OCR to searchable PDF. TIFF PDF to docx, Convert PDF, BMP, GIF, JPG, PNG, ICO, TIF image files to PDF file. Convert multipage TIF to multipage PDF. Autofill PDF form fields, save to image file
Windows | Shareware
Read More
Development :: Active X
wodTelnetDLX is a telnet client component ready to connect to various terminal based clients, most commonly to UNIX telnet daemon. Besides supported Telnet protocol, it also supports secured communication (through encryption) using well known SSH (SSH1 and SSH2 are supported), as well as SSL/TLS (Secure Socket Layer protocol). ActiveX version of the component has its own Terminal GUI that supports VT100 and Linux emulation.
Windows | Shareware
Read More
Development :: Active X
Lightweight component that provides strong encryption for your applications. It provides supports for most common crypto algorithms, such as AES, DES, TripleDES, Blowfish, Cast, RC2, RC4, RC5 for symmetric encryption and decryption, RSA, DSA, for making and verifying signatures, and MD5, SHA1 for creating hashes
Windows | Shareware
Read More