ssh1 ssh2 shareware downloads
Search results for «ssh1 ssh2»:
AceaXe Plus 1.4
… l
Optional server implementation of Berkeley Line Printer protocol
Login account on the host machine.
Limitations
This demo has a time limit of about 30 minutes per use/run.…
wodSSH 3.1.1
… eived data
WaitFor and Execute methods - approach similar to UNIX "expect" command
Password and PrivateKey authentication
Port forwarding through one channel…
wodSSH.NET 2.2.2
… d
Unix Expect-alike behavior model
Regular expressions can be used to easily match remote prompt
Fully managed - source in C# available
Samples in VB.NET, C#…
J2SSH Maverick 1.2.11
… uirements
The J2SSH Maverick API requires that a compatible Java Development Kit (JDK) is installed prior to starting development.
Limitations
21 days trial…
wodTelnetDLX 2.2.4
… special) is pressed
Allows transparent use of any of supported protocol. Change one property - leave other code the same!
Supports context-menus of your choice…
VShell Server 2.6.4
… d for system administration, secure network access and file transfer.
It provides access through an encrypted tunnel to e-mail, databases and other TCP/IP applications. Files can be transferred securely using SSH2 client SFTP and SCP commands.…
Maverick.NET 1.0.7
… ing events for asynchronous channel operation
File transfer events for SFTP/SCP progress indicators
Reading of PuTTY and SSH.com private keys
X Forwarding…
Sysax Multi Server PRO 4.01
… ased FTPS connections
FTP and Telnet connections
Simultaneous access using multiple protocols
License for commercial use
Free upgrade to all future 4.xx releases
Limitations
30 day trial license to enable you to evaluate the product…
Secure CommNet 2.35
… NAPPNOWAIT (starts another program on the system without waiting for it to finish)
RUNAPPANDWAIT (starts another program on the system and waits for it to finish)
RUNSCRIPT (passes control of the current script to a new script file)
Increased de…
SecEx Secure Shell Client 1.6
… ations feature SCP ( Secure Copy Program).
SecEx also shields against IP and DNS spoofing by recording a server's public host key. During subsequent connection attempts, the known host key is compared to the host key offered by the server.…
Related: ssh1 ssh2 ssh1 ssh1 and and ssh2 ssh2