Home Contact Sitemap

N5 Net Software Repository

Your one-stop for all your software needs.

Search N5 Net Software Repository:

Search Files



Only Freeware

Sponsor:

Browse:

Areas Of Interest

Authors Area

Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.

wodBeep 1.0.0.0

Development :: Active X

Screenshot:

(Click to Enlarge)

ActiveX component is a peer-to-peer connection convenient to label each peer to behave in context of Listener(Server) or Initiator(Client). Component comes with several profiles included such as: SINK/ECHO profiles for testing, ROT13 profile that will grap message data, ZIP Tuning profile that will compress cocntents of messages on the fly, SYSLOG Raw and Cooked profiles for transmitting (and recieving) syslog messages.... BEEP protocol is a generic application protocol for connection oriented, asynchronous interactions. It permits simultaneous and independent exchanges within the context of a single application user-identity. It supports both textual and binary messages. BEEP peers communicate with MESSAGES over predefined CHANNELS. Messages are generated by application defined PROFILES. Before message is sent, and once message is recieved by the peer, Profile defines parsing to provide necessary information. MESSAGES Messages are initiated by application, and are prepared by defined Profile. Corresponding profile awaits on other side to parse the message and provide only necessary information. CHANNELS All exchanges occur in the context of a channel -- a binding to a well-defined aspect of the application, such as transport security, user authentication, or data exchange. PROFILES Each channel has an associated "profile" that defines the syntax and semantics of messages exchanged. Implicit in the operation of BEEP is the notion of channel management. Except for few profiles defined internally in wodBeep you can define your own profiles: for data exchange, tuning parameters etc... TRANSPORT A BEEP session is mapped onto an underlying transport service. It can be single TCP connection, but also UDP or any higher level two-way transport service-SMTP arhitecture... wodBeep implements TCP transport for you - you can implement easily any other transport just by implementing IBeepTransport interface!!

Specifications:

Version: 1.0.0.0
Author: WeOnlyDo Software

License: Shareware
File Size: 1 MB
Last Virus Scan: 2026-03-15
Downloads: 145
Views: 121
Price: $0.00

Installer: Install and Uninstall
Released: 9-10-2003

Tags:
wodBeep Beep weonlydo peer communicate secure security protocol connection asynchronus


Download

download

Buy Now | Visit Home Page

Runs on:

Win95, Win98, WinME, WinNT 3.x, WinNT 4.x, WinXP, Windows2000, Windows2003

Requirements:

n/a

 

Similar Products:

VISCOM BARCODE READER SDK ACTIVEX 9.15

Development :: Active X
img Support read Kodak / Wang Annotation tag within a TIFF file and display it.Barcode Recognition reader.OCR to searchable pdf.Convert PDF to text.Extract text from PDF file.Convert multipage TIF to multipage PDF/A. Securing a PDF using 40 bit, 128 bit RC4 encryption and owner, user password.Powerful zoom in, zoom out, panning, auto zoom and auto scrolling. Render PDF, BMP, GIF, ICO, JPEG, JPEG 2000, PCX, PNG, PSD, TIF, WMF, WBMP, TGA.
Windows | Shareware
Read More

WODTELNETDLX 2.5.8

Development :: Active X
img wodTelnetDLX is a telnet client component ready to connect to various terminal based clients, most commonly to UNIX telnet daemon. Besides supported Telnet protocol, it also supports secured communication (through encryption) using well known SSH (SSH1 and SSH2 are supported), as well as SSL/TLS (Secure Socket Layer protocol). ActiveX version of the component has its own Terminal GUI that supports VT100 and Linux emulation.
Windows | Shareware
Read More

WODCRYPT 2.2.5

Development :: Active X
img Lightweight component that provides strong encryption for your applications. It provides supports for most common crypto algorithms, such as AES, DES, TripleDES, Blowfish, Cast, RC2, RC4, RC5 for symmetric encryption and decryption, RSA, DSA, for making and verifying signatures, and MD5, SHA1 for creating hashes
Windows | Shareware
Read More

MY SCREEN CAPTURE ACTIVEX 1.32

Development :: Active X
img This control let you capture screen in 5 ways (Full screen, Active window, predefined region, manual region and specific window) and getting instant result in memory. Some options are available to save the screen on disk and/or send it to clipboard. Easy to use, one of the good scenario is that you can add new support feature to your application by adding screen shot capture for user report when a problem appear.s
Windows | Shareware
Read More

 

HOSTED BY N5 Networks