
Security News
Follow-up and Clarification on Recent Malicious Ruby Gems Campaign
A clarification on our recent research investigating 60 malicious Ruby gems.
== Brief Description Interface for Mutexes on MS Windows.
== Prerequisites win32-ipc 0.6.0 or later
== Installation gem install win32-mutex
== Synopsis require 'win32/mutex'
Win32::Mutex.new(false, 'test') do |m| # Do stuff m.release end
== Documentation The mutex.rb file contains inline RDoc documentation. If you installed this file as a gem, then you have the docs.
For an example of win32-mutex in action, look at the example_win32_mutex.rb file in the 'examples' directory. You can also run the 'examples' rake task.
== Notes The Mutex class is a subclass of Win32::Ipc (win32-ipc). This library require's the win32-ipc library internally. You don't need to explicitly call it.
== Acknowledgements Originally adapted from the Win32::Mutex Perl module.
== Known Bugs
None that I know of. Please log any other bug reports on the
project page at https://github.com/djberg96/win32-mutex.
== License Artistic 2.0
== Copyright (C) 2003-2013 Daniel J. Berger, All Rights Reserved
== Warranty This package is provided "as is" and without any express or implied warranties, including, without limitation, the implied warranties of merchantability and fitness for a particular purpose.
== Authors Daniel J. Berger Park Heesob
FAQs
Unknown package
We found that win32-mutex demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A clarification on our recent research investigating 60 malicious Ruby gems.
Security News
ESLint now supports parallel linting with a new --concurrency flag, delivering major speed gains and closing a 10-year-old feature request.
Research
/Security News
A malicious Go module posing as an SSH brute forcer exfiltrates stolen credentials to a Telegram bot controlled by a Russian-speaking threat actor.