mirror of
https://git.freebsd.org/ports.git
synced 2025-07-18 17:59:20 -04:00
- Fix trailing whitespace in pkg-descrs, categories [p-x]*
Approved by: portmgr blanket
This commit is contained in:
parent
4e942b6419
commit
1f8b48b772
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=415500
853 changed files with 2183 additions and 2183 deletions
|
@ -1,5 +1,5 @@
|
|||
J-Pilot is a desktop organizer application for PalmOS devices. It is meant to
|
||||
be an alternative to the Palm Desktop for those who run the most popular
|
||||
Operating Systems in the World, Linux and Unix.
|
||||
Operating Systems in the World, Linux and Unix.
|
||||
|
||||
WWW: http://jpilot.org/
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Package contains plenty of funny Polish fortunes.
|
||||
Package contains plenty of funny Polish fortunes.
|
||||
Collected from many sources, versatile and facetious.
|
||||
|
||||
Based on PLD fortunes.
|
||||
|
|
|
@ -2,7 +2,7 @@ Gnugadu2 is a modular instant messenger written with GTK+ targeted
|
|||
mainly at Polish users of propietary Gadu-Gadu network.
|
||||
|
||||
GnuGadu2 sports a plugin extensible architecture. Beside Gadu-Gadu
|
||||
it also supports Jabber, Tlen.pl, sending smses to Polish mobile
|
||||
it also supports Jabber, Tlen.pl, sending smses to Polish mobile
|
||||
phones, spell checking, works with several sound servers.
|
||||
|
||||
WWW: http://www.gnugadu.org
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
A command-line script to check the availability of a ports distfiles. This
|
||||
A command-line script to check the availability of a ports distfiles. This
|
||||
script can take advantage of perl threads if available.
|
||||
|
||||
WWW: http://people.freebsd.org/~ehaupt/distilator/
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
CLI utilities and wrappers for FreeBSD's bugzilla instance with emphasis on
|
||||
CLI utilities and wrappers for FreeBSD's bugzilla instance with emphasis on
|
||||
ports. Provides a consistent API which can have pluggable backends.
|
||||
|
||||
# Supported Commands
|
||||
|
|
|
@ -2,7 +2,7 @@ This script runs though the complete ports tree without stopping after a make
|
|||
error occurred.
|
||||
If you call make with any parameter in one of the directories of the ports tree
|
||||
in FreeBSD the run will stop if make returns with a code bigger than zero. That
|
||||
means, that it is (in opposite to NetBSD or OpenBSD impossible to run a echo
|
||||
means, that it is (in opposite to NetBSD or OpenBSD impossible to run a echo
|
||||
complete build with \"make\" in FreeBSD.
|
||||
|
||||
Warning: The run of the script may last days (but you may stop it any time).
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Make a pkg-plist for a FreeBSD port. Try to be as "automatic" as possible.
|
||||
Make a pkg-plist for a FreeBSD port. Try to be as "automatic" as possible.
|
||||
|
||||
That's all it does ;-)
|
||||
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
pkg_rmleaves finds packages that are not required (depended on) by any
|
||||
pkg_rmleaves finds packages that are not required (depended on) by any
|
||||
other installed package and lets you decide (in a beautiful dialog interface)
|
||||
for each one if you want to keep it or deinstall it.
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
This program provides for an alternate pkg upgrade procedure.
|
||||
This program provides for an alternate pkg upgrade procedure.
|
||||
|
||||
Move /usr/local to /usr/old-local and /var/db/pkg to /var/db/old-pkg,
|
||||
then use pkg-compare to generate a list of packages to install.
|
||||
|
|
|
@ -4,7 +4,7 @@ For a given port determine its dependencies using any combination of the
|
|||
- PATCH_DEPENDS
|
||||
- LIB_DEPENDS
|
||||
- BUILD_DEPENDS
|
||||
- RUN_DEPENDS
|
||||
- RUN_DEPENDS
|
||||
|
||||
and show them as a pseudo graphical tree.
|
||||
Use back references for cross-connections.
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
A utility for printing text files (or stdin) through a terminal/terminal
|
||||
A utility for printing text files (or stdin) through a terminal/terminal
|
||||
emulator using ANSI escape sequences.
|
||||
|
||||
WWW: http://ansiprint.sourceforge.net
|
||||
|
|
|
@ -1,2 +1,2 @@
|
|||
A simple browser to allow a user to print. It uses Athena widgets.
|
||||
A simple browser to allow a user to print. It uses Athena widgets.
|
||||
The filter doesn't apply correctly however.
|
||||
|
|
|
@ -1,13 +1,13 @@
|
|||
|
||||
BIBVIEW
|
||||
BIBVIEW
|
||||
(graphical interface for BibTeX program)
|
||||
by Holger Martin, Peter Urban, Armin Liebl
|
||||
by Holger Martin, Peter Urban, Armin Liebl
|
||||
liebla@informatik.tu-muenchen.de
|
||||
|
||||
The program "bibview" is a graphical interface for manipulating
|
||||
BibTeX databases. It supports the user in making new entries,
|
||||
searching for entries and moving entries from one BiB to another.
|
||||
It is possible to work with more than one BiB simultaneously.
|
||||
It is possible to work with more than one BiB simultaneously.
|
||||
bibview is implemented with Xt and Athena Widgets.
|
||||
There are six types of windows in bibview:
|
||||
The main window contains menus for customizing bibview and
|
||||
|
@ -16,7 +16,7 @@
|
|||
for manipulating the BiB.
|
||||
The list window (at most one for every open BiB) shows a list of
|
||||
entries. It displays the fields author, title, type and year.
|
||||
The card window (at most one for every entry) helps editing an entry.
|
||||
The card window (at most one for every entry) helps editing an entry.
|
||||
It contains boxes for each field of the entry (according to the type).
|
||||
The fields can be edited by putting the mouse cursor into the field.
|
||||
Macros in fields and the symbol for concatenation ('#') are marked
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
EasyLatex is a preprocessor which takes an input file in "pseudo-latex",
|
||||
and transforms it into proper LaTeX syntax.
|
||||
and transforms it into proper LaTeX syntax.
|
||||
|
||||
WWW: http://easylatex.sourceforge.net/
|
||||
|
|
|
@ -1,15 +1,15 @@
|
|||
FontForge (formerly called PfaEdit) is a PostScript font editor which can
|
||||
create and modify outline fonts in Type 1, CID-Keyed, TrueType, OpenType
|
||||
FontForge (formerly called PfaEdit) is a PostScript font editor which can
|
||||
create and modify outline fonts in Type 1, CID-Keyed, TrueType, OpenType
|
||||
format. It can generate bitmaps and save in BDF format or embedded bitmaps
|
||||
in TrueType/OpenType fonts.
|
||||
in TrueType/OpenType fonts.
|
||||
|
||||
It can generate Type3 and SVG fonts if built with multilayer feature.
|
||||
If you feel the shortage of memory, rebuilding multilayer-disabled
|
||||
FontForge with FONTFORGE_NO_MULTILAYER defined will save some memory.
|
||||
|
||||
If you have installed AutoTrace or Potrace, you can generate outlines
|
||||
from imported bitmap images.
|
||||
from imported bitmap images.
|
||||
|
||||
For more information, see
|
||||
For more information, see
|
||||
|
||||
WWW: http://fontforge.sourceforge.net/
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Foomatic data for HP's HPIJS (http://hpinkjet.sourceforge.net)
|
||||
printer drivers.
|
||||
printer drivers.
|
||||
|
||||
WWW: http://www.linuxprinting.org
|
||||
|
|
|
@ -7,8 +7,8 @@ free use, and free copying and redistribution under certain conditions
|
|||
(including, in some cases, commercial distribution).
|
||||
|
||||
This port includes add-on packages (not part of the official gs release)
|
||||
o HP8XX driver for HP DeskJet 880C/882C/895C
|
||||
- http://www.gelhaus.net/hp880c/
|
||||
o HP8XX driver for HP DeskJet 880C/882C/895C
|
||||
- http://www.gelhaus.net/hp880c/
|
||||
o PCL3 driver for HP DeskJet series
|
||||
- http://home.vrweb.de/martin.lottermoser/pcl3.html
|
||||
o DJ970 driver for HP DeskJet 970CXi
|
||||
|
|
|
@ -7,8 +7,8 @@ free use, and free copying and redistribution under certain conditions
|
|||
(including, in some cases, commercial distribution).
|
||||
|
||||
This port includes add-on packages (not part of the official gs release)
|
||||
o HP8XX driver for HP DeskJet 880C/882C/895C
|
||||
- http://www.gelhaus.net/hp880c/
|
||||
o HP8XX driver for HP DeskJet 880C/882C/895C
|
||||
- http://www.gelhaus.net/hp880c/
|
||||
o PCL3 driver for HP DeskJet series
|
||||
- http://home.vrweb.de/martin.lottermoser/pcl3.html
|
||||
o DJ970 driver for HP DeskJet 970CXi
|
||||
|
|
|
@ -7,8 +7,8 @@ free use, and free copying and redistribution under certain conditions
|
|||
(including, in some cases, commercial distribution).
|
||||
|
||||
This port includes add-on packages (not part of the official gs release)
|
||||
o HP8XX driver for HP DeskJet 880C/882C/895C
|
||||
- http://www.gelhaus.net/hp880c/
|
||||
o HP8XX driver for HP DeskJet 880C/882C/895C
|
||||
- http://www.gelhaus.net/hp880c/
|
||||
o PCL3 driver for HP DeskJet series
|
||||
- http://home.vrweb.de/martin.lottermoser/pcl3.html
|
||||
o DJ970 driver for HP DeskJet 970CXi
|
||||
|
|
|
@ -7,8 +7,8 @@ free use, and free copying and redistribution under certain conditions
|
|||
(including, in some cases, commercial distribution).
|
||||
|
||||
This port includes add-on packages (not part of the official gs release)
|
||||
o HP8XX driver for HP DeskJet 880C/882C/895C
|
||||
- http://www.gelhaus.net/hp880c/
|
||||
o HP8XX driver for HP DeskJet 880C/882C/895C
|
||||
- http://www.gelhaus.net/hp880c/
|
||||
o PCL3 driver for HP DeskJet series
|
||||
- http://home.vrweb.de/martin.lottermoser/pcl3.html
|
||||
o DJ970 driver for HP DeskJet 970CXi
|
||||
|
|
|
@ -8,12 +8,12 @@
|
|||
recursively following links.
|
||||
- A table of contents can be generated, either from the links in a document,
|
||||
or automatically from document headings.
|
||||
- Configurable page headers/footers, that for example can contain
|
||||
document title, URL, page number, current heading, and date.
|
||||
- When converting the PostScript document to PDF - using some other
|
||||
- Configurable page headers/footers, that for example can contain
|
||||
document title, URL, page number, current heading, and date.
|
||||
- When converting the PostScript document to PDF - using some other
|
||||
program such as version 5.0 or later of Aladdin Ghostscript, or
|
||||
Adobe Acrobat Distiller - the original hyperlinks in the HTML
|
||||
documents will be retained in the PDF document.
|
||||
- Automatic hyphenation and text justification can be selected.
|
||||
Adobe Acrobat Distiller - the original hyperlinks in the HTML
|
||||
documents will be retained in the PDF document.
|
||||
- Automatic hyphenation and text justification can be selected.
|
||||
|
||||
WWW: http://www.tdb.uu.se/~jan/html2ps.html
|
||||
|
|
|
@ -9,7 +9,7 @@ Some of its features:
|
|||
o Search and fetch references from Medline/PubMed and CiteSeer
|
||||
o Search, classify and sort entries in your BibTeX files
|
||||
o import and export of references in various formats
|
||||
o launch external viewers and insert citations into LyX and Kile
|
||||
o launch external viewers and insert citations into LyX and Kile
|
||||
o automatically generate BibTeX keys
|
||||
o customize (add your own) BibTeX fields
|
||||
|
||||
|
|
|
@ -8,9 +8,9 @@ It contains the following programs:
|
|||
textps simple text to PostScript filter
|
||||
psrev PostScript page reversal filter
|
||||
psof banner filter
|
||||
|
||||
|
||||
Some features are:
|
||||
|
||||
|
||||
* Deals intelligently with output generated by the printer: printer
|
||||
errors (such as ``out of paper'') are logged using syslog.
|
||||
* Updates status file (displayed by lpq) with printer's current status.
|
||||
|
|
|
@ -1,13 +1,13 @@
|
|||
MagicFilter
|
||||
|
||||
magicfilter is an extensible and customizable automatic printer filter.
|
||||
It selects an appropriate conversion technique for the input data by
|
||||
seeking for magic numbers, and then utilizing the appropriate conversion
|
||||
magicfilter is an extensible and customizable automatic printer filter.
|
||||
It selects an appropriate conversion technique for the input data by
|
||||
seeking for magic numbers, and then utilizing the appropriate conversion
|
||||
utility.
|
||||
|
||||
magicfilter is primarily intended for use as the `input filter' by the
|
||||
lpd print spooler. The options accepted by magicfilter are exactly the
|
||||
ones passed to the input filter by lpd (unless you build it on a LPRng
|
||||
system -- in that case, magicfilter accepts no options.)
|
||||
magicfilter is primarily intended for use as the `input filter' by the
|
||||
lpd print spooler. The options accepted by magicfilter are exactly the
|
||||
ones passed to the input filter by lpd (unless you build it on a LPRng
|
||||
system -- in that case, magicfilter accepts no options.)
|
||||
|
||||
WWW: http://www.pell.portland.or.us/~orc/Code/magicfilter/
|
||||
|
|
|
@ -12,7 +12,7 @@ The main features of nenscript are:
|
|||
|
||||
Features additional to nenscript are:
|
||||
. automatic wrapping of long lines
|
||||
. availability under MSDOS
|
||||
. availability under MSDOS
|
||||
. executable is self contained - no additional files required
|
||||
|
||||
WWW: http://www.ai.mit.edu/projects/im/magnus/nenscript/
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
p910nd is a small printer daemon intended for diskless workstations that does
|
||||
p910nd is a small printer daemon intended for diskless workstations that does
|
||||
not spool to disk but passes the job directly to the printer.
|
||||
|
||||
WWW: http://p910nd.sourceforge.net/
|
||||
|
|
|
@ -4,6 +4,6 @@ documents.
|
|||
PDF Cube is an OpenGL API-based 3D PDF viewer that adds a compiz/Keynote-like
|
||||
spinning cube trasition effect to your PDF presentations (including
|
||||
LaTeX-Beamer and Prosper). You can also zoom on 5 predefined areas of any
|
||||
presentation page with a smooth zooming effect.
|
||||
presentation page with a smooth zooming effect.
|
||||
|
||||
WWW: http://code.100allora.it/pdfcube
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
This is English PK fonts package.
|
||||
This is English PK fonts package.
|
||||
|
||||
This package can install 118, 240, 300(default) or 400 dpi fonts.
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
pkipplib is a Python library which can prepare IPP requests with the
|
||||
help of a somewhat high level API. These requests can then be sent to
|
||||
an IPP printer or print server (e.g. CUPS). This library can also parse
|
||||
IPP answers received, and create high level Python objects from them.
|
||||
IPP answers received, and create high level Python objects from them.
|
||||
|
||||
WWW: http://www.pykota.com/software/pkipplib/
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
Tiny RML2PDF is a component of the Open Report project. It can be used with the
|
||||
Tiny Reporting Server to have a complete solution to render PDF file on the
|
||||
fly.
|
||||
fly.
|
||||
|
||||
WWW: http://tiny.be
|
||||
|
|
|
@ -10,7 +10,7 @@ It supports several PDF features, such as among others:
|
|||
* page geometries
|
||||
|
||||
It is used internally by Prawn (provided in the rubygems-prawn package),
|
||||
a Ruby PDF generation library.
|
||||
a Ruby PDF generation library.
|
||||
|
||||
WWW: http://prawnpdf.org/
|
||||
WWW: https://github.com/prawnpdf/pdf-core
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
An extension to Prawn that provides flexible table support, that means be able
|
||||
to create tables with rowspan and colspan attributes for each cell
|
||||
to create tables with rowspan and colspan attributes for each cell
|
||||
|
||||
WWW: https://github.com/blaxter/prawn-flexible-table
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
Prawn::Graph aims to add this functionality to Prawn by using the
|
||||
native PDF drawing tools Prawn exposes and a friendly single-method
|
||||
Prawn::Graph aims to add this functionality to Prawn by using the
|
||||
native PDF drawing tools Prawn exposes and a friendly single-method
|
||||
call to draw the graph.
|
||||
|
||||
The graphs and the values plotted and drawn are all relatively sized
|
||||
within the bounds of the width and height you have set and should
|
||||
within the bounds of the width and height you have set and should
|
||||
scale pretty well to any size of value. Of course, if things do end
|
||||
up looking too squashed, you can always just make your graph bigger.
|
||||
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
An SVG renderer for the Prawn PDF library. This will take an SVG file as
|
||||
input and render it into your PDF. prawn-svg is in its infancy and does not
|
||||
support the full SVG specifications.
|
||||
An SVG renderer for the Prawn PDF library. This will take an SVG file as
|
||||
input and render it into your PDF. prawn-svg is in its infancy and does not
|
||||
support the full SVG specifications.
|
||||
|
||||
WWW: https://github.com/mogest/prawn-svg
|
||||
|
|
|
@ -4,6 +4,6 @@ goal of this project is to support multi-byte character encodings and large
|
|||
character sets for East Asian languages by CID-keyed font technology. The
|
||||
secondary goal is to support as many features as pdfTeX developed by Han The
|
||||
Thanh. This project is a combined work of the dvipdfm-jpn project by
|
||||
Shunsaku Hirata and its modified one, dvipdfm-kor, by Jin-Hwan Cho.
|
||||
Shunsaku Hirata and its modified one, dvipdfm-kor, by Jin-Hwan Cho.
|
||||
|
||||
WWW: http://project.ktug.or.kr/dvipdfmx/
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
TransFig is a set of tools for creating TeX documents with graphics
|
||||
which are portable, in the sense that they can be printed in a wide
|
||||
variety of environments.
|
||||
variety of environments.
|
||||
|
||||
Drivers currently exist for the following graphics langauges:
|
||||
AutoCad slide, BOX, (E)EPIC macros, LaTeX picture environment,
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Russian version of the artwiz fonts.
|
||||
Russian version of the artwiz fonts.
|
||||
|
||||
Supported encodings: ISO10646-1, KOI8-R and CP1251
|
||||
|
||||
|
|
|
@ -1,3 +1,3 @@
|
|||
Russian localization for Bugzilla bug tracking system.
|
||||
Russian localization for Bugzilla bug tracking system.
|
||||
|
||||
WWW: http://sourceforge.net/projects/bugzilla-ru/
|
||||
|
|
|
@ -6,7 +6,7 @@ russian part of Unicode and UTF-8. This module can be especially
|
|||
useful for computers with broken cyrillic locales (like foreign
|
||||
web hosts).
|
||||
|
||||
This module does not use locale or unicode and is written in pure Perl,
|
||||
This module does not use locale or unicode and is written in pure Perl,
|
||||
so it will probably work at any computer.
|
||||
|
||||
WWW: http://search.cpan.org/dist/Lingua-RU-Charset/
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
2d-rewriter is a cellular automata simulator.
|
||||
2d-rewriter is a cellular automata simulator.
|
||||
|
||||
Key features
|
||||
|
||||
|
@ -8,7 +8,7 @@ Ability to emulate Conway's "Life Game" via proper rules specification.
|
|||
|
||||
Ability to demonstrate self replicating loops.
|
||||
|
||||
Patterns are tried in 4 orientations.
|
||||
Patterns are tried in 4 orientations.
|
||||
|
||||
Cell directions are defined against the pattern orientation.
|
||||
|
||||
|
|
|
@ -6,6 +6,6 @@ library, and the Concurrent library.
|
|||
The Colt library provides fundamental general-purpose data structures optimized
|
||||
for numerical data, such as resizable arrays, dense and sparse matrices
|
||||
(multi-dimensional arrays), linear algebra, associative containers and buffer
|
||||
management.
|
||||
management.
|
||||
|
||||
WWW: http://acs.lbl.gov/~hoschek/colt/
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
CRF++ is a simple, customizable, and open source
|
||||
implementation of Conditional Random Fields (CRFs)
|
||||
for segmenting/labeling sequential data. CRF++ is
|
||||
designed for generic purpose and will be applied to
|
||||
a variety of NLP tasks, such as Named Entity Recognition,
|
||||
CRF++ is a simple, customizable, and open source
|
||||
implementation of Conditional Random Fields (CRFs)
|
||||
for segmenting/labeling sequential data. CRF++ is
|
||||
designed for generic purpose and will be applied to
|
||||
a variety of NLP tasks, such as Named Entity Recognition,
|
||||
Information Extraction and Text Chunking.
|
||||
|
||||
WWW: http://chasen.org/~taku/software/CRF++/
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Ghemical is a computational chemistry software package,
|
||||
Ghemical is a computational chemistry software package,
|
||||
|
||||
Ghemical relies on external code to provide the quantum-mechanical
|
||||
calculations. Semi-empirical methods MNDO, MINDO/3, AM1 and PM3 come
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
The General Hidden Markov Model Library (GHMM) is a C library
|
||||
with additional Python bindings implementing a wide range of
|
||||
types of Hidden Markov Models and algorithms:
|
||||
discrete, continous emissions, basic training,
|
||||
The General Hidden Markov Model Library (GHMM) is a C library
|
||||
with additional Python bindings implementing a wide range of
|
||||
types of Hidden Markov Models and algorithms:
|
||||
discrete, continous emissions, basic training,
|
||||
HMM clustering, HMM mixtures.
|
||||
|
||||
WWW: http://ghmm.sourceforge.net/
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
A program for doing calculation on Smith Chart, similar in functionality to
|
||||
xsmc but with a simpler user interface; written with GNU/GTK library and
|
||||
released under GNU/GPL. Written by Lapo Pieri IK5NAX
|
||||
released under GNU/GPL. Written by Lapo Pieri IK5NAX
|
||||
|
||||
WWW: http://www.qsl.net/ik5nax
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
h5utils is a set of utilities for visualization and conversion of
|
||||
h5utils is a set of utilities for visualization and conversion of
|
||||
scientific data in the free, portable HDF5 format.
|
||||
|
||||
Besides providing a simple tool for batch visualization as PNG images,
|
||||
h5utils also includes programs to convert HDF5 datasets into the formats
|
||||
required by other free visualization software (e.g. plain text, Vis5d,
|
||||
Besides providing a simple tool for batch visualization as PNG images,
|
||||
h5utils also includes programs to convert HDF5 datasets into the formats
|
||||
required by other free visualization software (e.g. plain text, Vis5d,
|
||||
and VTK).
|
||||
|
||||
WWW: http://ab-initio.mit.edu/wiki/index.php/H5utils
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
Harminv is a free program (and accompanying library) to solve the problem
|
||||
of harmonic inversion - given a discrete-time, finite-length signal
|
||||
that consists of a sum of finitely-many sinusoids (possibly exponentially
|
||||
decaying) in a given bandwidth, it determines the frequencies, decay
|
||||
constants, amplitudes, and phases of those sinusoids.
|
||||
that consists of a sum of finitely-many sinusoids (possibly exponentially
|
||||
decaying) in a given bandwidth, it determines the frequencies, decay
|
||||
constants, amplitudes, and phases of those sinusoids.
|
||||
|
||||
WWW: http://ab-initio.mit.edu/wiki/index.php/Harminv
|
||||
|
|
|
@ -3,6 +3,6 @@ prone to hits from tropical systems (currently only in the Tropical
|
|||
Atlantic). It's intended to display the NHC/TPC data and give you
|
||||
what you need to make decisions, etc.. It does NOT, nor will it ever,
|
||||
attempt to do any forecasting on its own---I leave that to the gurus
|
||||
at the NHC/TPC.
|
||||
at the NHC/TPC.
|
||||
|
||||
WWW: http://www.jstrack.org/jstrack/
|
||||
|
|
|
@ -3,7 +3,7 @@ features. It supports L2-regularized classifiers (L2-loss linear SVM,
|
|||
L1-loss linear SVM, and logistic regression), L1-regularized classifiers
|
||||
(L2-loss linear SVM and logistic regression).
|
||||
|
||||
Main features of LIBLINEAR include
|
||||
Main features of LIBLINEAR include
|
||||
|
||||
- Same data format as LIBSVM and similar usage
|
||||
- One-vs-the rest and Crammer & Singer multi-class classification
|
||||
|
|
|
@ -2,7 +2,7 @@ McStas - Monte Carlo ray tracing simulations of neutron experiments.
|
|||
|
||||
McStas is a tool for simulating neutron instrumentation and experiments
|
||||
using a ray-tracing formalism. Currently the main use of McStas is in the
|
||||
field of instrument design.
|
||||
field of instrument design.
|
||||
|
||||
This port contains the McStas component library.
|
||||
|
||||
|
|
|
@ -2,6 +2,6 @@ McStas - Monte Carlo ray tracing simulations of neutron experiments.
|
|||
|
||||
McStas is a tool for simulating neutron instrumentation and experiments
|
||||
using a ray-tracing formalism. Currently the main use of McStas is in the
|
||||
field of instrument design.
|
||||
field of instrument design.
|
||||
|
||||
WWW: http://www.mcstas.org
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
Meep (or MEEP) is a free finite-difference time-domain (FDTD) simulation
|
||||
software package developed at MIT to model electromagnetic systems,
|
||||
along with our MPB eigenmode package.
|
||||
Meep (or MEEP) is a free finite-difference time-domain (FDTD) simulation
|
||||
software package developed at MIT to model electromagnetic systems,
|
||||
along with our MPB eigenmode package.
|
||||
|
||||
WWW: http://ab-initio.mit.edu/wiki/index.php/Meep
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
MINC (Medical Imaging NetCDF) is a medical imaging data format and an
|
||||
MINC (Medical Imaging NetCDF) is a medical imaging data format and an
|
||||
associated set of tools and libraries.
|
||||
|
||||
WWW: http://www.bic.mni.mcgill.ca/ServicesSoftware/MINC
|
||||
WWW: http://www.bic.mni.mcgill.ca/ServicesSoftware/MINC
|
||||
|
|
|
@ -15,6 +15,6 @@ downloaded in the JSON file format. Furthermore, standard PNG images can
|
|||
be generated on-the-fly from the DICOM instances by Orthanc.
|
||||
|
||||
Orthanc lets its users focus on the content of the DICOM files, hiding
|
||||
the complexity of the DICOM format and of the DICOM protocol.
|
||||
the complexity of the DICOM format and of the DICOM protocol.
|
||||
|
||||
WWW: http://www.orthanc-server.com/
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
McStas perl tools to aid in running neutron ray tracing simulations.
|
||||
|
||||
McStas is a tool for simulating neutron instrumentation and experiments using
|
||||
McStas is a tool for simulating neutron instrumentation and experiments using
|
||||
a ray-tracing formalism. Currently the main use of McStas is in the field of
|
||||
instrumentation design.
|
||||
|
||||
|
|
|
@ -9,6 +9,6 @@ agglomerative clustering. Its features include
|
|||
The interface is very similar to MATLAB's Statistics
|
||||
Toolbox API to make code easier to port from MATLAB to
|
||||
Python/Numpy. The core implementation of this library
|
||||
is in C for efficiency.
|
||||
is in C for efficiency.
|
||||
|
||||
WWW: http://code.google.com/p/scipy-cluster/
|
||||
|
|
|
@ -7,5 +7,5 @@ PyBrain is short for Python-Based Reinforcement Learning,
|
|||
Artificial Intelligence and Neural Network Library. In fact,
|
||||
we came up with the name first and later reverse-engineerer
|
||||
this quite descriptive "Backronym".
|
||||
|
||||
|
||||
WWW: http://pybrain.org/
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
PyNN (pronounced 'pine') is a simulator-independent language for
|
||||
building neuronal network models.
|
||||
building neuronal network models.
|
||||
|
||||
WWW: http://neuralensemble.org/PyNN
|
||||
|
|
|
@ -2,6 +2,6 @@ QCL is a high level, architecture independent programming language for
|
|||
quantum computers, with a syntax derived from classical procedural
|
||||
languages like C or Pascal. This allows for the complete implementation
|
||||
and simulation of quantum algorithms (including classical components)
|
||||
in one consistent formalism.
|
||||
in one consistent formalism.
|
||||
|
||||
WWW: http://tph.tuwien.ac.at/~oemer/qcl.html
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
The sigrok project aims at creating a portable, cross-platform,
|
||||
Free/Libre/Open-Source signal analysis software suite that supports
|
||||
various device types, such as logic analyzers, MSOs, oscilloscopes,
|
||||
multimeters, LCR meters, sound level meters, thermometers,
|
||||
hygrometers, anemometers, light meters, DAQs, dataloggers,
|
||||
multimeters, LCR meters, sound level meters, thermometers,
|
||||
hygrometers, anemometers, light meters, DAQs, dataloggers,
|
||||
function generators, spectrum analyzers, power supplies,
|
||||
GPIB interfaces, and more.
|
||||
GPIB interfaces, and more.
|
||||
|
||||
sigrok-cli is a command-line tool written in C, which uses both libsigrok
|
||||
and libsigrokdecode to provide the basic sigrok functionality from the
|
||||
|
|
|
@ -4,6 +4,6 @@ output. SVG, EMF and bitmap formats export are also supported.
|
|||
The program runs under Unix/Linux, Windows or Mac OS X, and
|
||||
binaries are provided. Data can be read from text, CSV or FITS
|
||||
files, and data can be manipulated or examined from within the
|
||||
application.
|
||||
application.
|
||||
|
||||
WWW: http://home.gna.org/veusz/
|
||||
|
|
|
@ -1,21 +1,21 @@
|
|||
XMakemol is a program written for UN*X operating systems in ANSI C using the X,
|
||||
Xt and Motif libraries. It can be used to view and manipulate atomic and
|
||||
molecular data given in xyz format.
|
||||
Xt and Motif libraries. It can be used to view and manipulate atomic and
|
||||
molecular data given in xyz format.
|
||||
|
||||
XMakemol is a mouse-based application and many features can be accessed by
|
||||
clicking or dragging the mouse on the main window. Additional popup dialogs
|
||||
offer a number of additional features.
|
||||
XMakemol is a mouse-based application and many features can be accessed by
|
||||
clicking or dragging the mouse on the main window. Additional popup dialogs
|
||||
offer a number of additional features.
|
||||
|
||||
Here is what an XMakemol session might look like. The system is a bucky ball
|
||||
and the Measure dialog is showing the measurement of bond-lengths, angles and
|
||||
a torsion angle.
|
||||
Here is what an XMakemol session might look like. The system is a bucky ball
|
||||
and the Measure dialog is showing the measurement of bond-lengths, angles and
|
||||
a torsion angle.
|
||||
|
||||
XMakemol can produce output in PostScript (black and white or colour)and in xpm
|
||||
format (which can be translated to gif format using xpmtoppm and ppmtogif).
|
||||
format (which can be translated to gif format using xpmtoppm and ppmtogif).
|
||||
|
||||
XMakemol can also produce a series of xpm files which can be translated into an
|
||||
animated gif file using the bundled utility xmake_anim.pl (formerly
|
||||
gmake_anim.pl). The one above is an animation of the "viagra" molecule
|
||||
animated gif file using the bundled utility xmake_anim.pl (formerly
|
||||
gmake_anim.pl). The one above is an animation of the "viagra" molecule
|
||||
(sidenafil).
|
||||
|
||||
WWW: http://www.nongnu.org/xmakemol/
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
amavisd-new is a performance-enhanced daemonized version of amavis-perl
|
||||
amavisd-new is a performance-enhanced daemonized version of amavis-perl
|
||||
|
||||
Note that the installation is different than the original package, and the
|
||||
integration into your MTA can be different, so please read the README and
|
||||
INSTALL files very carefully.
|
||||
INSTALL files very carefully.
|
||||
|
||||
amavisd-new also supports SpamAssassin integration.
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
Apache XML Security for C++
|
||||
|
||||
The Apache XML Security for C++ library is an implementation of the XML
|
||||
Digital Signature and Encryption specifications, along with some
|
||||
The Apache XML Security for C++ library is an implementation of the XML
|
||||
Digital Signature and Encryption specifications, along with some
|
||||
additional XKMS code.
|
||||
|
||||
WWW: http://santuario.apache.org/cindex.html
|
||||
|
|
|
@ -1,11 +1,11 @@
|
|||
BASE is the Basic Analysis and Security Engine. It is based on the code
|
||||
from the ACID project. This application provides a PHP-based web front-end
|
||||
to query and analyze the alerts coming from a Snort IDS system.
|
||||
from the ACID project. This application provides a PHP-based web front-end
|
||||
to query and analyze the alerts coming from a Snort IDS system.
|
||||
|
||||
BASE is a web interface to perform analysis of intrusions that Snort has
|
||||
detected on your network. It uses a user authentication and role-base
|
||||
system, so that you as the security admin can decide what and how much
|
||||
information each user can see. It also has a simple to use, web-based
|
||||
setup program for people not comfortable with editing files directly.
|
||||
setup program for people not comfortable with editing files directly.
|
||||
|
||||
WWW: http://secureideas.sourceforge.net/
|
||||
|
|
|
@ -5,19 +5,19 @@ some other crypto libraries, BeeCrypt is not designed to solve one
|
|||
specific problem, like file encryption, but to be a general purpose
|
||||
toolkit which can be used in a variety of applications.
|
||||
|
||||
The BeeCrypt library currently includes:
|
||||
- Entropy sources for initializing pseudo-random generators
|
||||
- Pseudo-random generators: FIPS-186, Mersenne Twister
|
||||
- Block ciphers: Blowfish
|
||||
- Hash functions: MD5, SHA-1, SHA-256
|
||||
- Keyed hash functions: MD5/HMAC, SHA-1/HMAC, SHA-256/HMAC
|
||||
- Multi-precision integer library, with assembler-optimized routines
|
||||
The BeeCrypt library currently includes:
|
||||
- Entropy sources for initializing pseudo-random generators
|
||||
- Pseudo-random generators: FIPS-186, Mersenne Twister
|
||||
- Block ciphers: Blowfish
|
||||
- Hash functions: MD5, SHA-1, SHA-256
|
||||
- Keyed hash functions: MD5/HMAC, SHA-1/HMAC, SHA-256/HMAC
|
||||
- Multi-precision integer library, with assembler-optimized routines
|
||||
- Probabilistic primality testing, with optimized small prime trial
|
||||
division
|
||||
- Discrete logarithm parameter generation over a prime field
|
||||
- Diffie-Hellman key agreement
|
||||
- DHAES encryption scheme
|
||||
- ElGamal signature scheme (two variants)
|
||||
- Basic RSA primitives and key pair generation
|
||||
division
|
||||
- Discrete logarithm parameter generation over a prime field
|
||||
- Diffie-Hellman key agreement
|
||||
- DHAES encryption scheme
|
||||
- ElGamal signature scheme (two variants)
|
||||
- Basic RSA primitives and key pair generation
|
||||
|
||||
WWW: http://sourceforge.net/projects/beecrypt
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
BSDsfv is a flexible and highly compatible SFV checksum utility.
|
||||
BSDsfv is a flexible and highly compatible SFV checksum utility.
|
||||
|
||||
Features:
|
||||
|
||||
|
|
|
@ -3,6 +3,6 @@ and auditing SSL certificates in nearly real time. It makes it possible
|
|||
to detect SSL certificates that have been mistakenly issued by a certificate
|
||||
authority or maliciously acquired from an otherwise unimpeachable certificate
|
||||
authority. It also makes it possible to identify certificate authorities
|
||||
that have gone rogue and are maliciously issuing certificates.
|
||||
that have gone rogue and are maliciously issuing certificates.
|
||||
|
||||
WWW: https://www.certificate-transparency.org/
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
Checkpassword provides a simple, uniform password-checking interface
|
||||
to all root applications. It is suitable for use by applications such as
|
||||
login, ftpd, and pop3d.
|
||||
login, ftpd, and pop3d.
|
||||
|
||||
WWW: http://cr.yp.to/checkpwd.html
|
||||
|
|
|
@ -1,11 +1,11 @@
|
|||
Cisco-torch is a mass Cisco Vulnerability Scanner.
|
||||
|
||||
The main feature that makes Cisco-torch different from similar
|
||||
tools is the extensive use of forking to launch multiple scanning
|
||||
processes on the background for maximum scanning efficiency. Also,
|
||||
it uses several methods of application layer fingerprinting simultaneously,
|
||||
if needed. We wanted something fast to discover remote Cisco hosts running
|
||||
Telnet, SSH, Web, NTP and SNMP services and launch dictionary attacks
|
||||
The main feature that makes Cisco-torch different from similar
|
||||
tools is the extensive use of forking to launch multiple scanning
|
||||
processes on the background for maximum scanning efficiency. Also,
|
||||
it uses several methods of application layer fingerprinting simultaneously,
|
||||
if needed. We wanted something fast to discover remote Cisco hosts running
|
||||
Telnet, SSH, Web, NTP and SNMP services and launch dictionary attacks
|
||||
against the services discovered.
|
||||
|
||||
WWW: http://www.hackingciscoexposed.com/?link=tools
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
Small client to ask a clamav antivirus server
|
||||
if a file containt a virus. May be used with
|
||||
procmail or maildrop rules. Clamav library
|
||||
if a file containt a virus. May be used with
|
||||
procmail or maildrop rules. Clamav library
|
||||
is not required to be installed on the running
|
||||
host.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
ClamTk is a GUI front-end for ClamAV using gtk2-perl. It is designed to
|
||||
be an easy-to-use frontend for Unix systems.
|
||||
be an easy-to-use frontend for Unix systems.
|
||||
|
||||
WWW: http://clamtk.sourceforge.net/
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
cmd5checkpw is a checkpassword compatible authentication program that uses
|
||||
CRAM-MD5 authentication mode. It was designed primary to work with qmail
|
||||
but it can be used by any other program that knows how to use checkpassword
|
||||
compatible authentication.
|
||||
cmd5checkpw is a checkpassword compatible authentication program that uses
|
||||
CRAM-MD5 authentication mode. It was designed primary to work with qmail
|
||||
but it can be used by any other program that knows how to use checkpassword
|
||||
compatible authentication.
|
||||
|
||||
WWW: http://members.elysium.pl/brush/cmd5checkpw/
|
||||
|
|
|
@ -1,14 +1,14 @@
|
|||
cryptlib is a powerful security toolkit which allows even inexperienced
|
||||
crypto programmers to easily add encryption and authentication services to
|
||||
their software. The high-level interface provides anyone with the ability to
|
||||
add strong security capabilities to an application in as little as half an
|
||||
hour, without needing to know any of the low-level details which make the
|
||||
encryption or authentication work. Because of this, cryptlib dramatically
|
||||
cryptlib is a powerful security toolkit which allows even inexperienced
|
||||
crypto programmers to easily add encryption and authentication services to
|
||||
their software. The high-level interface provides anyone with the ability to
|
||||
add strong security capabilities to an application in as little as half an
|
||||
hour, without needing to know any of the low-level details which make the
|
||||
encryption or authentication work. Because of this, cryptlib dramatically
|
||||
reduces the cost involved in adding security to new or existing applications.
|
||||
|
||||
cryptlib provides a standardised interface to a number of popular encryption
|
||||
algorithms, as well as providing a high-level interface which hides most of
|
||||
the implementation details and provides an operating-system-independent
|
||||
algorithms, as well as providing a high-level interface which hides most of
|
||||
the implementation details and provides an operating-system-independent
|
||||
encoding method which makes it easy to transfer secured data from one operating
|
||||
environment to another.
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
Crypto++ Library is a free C++ class library of cryptographic schemes.
|
||||
One purpose of Crypto++ is to act as a repository of public domain (not
|
||||
copyrighted) source code. Although the library is copyrighted as a
|
||||
compilation, the individual files in it (except for a few exceptions listed
|
||||
in the license) are in the public domain.
|
||||
One purpose of Crypto++ is to act as a repository of public domain (not
|
||||
copyrighted) source code. Although the library is copyrighted as a
|
||||
compilation, the individual files in it (except for a few exceptions listed
|
||||
in the license) are in the public domain.
|
||||
|
||||
WWW: http://www.cryptopp.com/
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
saslauthd is a daemon process that handles plaintext authentication
|
||||
requests on behalf of the SASL library.
|
||||
|
||||
|
||||
The server fulfills two roles: it isolates all code requiring
|
||||
superuser privileges into a single process, and it can be used to
|
||||
provide proxy authentication services to clients that do not
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Cryptographic library to perform identification using Schnorr
|
||||
Cryptographic library to perform identification using Schnorr
|
||||
Identification scheme and Blind RSA Signatures.
|
||||
|
||||
WWW: https://github.com/divVerent/d0_blind_id
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
DenyHosts is a script intended to be run by *ix system administrators to
|
||||
DenyHosts is a script intended to be run by *ix system administrators to
|
||||
help thwart ssh server attacks.
|
||||
|
||||
If you've ever looked at your ssh log (/var/log/auth.log ) you may be alarmed
|
||||
to see how many hackers attempted to gain access to your server.
|
||||
If you've ever looked at your ssh log (/var/log/auth.log ) you may be alarmed
|
||||
to see how many hackers attempted to gain access to your server.
|
||||
Denyhosts helps you:
|
||||
- Parses /var/log/auth.log to find all login attempts
|
||||
- Can be run from the command line, cron or as a daemon (new in 0.9)
|
||||
|
@ -11,9 +11,9 @@ Denyhosts helps you:
|
|||
- Keeps track of each non-existent user (eg. sdada) when a login attempt failed.
|
||||
- Keeps track of each existing user (eg. root) when a login attempt failed.
|
||||
- Keeps track of each offending host (hosts can be purged )
|
||||
- Keeps track of suspicious logins
|
||||
- Keeps track of suspicious logins
|
||||
- Keeps track of the file offset, so that you can reparse the same file
|
||||
- When the log file is rotated, the script will detect it
|
||||
- When the log file is rotated, the script will detect it
|
||||
- Appends /etc/hosts.allow
|
||||
- Optionally sends an email of newly banned hosts and suspicious logins.
|
||||
- Resolves IP addresses to hostnames, if you want
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
The digest utility is a wrapper for the md5, sha1, sha256, sha384,
|
||||
sha512, rmd160, tiger and whirlpool message digest algorithms (also
|
||||
sha512, rmd160, tiger and whirlpool message digest algorithms (also
|
||||
known as hashes, checksums or "fingerprints").
|
||||
|
||||
WWW: http://cvsweb.NetBSD.org/bsdweb.cgi/pkgsrc/pkgtools/digest/
|
||||
|
|
|
@ -1,21 +1,21 @@
|
|||
Doscan is a tool to quickly scan your network for machines listening on a
|
||||
Doscan is a tool to quickly scan your network for machines listening on a
|
||||
TCP port, opening thousands of TCP connections in parallel.
|
||||
Features
|
||||
High scanning rate: five to ten minutes per 100,000 addresses (which
|
||||
High scanning rate: five to ten minutes per 100,000 addresses (which
|
||||
are sparsely populated with hosts), with rather conservative timeouts.
|
||||
Load distribution: doscan scans the addresses in a seemingly random
|
||||
order. If your scan host is connected to a central router, this ensures
|
||||
that the load is distributed across your network, and you are
|
||||
Load distribution: doscan scans the addresses in a seemingly random
|
||||
order. If your scan host is connected to a central router, this ensures
|
||||
that the load is distributed across your network, and you are
|
||||
stress-testing just a single router, and not your edge devices.
|
||||
Low memory consumption: memory usage is proportional to the number
|
||||
of hosts which have responded so far, and to the number of parallel
|
||||
connections. The total number of addresses does not influence memory usage
|
||||
Low memory consumption: memory usage is proportional to the number
|
||||
of hosts which have responded so far, and to the number of parallel
|
||||
connections. The total number of addresses does not influence memory usage
|
||||
in any way.
|
||||
Can collect responses: doscan optionally records data which is sent
|
||||
by the hosts which are being scanned. You can even specify a regular
|
||||
expression to extract part of a server banner, and a message to send to
|
||||
Can collect responses: doscan optionally records data which is sent
|
||||
by the hosts which are being scanned. You can even specify a regular
|
||||
expression to extract part of a server banner, and a message to send to
|
||||
trigger a response (great for determining HTTP server versions).
|
||||
Extensibility: It is possible to add special handlers for TCP-based
|
||||
Extensibility: It is possible to add special handlers for TCP-based
|
||||
protocols, using a straightforward interface.
|
||||
It supports scanning the vulnerable Microsoft DCOM implementation.
|
||||
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
Fake Identd is a tool that replies with a standard answer to all incoming
|
||||
identd requests on a host, making it nearly perfect for a masquerading
|
||||
Fake Identd is a tool that replies with a standard answer to all incoming
|
||||
identd requests on a host, making it nearly perfect for a masquerading
|
||||
router.
|
||||
|
||||
WWW: http://hangout.de/fakeidentd/index.html
|
||||
|
|
|
@ -1,12 +1,12 @@
|
|||
"Fragroute intercepts, modifies, and rewrites egress traffic destined
|
||||
for a specified host, implementing most of the attacks described in the
|
||||
Secure Networks "Insertion, Evasion, and Denial of Service: Eluding
|
||||
Network Intrusion Detection" paper of January 1998.
|
||||
Network Intrusion Detection" paper of January 1998.
|
||||
|
||||
It features a simple ruleset language to delay, duplicate, drop,
|
||||
fragment, overlap, print, reorder, segment, source-route, or otherwise
|
||||
monkey with all outbound packets destined for a target host, with
|
||||
minimal support for randomized or probabilistic behaviour.
|
||||
minimal support for randomized or probabilistic behaviour.
|
||||
|
||||
This tool was written in good faith to aid in the testing of network
|
||||
intrusion detection systems, firewalls, and basic TCP/IP stack
|
||||
|
|
|
@ -13,6 +13,6 @@ fswatch:
|
|||
|
||||
- is one of many similar utilities. the main difference is the configuration.
|
||||
you can define different settings for every directory in a directory tree.
|
||||
moreover, it is very small and fast.
|
||||
moreover, it is very small and fast.
|
||||
|
||||
WWW: http://fswatch.sourceforge.net
|
||||
|
|
|
@ -5,7 +5,7 @@ objects and services (hosts, routers, firewalls, networks, protocols).
|
|||
Firewall Builder helps user maintain database of objects and allows policy
|
||||
editing using simple drag-and-drop operations.
|
||||
|
||||
Preferences and objects databases are stored in XML format.
|
||||
Preferences and objects databases are stored in XML format.
|
||||
GUI and policy compilers are completely independent. Support for a new firewall
|
||||
platform can be added to GUI without any changes done to the program, although
|
||||
new policy compiler must be written. This provides for consistent abstract
|
||||
|
@ -13,6 +13,6 @@ model and the same GUI for different firewall platforms. Currently three most
|
|||
popular free firewalls are supported: ipchains, iptables and ipfilter.
|
||||
Because of this, Firewall Builder can be used to manage firewalls built on
|
||||
variety of platforms including, but not limited to, Linux running ipchains or
|
||||
iptables and FreeBSD or Solaris running ipfilter.
|
||||
iptables and FreeBSD or Solaris running ipfilter.
|
||||
|
||||
WWW: http://www.fwbuilder.org/
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
Gcr is a library for bits of crypto and security UI, parsing etc. It used
|
||||
Gcr is a library for bits of crypto and security UI, parsing etc. It used
|
||||
to be part of gnome-keyring. It also provides a viewer and importer for
|
||||
certificates and private keys.
|
||||
certificates and private keys.
|
||||
|
||||
WWW: https://live.gnome.org/GnomeKeyring
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Password Gorilla is cross-platform Password Manager. It is
|
||||
Password Gorilla is cross-platform Password Manager. It is
|
||||
compatible with "Password Safe" from Windows.
|
||||
It uses TCL/Tk and runs on most platforms supported by Tcl/Tk.
|
||||
|
||||
|
|
|
@ -11,7 +11,7 @@ Features:
|
|||
* Quick-search facility.
|
||||
* Username and password may easily be copied to the clipboard.
|
||||
* Encryption is done using the OpenSSL cryptographics library.
|
||||
* The built-in password generator helps you generate secure passwords.
|
||||
* The built-in password generator helps you generate secure passwords.
|
||||
* You can launch a website and the associated username/passwords
|
||||
direct from GPass
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
gpgdir is a perl script that uses the CPAN GnuPG::Interface module
|
||||
to encrypt and decrypt directories using a gpg key specified in ~/.gpgdirrc.
|
||||
gpgdir is a perl script that uses the CPAN GnuPG::Interface module
|
||||
to encrypt and decrypt directories using a gpg key specified in ~/.gpgdirrc.
|
||||
|
||||
WWW: http://www.cipherdyne.org/gpgdir/
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
GSFV is a graphical interface written in GTK+ for manipulating .sfv
|
||||
(Simple File Verification) files.
|
||||
GSFV is a graphical interface written in GTK+ for manipulating .sfv
|
||||
(Simple File Verification) files.
|
||||
|
||||
The Simple File Verification (SFV) system is a file integrity verification
|
||||
system which is popular on some platforms. A software package may be
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Hackbot is a host exploration tool and bannergrabber. It scans numerous
|
||||
Hackbot is a host exploration tool and bannergrabber. It scans numerous
|
||||
services and vulnerabilities.
|
||||
|
||||
WWW: http://hackbot.stream-portal.org/
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
Honggfuzz is a general-purpose fuzzing tool. Given a starting corpus of test
|
||||
files, Hongfuzz supplies and modifies input to a test program and utilize the
|
||||
ptrace() API/POSIX signal interface to detect and log crashes.
|
||||
ptrace() API/POSIX signal interface to detect and log crashes.
|
||||
|
||||
WWW: http://code.google.com/p/honggfuzz/
|
||||
|
|
|
@ -6,10 +6,10 @@ existing terminal window.
|
|||
* Also display and search of local (Avahi) SSH servers
|
||||
* Tabbed display with automatic session saving (Firefox style)
|
||||
* Status bar with information like latency to server and output of
|
||||
remote uptime
|
||||
remote uptime
|
||||
* Close integration with OpenSSH features like connection sharing
|
||||
(near-instant new tabs)
|
||||
* NetworkManager integration to easily reconnect after a network
|
||||
change, great for laptops
|
||||
change, great for laptops
|
||||
|
||||
WWW: http://projects.gnome.org/hotssh/
|
||||
|
|
|
@ -4,8 +4,8 @@ Hpenc is a fast encryption command line tool with the following features:
|
|||
detection.
|
||||
* Parallel processing - hpenc uses block IO and you can process multiple blocks
|
||||
simultaneously, which is extremely useful if you have multi-core environment.
|
||||
* Strong ciphers - hpenc uses the state-of-art aes-gcm and chacha20 ciphers
|
||||
* Easy interface
|
||||
* Strong ciphers - hpenc uses the state-of-art aes-gcm and chacha20 ciphers
|
||||
* Easy interface
|
||||
* Hardware acceleration - hpenc can utilize all its
|
||||
advanced cryptography functions defined for AES-NI and PCLMULQDQ instructions
|
||||
(that must be supported by openssl). For those with old or embedded CPU (such
|
||||
|
@ -14,6 +14,6 @@ as ARM), hpenc provides portable and fast chacha20 cipher.
|
|||
* Secure random numbers generator - hpenc can work as pseudo-random numbers
|
||||
generator. In a set of standard tests (diehard) on the generated sequences
|
||||
hpenc generates secure sequences of pseudo-random numbers on a very high
|
||||
speed (gigabytes per second).
|
||||
speed (gigabytes per second).
|
||||
|
||||
WWW: https://github.com/vstakhov/hpenc/
|
||||
|
|
|
@ -11,6 +11,6 @@ average person.
|
|||
No network can be "perfectly anonymous". The continued goal of I2P
|
||||
is to make attacks more and more difficult to mount. Its anonymity
|
||||
will get stronger as the size of the network increases and with
|
||||
ongoing academic review.
|
||||
ongoing academic review.
|
||||
|
||||
WWW: http://geti2p.net/
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
A command line idea encryption and decryption utility written by
|
||||
A command line idea encryption and decryption utility written by
|
||||
Dr. Richard De Moliner.
|
||||
|
||||
IDEA (International Data Encryption Algorithm) is a block cipher devel-
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
This perl script is an official DShield client who's purpose is to
|
||||
This perl script is an official DShield client who's purpose is to
|
||||
read your FreeBSD ipfilter firewall ipmon log file and convert the
|
||||
log records to the standard DShield reporting record format, and
|
||||
imbed the converted log records into the body of an email that gets
|
||||
sent to DShield for automatic addition to their database and abuse
|
||||
log records to the standard DShield reporting record format, and
|
||||
imbed the converted log records into the body of an email that gets
|
||||
sent to DShield for automatic addition to their database and abuse
|
||||
reporting to the offenders ISP if you are an subscribed DShield member.
|
||||
|
||||
Script contains user customable defaults which can be overridden with
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
-- ISNprober / Tom Vandepoel (Tom.Vandepoel@ubizen.com) --
|
||||
|
||||
ISNprober is a tool that samples TCP Initial Sequence Numbers or IP ID's
|
||||
and can use that information to determine if a set of IP addresses belong
|
||||
ISNprober is a tool that samples TCP Initial Sequence Numbers or IP ID's
|
||||
and can use that information to determine if a set of IP addresses belong
|
||||
to the same TCP/IP stack (machine) or not.
|
||||
|
|
|
@ -1,24 +1,24 @@
|
|||
Kerberos V5 is an authentication system developed at MIT.
|
||||
Kerberos V5 is an authentication system developed at MIT.
|
||||
WWW: http://web.mit.edu/kerberos/
|
||||
|
||||
Abridged from the User Guide:
|
||||
Under Kerberos, a client sends a request for a ticket to the
|
||||
Key Distribution Center (KDC). The KDC creates a ticket-granting
|
||||
ticket (TGT) for the client, encrypts it using the client's
|
||||
password as the key, and sends the encrypted TGT back to the
|
||||
Under Kerberos, a client sends a request for a ticket to the
|
||||
Key Distribution Center (KDC). The KDC creates a ticket-granting
|
||||
ticket (TGT) for the client, encrypts it using the client's
|
||||
password as the key, and sends the encrypted TGT back to the
|
||||
client. The client then attempts to decrypt the TGT, using
|
||||
its password. If the client successfully decrypts the TGT, it
|
||||
keeps the decrypted TGT, which indicates proof of the client's
|
||||
identity. The TGT permits the client to obtain additional tickets,
|
||||
its password. If the client successfully decrypts the TGT, it
|
||||
keeps the decrypted TGT, which indicates proof of the client's
|
||||
identity. The TGT permits the client to obtain additional tickets,
|
||||
which give permission for specific services.
|
||||
Since Kerberos negotiates authenticated, and optionally encrypted,
|
||||
Since Kerberos negotiates authenticated, and optionally encrypted,
|
||||
communications between two points anywhere on the internet, it
|
||||
provides a layer of security that is not dependent on which side of a
|
||||
firewall either client is on.
|
||||
The Kerberos V5 package is designed to be easy to use. Most of the
|
||||
The Kerberos V5 package is designed to be easy to use. Most of the
|
||||
commands are nearly identical to UNIX network programs you are already
|
||||
used to. Kerberos V5 is a single-sign-on system, which means that you
|
||||
have to type your password only once per session, and Kerberos does
|
||||
the authenticating and encrypting transparently.
|
||||
used to. Kerberos V5 is a single-sign-on system, which means that you
|
||||
have to type your password only once per session, and Kerberos does
|
||||
the authenticating and encrypting transparently.
|
||||
|
||||
Jacques Vidrine <n@nectar.com>
|
||||
|
|
|
@ -1,24 +1,24 @@
|
|||
Kerberos V5 is an authentication system developed at MIT.
|
||||
Kerberos V5 is an authentication system developed at MIT.
|
||||
WWW: http://web.mit.edu/kerberos/
|
||||
|
||||
Abridged from the User Guide:
|
||||
Under Kerberos, a client sends a request for a ticket to the
|
||||
Key Distribution Center (KDC). The KDC creates a ticket-granting
|
||||
ticket (TGT) for the client, encrypts it using the client's
|
||||
password as the key, and sends the encrypted TGT back to the
|
||||
Under Kerberos, a client sends a request for a ticket to the
|
||||
Key Distribution Center (KDC). The KDC creates a ticket-granting
|
||||
ticket (TGT) for the client, encrypts it using the client's
|
||||
password as the key, and sends the encrypted TGT back to the
|
||||
client. The client then attempts to decrypt the TGT, using
|
||||
its password. If the client successfully decrypts the TGT, it
|
||||
keeps the decrypted TGT, which indicates proof of the client's
|
||||
identity. The TGT permits the client to obtain additional tickets,
|
||||
its password. If the client successfully decrypts the TGT, it
|
||||
keeps the decrypted TGT, which indicates proof of the client's
|
||||
identity. The TGT permits the client to obtain additional tickets,
|
||||
which give permission for specific services.
|
||||
Since Kerberos negotiates authenticated, and optionally encrypted,
|
||||
Since Kerberos negotiates authenticated, and optionally encrypted,
|
||||
communications between two points anywhere on the internet, it
|
||||
provides a layer of security that is not dependent on which side of a
|
||||
firewall either client is on.
|
||||
The Kerberos V5 package is designed to be easy to use. Most of the
|
||||
The Kerberos V5 package is designed to be easy to use. Most of the
|
||||
commands are nearly identical to UNIX network programs you are already
|
||||
used to. Kerberos V5 is a single-sign-on system, which means that you
|
||||
have to type your password only once per session, and Kerberos does
|
||||
the authenticating and encrypting transparently.
|
||||
used to. Kerberos V5 is a single-sign-on system, which means that you
|
||||
have to type your password only once per session, and Kerberos does
|
||||
the authenticating and encrypting transparently.
|
||||
|
||||
Jacques Vidrine <n@nectar.com>
|
||||
|
|
|
@ -1,24 +1,24 @@
|
|||
Kerberos V5 is an authentication system developed at MIT.
|
||||
Kerberos V5 is an authentication system developed at MIT.
|
||||
WWW: http://web.mit.edu/kerberos/
|
||||
|
||||
Abridged from the User Guide:
|
||||
Under Kerberos, a client sends a request for a ticket to the
|
||||
Key Distribution Center (KDC). The KDC creates a ticket-granting
|
||||
ticket (TGT) for the client, encrypts it using the client's
|
||||
password as the key, and sends the encrypted TGT back to the
|
||||
Under Kerberos, a client sends a request for a ticket to the
|
||||
Key Distribution Center (KDC). The KDC creates a ticket-granting
|
||||
ticket (TGT) for the client, encrypts it using the client's
|
||||
password as the key, and sends the encrypted TGT back to the
|
||||
client. The client then attempts to decrypt the TGT, using
|
||||
its password. If the client successfully decrypts the TGT, it
|
||||
keeps the decrypted TGT, which indicates proof of the client's
|
||||
identity. The TGT permits the client to obtain additional tickets,
|
||||
its password. If the client successfully decrypts the TGT, it
|
||||
keeps the decrypted TGT, which indicates proof of the client's
|
||||
identity. The TGT permits the client to obtain additional tickets,
|
||||
which give permission for specific services.
|
||||
Since Kerberos negotiates authenticated, and optionally encrypted,
|
||||
Since Kerberos negotiates authenticated, and optionally encrypted,
|
||||
communications between two points anywhere on the internet, it
|
||||
provides a layer of security that is not dependent on which side of a
|
||||
firewall either client is on.
|
||||
The Kerberos V5 package is designed to be easy to use. Most of the
|
||||
The Kerberos V5 package is designed to be easy to use. Most of the
|
||||
commands are nearly identical to UNIX network programs you are already
|
||||
used to. Kerberos V5 is a single-sign-on system, which means that you
|
||||
have to type your password only once per session, and Kerberos does
|
||||
the authenticating and encrypting transparently.
|
||||
used to. Kerberos V5 is a single-sign-on system, which means that you
|
||||
have to type your password only once per session, and Kerberos does
|
||||
the authenticating and encrypting transparently.
|
||||
|
||||
Jacques Vidrine <n@nectar.com>
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Reference in a new issue