| Vulnerabilities | |||||
|---|---|---|---|---|---|
| Version | Suggest | Low | Medium | High | Critical |
| 11.4.1 | 0 | 0 | 0 | 0 | 0 |
| 8.6.1 | 0 | 0 | 0 | 0 | 0 |
| 8.6.0 | 0 | 0 | 0 | 0 | 0 |
| 7.11.0 | 0 | 0 | 0 | 0 | 0 |
| 6.12.0 | 0 | 0 | 0 | 0 | 0 |
| 6.9.0 | 0 | 0 | 0 | 0 | 0 |
| 6.1.1 | 0 | 0 | 0 | 0 | 0 |
| 4.10.1 | 0 | 0 | 0 | 0 | 0 |
| 4.10.0 | 0 | 0 | 0 | 0 | 0 |
| 3.4.0 | 0 | 0 | 0 | 0 | 0 |
| 2.12.0 | 0 | 0 | 0 | 0 | 0 |
| 2.11.0 | 0 | 0 | 0 | 0 | 0 |
| 0.9.2 | 0 | 0 | 0 | 0 | 0 |
| 0.9.1 | 0 | 0 | 0 | 0 | 0 |
| 0.9.0 | 0 | 0 | 0 | 0 | 0 |
11.4.1 - This version may not be safe as it has not been updated for a long time. Find out if your coding project uses this component and get notified of any reported security vulnerabilities with Meterian-X Open Source Security Platform
Maintain your licence declarations and avoid unwanted licences to protect your IP the way you intended.
MIT - MIT LicenseNOTE: On Linux you need to install inotify-tools.
> fs:start_link(fs_watcher, "/Users/5HT/synrc/fs"). % need to start the fs watcher
> fs:subscribe(fs_watcher). % the pid will receive events as messages
> flush().
Shell got {<0.47.0>,
{fs,file_event},
{"/Users/5HT/synrc/fs/src/README.md",[closed,modified]}}> fs:known_events(fs_watcher). % returns events known by your backend
[mustscansubdirs,userdropped,kerneldropped,eventidswrapped,
historydone,rootchanged,mount,unmount,created,removed,
inodemetamod,renamed,modified,finderinfomod,changeowner,
xattrmod,isfile,isdir,issymlink,ownevent]> fs:start_looper(). % starts a sample process that logs events
=INFO REPORT==== 28-Aug-2013::19:36:26 ===
file_event: "/tank/proger/erlfsmon/src/4913" [closed,modified]OM A HUM