syspy 0.0.28 → 0.0.30

Sign up to get free protection for your applications and to get access to all the features.
Files changed (2) hide show
  1. data/bin/syspy +2 -0
  2. metadata +12 -7
data/bin/syspy CHANGED
@@ -1,3 +1,5 @@
1
+ #! ruby
2
+
1
3
  $:.unshift File.join(File.dirname(File.dirname(__FILE__)),"lib")
2
4
 
3
5
  require "rubygems"
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: syspy
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.0.28
4
+ version: 0.0.30
5
5
  prerelease:
6
6
  platform: ruby
7
7
  authors:
@@ -9,11 +9,11 @@ authors:
9
9
  autorequire:
10
10
  bindir: bin
11
11
  cert_chain: []
12
- date: 2013-02-19 00:00:00.000000000 Z
12
+ date: 2013-02-27 00:00:00.000000000 Z
13
13
  dependencies:
14
14
  - !ruby/object:Gem::Dependency
15
15
  name: bindata
16
- requirement: &19613400 !ruby/object:Gem::Requirement
16
+ requirement: &19524880 !ruby/object:Gem::Requirement
17
17
  none: false
18
18
  requirements:
19
19
  - - ! '>='
@@ -21,8 +21,13 @@ dependencies:
21
21
  version: '0'
22
22
  type: :runtime
23
23
  prerelease: false
24
- version_requirements: *19613400
25
- description: ! 'Captures TDS (Sybase / MSSQL) packages directly from a network interface.
24
+ version_requirements: *19524880
25
+ description: ! 'syspy
26
+
27
+ =====
28
+
29
+
30
+ Captures TDS (Sybase / MSSQL) packages directly from a network interface.
26
31
 
27
32
 
28
33
  Currently, only TDS_LANGUAGE (Query Statements) and their TDS_PARAMFMT/2 TDS_PARAMS
@@ -46,7 +51,7 @@ description: ! 'Captures TDS (Sybase / MSSQL) packages directly from a network i
46
51
  sudo syspy eth0 192.168.1.6 2048
47
52
 
48
53
  '
49
- email: matthias.balmer@sysinf.ch
54
+ email: mbalmer@smss.ch
50
55
  executables:
51
56
  - syspy
52
57
  extensions: []
@@ -65,7 +70,7 @@ files:
65
70
  - lib/syspy.rb
66
71
  - lib/tds_package.rb
67
72
  - bin/syspy
68
- homepage:
73
+ homepage: https://github.com/balmma/syspy
69
74
  licenses: []
70
75
  post_install_message: To use syspy as standalone application run "sudo syspy <interface>
71
76
  <destination_ip> <destination_port>"