Redis-64
3.0.501
See the version list below for details.
dotnet add package Redis-64 --version 3.0.501
NuGet\Install-Package Redis-64 -Version 3.0.501
<PackageReference Include="Redis-64" Version="3.0.501" />
paket add Redis-64 --version 3.0.501
#r "nuget: Redis-64, 3.0.501"
// Install Redis-64 as a Cake Addin #addin nuget:?package=Redis-64&version=3.0.501 // Install Redis-64 as a Cake Tool #tool nuget:?package=Redis-64&version=3.0.501
A porting of Redis on Windows 64-bit.
Redis http://redis.io/ is a very popular open-source, networked, in-memory, key-value data store known for high performance, flexibility, a rich set of data structures, and a simple straightforward API.
This package will install the Redis binaries in the default NuGet tools directory.
To report an issue please follow our wiki's instructions at https://github.com/MSOpenTech/redis/wiki/Submitting-an-Issue
Learn more about Target Frameworks and .NET Standard.
This package has no dependencies.
NuGet packages (4)
Showing the top 4 NuGet packages that depend on Redis-64:
Package | Downloads |
---|---|
HackerSpray
A .NET 4 library to defend websites and web APIs against brute force and Denial-of-service attacks. .NET Core version also available. Features: * Protect login, registration, password reset pages against brute force and DOS attacks. * Block users from performing any action too many times. * Prevent too many hits from any IP or IP Range. * Blacklist/Whitelist specific IP, IP range, username, URLs, transactions for a period. An example scenario is a Bank Login page, where brute force password attempts on user accounts and DOS attack on Login page are a regular event. Using this library, you can protect login page from brute force attacks, blocking too many usernames from certain IPs, or too many hits from a range of IP trying to do DOS attack, or even simple 3 invalid login attempts per username, per 15 mins. This high performance, very lightweight library protects you from hitting the database too many times on pages and APIs that are prone to attacks, thus lowering web server and database CPU, increasing the scalability of the overall application. Example code: var result = await Hacker.DefendAsync("/Account/LogOn", Request.UserHostAddress); if (result == Hacker.Result.TooManyHitsFromOrigin) await Hacker.BlacklistOriginAsync(Request.UserHostAddress, TimeSpan.FromMinutes(10)); else if (result == Hacker.Result.TooManyHitsOnKey) await Hacker.BlacklistKeyAsync("/Account/LogOn", TimeSpan.FromMinutes(10)); . . . Hacker.DefendAsync("/Account/PasswordReset", Request.UserHostAddress, TimeSpan.FromMinutes(5), 100); Hacker.DefendAsync("Username" + username, Request.UserHostAddress); Hacker.DefendAsync("Comment", Request.UserHostAddress); |
|
Redis2Go.Alpha
Easily spin up Redis instances for integration tests |
|
Microsoft.Web.RedisOutputCacheProvider.Functional.Tests
Description |
|
Microsoft.Web.RedisSessionStateProvider.Functional.Tests
Description |
GitHub repositories (4)
Showing the top 4 popular GitHub repositories that depend on Redis-64:
Repository | Stars |
---|---|
samcook/RedLock.net
An implementation of the Redlock algorithm in C#
|
|
VahidN/EFSecondLevelCache.Core
Entity Framework Core Second Level Caching Library
|
|
postsharp/PostSharp.Samples
PostSharp Samples
|
|
oazabir/HackerSpray
Repel hackers with this library by blocking brute force and malicious attempts on sensitive URLs
|
Version | Downloads | Last updated | |
---|---|---|---|
3.0.503 | 1,327,509 | 6/28/2016 | |
3.0.501 | 83,348 | 1/25/2016 | |
3.0.500 | 10,651 | 12/8/2015 | |
2.8.2402 | 4,790 | 6/28/2016 | |
2.8.2400 | 4,448 | 1/25/2016 | |
2.8.2104 | 29,788 | 11/23/2015 | |
2.8.2101 | 24,170 | 7/29/2015 | |
2.8.21 | 23,857 | 7/1/2015 | |
2.8.19 | 61,443 | 3/3/2015 | |
2.8.17 | 101,762 | 10/14/2014 | |
2.8.12 | 6,154 | 8/29/2014 | |
2.8.9 | 37,738 | 6/25/2014 | |
2.8.4 | 13,559 | 3/24/2014 | |
2.6.14 | 4,579 | 3/24/2014 | |
2.6.12.1 | 8,623 | 5/7/2013 | |
2.6.8.2 | 5,009 | 5/6/2013 |
The release notes are available here: https://raw.githubusercontent.com/MSOpenTech/redis/3.0/Redis%20on%20Windows%20Release%20Notes.md