On Mon, 29 Sep 2003, Daniel Gilly wrote:
I'm looking for man-page style info for ns_register_adp and
ns_unregister_adp. Can anyone point me to it or provide it?
Daniel
Some time ago I have created ns_register_adp for my private project and
proposed to add it to AOLserver core.
I found it
On Mon, Sep 29, 2003 at 10:32:30PM -0400, Scott Goodwin wrote:
7. Virtual servers in AOLserver 4.0 adds a lot more complexity to the
code -- virtual server state must be kept to ensure that one virtual
server cannot access another virtual server's structures and data.
I realize this must be
On Tuesday, September 30, 2003, at 04:11 AM, Andrew Piskorski wrote:
I realize this must be awfully late in the coding to bring up, but:
Would it greatly simplify or speed up things to release a first
version of nsopenssl which works with AOLserver 4.0, but does NOT
support virtual servers in
I want to look at the outging HTTP protocol traffic of my own browser,
on Linux, and I do have root access on the machine. What's the best
or handiest packet sniffing tool to use for this? Ones I've heard of
are tcpdump and ethereal.
A sniffer is a useful tool in general of course, but
On Tue, 30 Sep 2003, Andrew Piskorski wrote:
I want to look at the outging HTTP protocol traffic of my own browser,
on Linux, and I do have root access on the machine. What's the best
or handiest packet sniffing tool to use for this? Ones I've heard of
are tcpdump and ethereal.
I'd suggest
Darn - I was trying to remember that name! There was also a little perl
script written by the guy who wrote the CGI module - you could google that
and use it as a base to roll your own..
On Tue, 30 Sep 2003, Michael A. Cleverly wrote:
On Tue, 30 Sep 2003, Andrew Piskorski wrote:
I want to
* Andrew Piskorski [EMAIL PROTECTED] [20030930 15:47]:
I want to look at the outging HTTP protocol traffic of my own browser,
on Linux, and I do have root access on the machine. What's the best
or handiest packet sniffing tool to use for this? Ones I've heard of
are tcpdump and ethereal
I have had some luck running junkbuster as a proxy, without all the ad blocking, to just capture all HTTP data. I point my browser at the junkbuster proxy and am able to pipe all HTTP data into a file, oh and it is clean,organized HTTP data as well. I use 2 machines (one proxy and one web
-Original Message-
From: AOLserver Discussion
[mailto:[EMAIL PROTECTED] Behalf
Of Andrew Piskorski
Sent: Tuesday, September 30, 2003 2:43 PM
What's the best or handiest packet sniffing tool to use for this? Ones
I've heard of are tcpdump and ethereal.
I use ethereal in general,
In a message dated 9/30/03 2:59:31 PM Eastern Daylight Time, [EMAIL PROTECTED] writes:
Does anyone have a pointer to convenient code for doing the client(browser) side of that communication from Tcl or AOLserver? (I thinklibcurl supports it, but I have not tried that yet.)
Inside of AOLServer
I've seen references to aolserver 3.5.10, but can only seem to find 3.5.6.
What are the key differences and how does one obtain the newer version?
Thanks
--
AOLserver - http://www.aolserver.com/
To Remove yourself from this list, simply send an email to [EMAIL PROTECTED] with the
body of SIGNOFF
If you have a sourceforge account, do this:
cvs -z3 -d:ext:[EMAIL PROTECTED]:/cvsroot/aolserver
co -r aolserver_v35_bp aolserver
but change 'scottg' to your username.
Otherwise, do this:
cvs -d:pserver:[EMAIL PROTECTED]:/cvsroot/aolserver login
cvs -z3 -d:pserver:[EMAIL
Tired of click, click, click to get to the tcl or ns_ command
references?
For tcl commands try:
http://zmbh.com/tcl/string (for string)
For ns_* commands try:
http://zmbh.com/nsapi/ns_geturl
Oh, and check out the fixed up dirlist output at
http://zmbh.com/
-- removed // between last two
13 matches
Mail list logo