|
|
|
|
|
ALAMODE120B.ZIP
22-APR-2022
RECENT
ALAMODE120B-AXP.ZIP
22-APR-2022
RECENT
ALAMODE120B-IA64.ZIP
22-APR-2022
RECENT
ALAMODE120B-X86.ZIP
22-APR-2022
RECENT
|
|
673kB
contents
151kB
contents
159kB
contents
132kB
contents
|
|
à la mode suitable for WASD v12.0
A browser-based WASD server monitor usable from all modern browsers. This
screenshot
gives a bit of a feel of the application, or a
live demonstration
courtesy of
DECUServe,
while
readmore.html
in the source directory provides detailed information.
NOTE: There are packages of
à la mode for
earlier versions of WASD.
|
|
DCLINABOX172.ZIP
06-NOV-2021
DCLINABOX172-AXP.ZIP
DCLINABOX172-IA64.ZIP
06-NOV-2021
DCLINABOX172-X86.ZIP
15-APR-2022
RECENT
|
|
208kB
contents
79kB
contents
80kB
contents
77kB
contents
|
|
DCLinabox
A browser-based VT102 Terminal Emulator allowing login to a hosting
system. Requires WASD v10.1 or later and a modern browser. Based on WebSocket
communication. Further information at
https://wasd.vsm.com.au/wasd_root/src/dclinabox/readmore.html, some
screenshots provide an idea of the look and feel, and a
live demonstration
is available courtesy of
DECUServe.
|
|
HYPERSPIXX310.ZIP
06-FEB-2018
|
|
1.8MB
contents
|
|
hyperSPI++
The basic hyperSPI available in the WASD package, plus additional
report items, plus more sophisticated graphics.
Read more.
Version 3 is suitable for Alpha, Itanium ($GETRMI API) and VAX. Should be
suitable for WASD, OSU, and CSWS (VMS Apache). hyperSPI++ requires DECC
6.n or 7.n and MMS/MMK to build. (Note: the VAX DECC 6.n
currently bug-checks during compilation.)
Author: Jean-François Piéronne
(jf.pieronne@gmail.com).
|
|
INTRUSPECT100.ZIP
13-FEB-2017
INTRUSPECT100-AXP.ZIP
13-FEB-2017
INTRUSPECT100-IA64.ZIP
13-FEB-2017
|
|
192kB
contents
85kB
contents
87kB
contents
37kB
|
|
INTRUspect
A browser-based VMS intrusion database monitor. It should run as a CGI script
under VMS Apache (SWS), OSU and WASD, and be usable from all modern browsers.
The overview
readmore.html
in the source directory provides detailed information.
|
|
MONDESI710.ZIP
06-NOV-2021
MONDESI710-AXP.ZIP
06-NOV-2021
MONDESI710-IA64.ZIP
06-NOV-2021
MONDESI710-X86.ZIP
15-APR-2022
RECENT
|
|
479kB
contents
135kB
contents
140kB
contents
121kB
contents
|
|
MonDeSi
A browser-based VMS system monitor. It should run as a CGI script under and be
usable from all modern browsers. This
screenshot
gives a bit of a feel of the application, or a
live demonstration
(limited to top-process, no per-process) courtesy of
DECUServe,
while
readmore.html
in the source directory provides detailed information.
|
|
SOYMAIL202.ZIP
06-NOV-2021
SOYMAIL202-AXP.ZIP
06-NOV-2021
SOYMAIL202-IA64.ZIP
06-NOV-2021
SOYMAIL202-X86.ZIP
15-APR-2022
RECENT
|
|
1.4MB
contents
743kB
contents
740kB
contents
658kB
contents
624kB
|
|
soyMAIL
A VMS application executing as a CGI script providing authenticated Web
access to an account's VMS Mail.
•
Overview
•
Installation and Administration
•
Release notes
|
|
WASDOC200.ZIP
25-JUL-2020
WASDOC200-AXP.ZIP
25-JUL-2020
WASDOC200-IA64.ZIP
25-JUL-2020
|
|
351kB
contents
285kB
contents
286kB
contents
121kB
|
|
wasDOC – document authoring and processing
system
Used for generating WASD documentation;
rationale
and
full document.
For use at the command-line and in scripting.
It employs a plain-text editor and markup directives to generate integrated
HTML documentation.
Suitable for VMS Apache, OSU and a standard element of the WASD package.
(And does not need to be added to WASD v11.5.)
|
|
| | | |
WUCME117.ZIP
06-NOV-2021
WUCME117-AXP.ZIP
06-NOV-2021
WUCME117-IA64.ZIP
06-NOV-2021
WUCME117-X86.ZIP
15-APR-2022
RECENT
|
|
244kB
contents
134kB
contents
119kB
contents
437kB
contents
|
|
wµCME,
Certificate Management Environment for Let's Encrypt™
"The objective ... is to make it possible to set up an HTTPS server
and have it automatically obtain a browser-trusted certificate,
without any human intervention [and at no cost]."
https://letsencrypt.org/
The
readmore.html
in the source directory provides detailed information.
|
|
Archive
|
|
|
|
"I'm sure that used to work before!" |