Vulnerabilities | |||||
---|---|---|---|---|---|
Version | Suggest | Low | Medium | High | Critical |
11.4.1 | 0 | 0 | 0 | 0 | 0 |
8.6.1 | 0 | 0 | 0 | 0 | 0 |
8.6.0 | 0 | 0 | 0 | 0 | 0 |
7.11.0 | 0 | 0 | 0 | 0 | 0 |
6.12.0 | 0 | 0 | 0 | 0 | 0 |
6.9.0 | 0 | 0 | 0 | 0 | 0 |
6.1.1 | 0 | 0 | 0 | 0 | 0 |
4.10.1 | 0 | 0 | 0 | 0 | 0 |
4.10.0 | 0 | 0 | 0 | 0 | 0 |
3.4.0 | 0 | 0 | 0 | 0 | 0 |
2.12.0 | 0 | 0 | 0 | 0 | 0 |
2.11.0 | 0 | 0 | 0 | 0 | 0 |
0.9.2 | 0 | 0 | 0 | 0 | 0 |
0.9.1 | 0 | 0 | 0 | 0 | 0 |
0.9.0 | 0 | 0 | 0 | 0 | 0 |
11.4.1 - This version is safe to use because it has no known security vulnerabilities at this time. Find out if your coding project uses this component and get notified of any reported security vulnerabilities with Meterian-X Open Source Security Platform
Maintain your licence declarations and avoid unwanted licences to protect your IP the way you intended.
MIT - MIT LicenseNOTE: On Linux you need to install inotify-tools.
> fs:start_link(fs_watcher, "/Users/5HT/synrc/fs"). % need to start the fs watcher
> fs:subscribe(fs_watcher). % the pid will receive events as messages
> flush().
Shell got {<0.47.0>,
{fs,file_event},
{"/Users/5HT/synrc/fs/src/README.md",[closed,modified]}}
> fs:known_events(fs_watcher). % returns events known by your backend
[mustscansubdirs,userdropped,kerneldropped,eventidswrapped,
historydone,rootchanged,mount,unmount,created,removed,
inodemetamod,renamed,modified,finderinfomod,changeowner,
xattrmod,isfile,isdir,issymlink,ownevent]
> fs:start_looper(). % starts a sample process that logs events
=INFO REPORT==== 28-Aug-2013::19:36:26 ===
file_event: "/tank/proger/erlfsmon/src/4913" [closed,modified]
OM A HUM