Node.js 15.10.0 軟體資訊交流 Mac

winXmac軟體社群 Mac 壓縮備份 ExpanDrive, Inc. 未分類 Rate 100

ExpanDrive for Mac,軟體教學,軟體下載,軟體社群,Windows軟體,Mac軟體

Node.js 15.10.0 Mac


ExpanDrive for Mac 讓你透明地訪問,打開,編輯和保存所有您最喜愛的程序 - TextMate,Photoshop 中,橡子,終端,甚至 Finder 文件。無需加載單獨的客戶端來傳輸文件。直接在 Finder 中通過 SSH / SFTP 訪問遠程文件 - 就像直接連接到您自己的計算機上的 USB 驅動器一樣。 ExpanDrive for Mac 提供超快的背景保存和傳輸,並提供比以往更多的雲存儲提供商選擇.



ExpanDrive for Mac 功能:

支持每個 Cloud
ExpanDrive 創建一個虛擬 USB 驅動器連接到所有主要的雲存儲提供商,如 Dropbox 的,谷歌驅動器,亞馬遜雲端硬盤,Box,OneDrive,OpenStack Swift,Amazon S3 或您自己的 SFTP,FTP 或 WebDAV 服務器.

超快速即時上傳
ExpanDrive v5 通過將傳輸轉移到後台再次更改遊戲。就像流行的同步應用程序[想想:Dropbox / Google Drive] 一樣。這讓你繼續工作,並停止等待轉移完成。 ExpanDrive v5 快速上傳您的文件在後台。我們已經構建了一個多線程連接引擎,使我們的最新版本更快,響應速度更快.

每個應用程序中的雲存儲
ExpanDrive v5 就像插入計算機的 USB 驅動器一樣。即使在半個世界以外的服務器上打開,編輯和保存文件到遠程計算機,也可以從您喜歡的程序中進行保存。通過透明地將其連接到遠程數據來增強計算機上的每個應用程序.

Finder& Explorer 是您的用戶界面
直接從 Finder 和 Explorer 甚至終端訪問任何遠程文件服務器。沒有必要為文件傳輸打開一個單獨的傳輸客戶端。 ExpanDrive v5 擴展了所有應用程序可以訪問數據的方式.

注意:7 天試用版。需要 64 位處理器.

檔案版本 Node.js 15.10.0
檔案名稱 node-v15.10.0.pkg
檔案大小
系統 Mac OS X 10.9 or later
軟體類型 未分類
作者 ExpanDrive, Inc.
更新日期 http://www.expandrive.com/apps/expandrive/
軟體類型 2021-02-24
更新日誌

What's new in this version:

Fixed:
- CVE-2021-22883: HTTP2 'unknownProtocol' cause Denial of Service by resource exhaustion
Affected Node.js versions are vulnerable to denial of service attacks when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.
- CVE-2021-22884: DNS rebinding in --inspect
Affected Node.js versions are vulnerable to denial of service attacks when the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
- CVE-2021-23840: OpenSSL - Integer overflow in CipherUpdate
This is a vulnerability in OpenSSL which may be exploited through Node.js

檔案下載 檔案下載