You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
tdenetwork/kpf
tpearson 2bc1d72869
rename the following methods:
13 years ago
..
src rename the following methods: 13 years ago
AUTHORS Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features. 15 years ago
CMakeLists.txt [kdenetwork/kpf] added cmake support 14 years ago
COPYING Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features. 15 years ago
ChangeLog Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features. 15 years ago
DESIGN rename the following methods: 13 years ago
Makefile.am Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features. 15 years ago
NEWS Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features. 15 years ago
README Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features. 15 years ago
THANKS Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features. 15 years ago
cr16-app-kpf.png Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features. 15 years ago
cr32-app-kpf.png Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features. 15 years ago
cr48-app-kpf.png Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features. 15 years ago
kpfapplet.desktop Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features. 15 years ago
kpfpropertiesdialogplugin.desktop Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features. 15 years ago

README

Public fileserver for KDE

Features:

  * Runs as an applet in kicker.
  * Uses HTTP protocol (supports 1.0 & 1.1)
  * Realtime connection monitor and control
  * Bandwidth capping.
  * Connection count limiting.
  * Designed for safety. No CGI, no PUT, no access outside virtual root.
  * Drag and drop an URL pointing to a local dir to add a share.
  * Integration with konqueror's ``properties'' dialog.
  * Persistent connections.

WARNING:

Please note that allowing remote access to local files is inherently dangerous.
I will not be held responsible for loss, damage, your head falling off, etc. I
will, however, do all in my power to keep this software secure. If you don't
trust me (and why should you ?) then simply don't run this software.

Currently there are no known security holes in this software.

Developers:

This code allows remote access to local files. Therefore it must be secure.
I also try to limit the effect of DoS attacks and to help the user avoid
making silly mistakes like sharing ~.

Please send patches to me for approval before committing to CVS.

Shortly before a KDE release, during the feature freeze, I will do a full code
audit. If I am unable to do this for whatever reason, I will ask for someone
else to do the audit. If the audit cannot be performed and code changes are
non-trivial, kpf should not be released.

License terms:

MIT license. See COPYING.

Rik Hemsley (rikkus) <rik@kde.org>