
Security News
Follow-up and Clarification on Recent Malicious Ruby Gems Campaign
A clarification on our recent research investigating 60 malicious Ruby gems.
== Description Interface to MS Windows Event objects.
== Prerequsites Requires the win32-ipc library.
== Installation gem install win32-event
== Synopsis Win32::Event.new("Foo") do |event| event.set # Do stuff event.reset end
e2 = Win32::Event.open("Bar")
e2.close
== Documentation The event.rb file contains inline RDoc documentation. If you installed this file as a gem, then you have the docs.
== Notes The Event class is a subclass of Win32::Ipc (win32-ipc). This library require's the win32-ipc library internally (you don't need to explicitly call it).
A PulseEvent() wrapper is intentionally omitted. From the MSDN web site: "This function is unreliable and should not be used. It exists mainly for backward compatibility."
== Acknowledgements The Win32::Event Perl module by Chris Madsen was used as a general guideline for developing the API.
== Known Bugs None that I'm aware of. Please submit any bug reports to the project page at https://github.com/djberg96/win32-event.
== Copyright (C) 2003-2015 Daniel J. Berger All Rights Reserved
== License Artistic 2.0
== Author Park Heesob Daniel J. Berger
FAQs
Unknown package
We found that win32-event demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.
Security News
ESLint now supports parallel linting with a new --concurrency flag, delivering major speed gains and closing a 10-year-old feature request.
Research
/Security News
A malicious Go module posing as an SSH brute forcer exfiltrates stolen credentials to a Telegram bot controlled by a Russian-speaking threat actor.