Redis-64 3.0.503

Suggested Alternatives

MemuraiDeveloper

Additional Details

The MS Open Tech Redis on Windows was frozen at version 3.x when it was archived few years ago. Since that time there were a few new major releases of Redis on Linux. Reading the release notes for Redis 4.x and Redis 5.x, one can see that there are several security vulnerabilities that were fixed since.

The current package might pose risk to systems and it is better to retire it. As an alternative to the old package we recommend using Memurai which is on par with Redis 5.x and has the known security vulnerabilities addressed.

Install-Package Redis-64 -Version 3.0.503
dotnet add package Redis-64 --version 3.0.503
<PackageReference Include="Redis-64" Version="3.0.503" />
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add Redis-64 --version 3.0.503
The NuGet Team does not provide support for this client. Please contact its maintainers for support.
#r "nuget: Redis-64, 3.0.503"
#r directive can be used in F# Interactive, C# scripting and .NET Interactive. Copy this into the interactive tool or source code of the script to reference the package.
// Install Redis-64 as a Cake Addin
#addin nuget:?package=Redis-64&version=3.0.503

// Install Redis-64 as a Cake Tool
#tool nuget:?package=Redis-64&version=3.0.503
The NuGet Team does not provide support for this client. Please contact its maintainers for support.

This project is no longer being actively maintained. If you are looking for a Windows version of Redis, you may want to check out Memurai. Please note that Microsoft is not officially endorsing this product in any way.

This package has no dependencies.

NuGet packages (4)

Showing the top 4 NuGet packages that depend on Redis-64:

Package Downloads
HackerSpray

A .NET 4 library to defend websites and web APIs against brute force and Denial-of-service attacks. .NET Core version also available. Features: * Protect login, registration, password reset pages against brute force and DOS attacks. * Block users from performing any action too many times. * Prevent too many hits from any IP or IP Range. * Blacklist/Whitelist specific IP, IP range, username, URLs, transactions for a period. An example scenario is a Bank Login page, where brute force password attempts on user accounts and DOS attack on Login page are a regular event. Using this library, you can protect login page from brute force attacks, blocking too many usernames from certain IPs, or too many hits from a range of IP trying to do DOS attack, or even simple 3 invalid login attempts per username, per 15 mins. This high performance, very lightweight library protects you from hitting the database too many times on pages and APIs that are prone to attacks, thus lowering web server and database CPU, increasing the scalability of the overall application. Example code: var result = await Hacker.DefendAsync("/Account/LogOn", Request.UserHostAddress); if (result == Hacker.Result.TooManyHitsFromOrigin) await Hacker.BlacklistOriginAsync(Request.UserHostAddress, TimeSpan.FromMinutes(10)); else if (result == Hacker.Result.TooManyHitsOnKey) await Hacker.BlacklistKeyAsync("/Account/LogOn", TimeSpan.FromMinutes(10)); . . . Hacker.DefendAsync("/Account/PasswordReset", Request.UserHostAddress, TimeSpan.FromMinutes(5), 100); Hacker.DefendAsync("Username" + username, Request.UserHostAddress); Hacker.DefendAsync("Comment", Request.UserHostAddress);

Redis2Go.Alpha

Easily spin up Redis instances for integration tests

Microsoft.Web.RedisSessionStateProvider.Functional.Tests

Description

Microsoft.Web.RedisOutputCacheProvider.Functional.Tests

Description

GitHub repositories (4)

Showing the top 4 popular GitHub repositories that depend on Redis-64:

Repository Stars
samcook/RedLock.net
An implementation of the Redlock algorithm in C#
VahidN/EFSecondLevelCache.Core
Entity Framework Core Second Level Caching Library
Azure/aspnet-redis-providers
ASP.NET Redis Providers
oazabir/HackerSpray
Repel hackers with this library by blocking brute force and malicious attempts on sensitive URLs
Version Downloads Last updated
3.0.503 535,151 6/28/2016
3.0.501 63,257 1/25/2016
3.0.500 6,604 12/8/2015
2.8.2402 1,201 6/28/2016
2.8.2400 994 1/25/2016
2.8.2104 25,632 11/23/2015
2.8.2101 11,873 7/29/2015
2.8.21 7,237 7/1/2015
2.8.19 36,341 3/3/2015
2.8.17 46,619 10/14/2014
2.8.12 2,651 8/29/2014
2.8.9 28,795 6/25/2014
2.8.4 5,464 3/24/2014
2.6.14 941 3/24/2014
2.6.12.1 4,784 5/7/2013
2.6.8.2 1,015 5/6/2013