Repeated words are are hard to to find sometimes.

Approved by:	portmgr (itetcu)
This commit is contained in:
Eitan Adler 2012-01-08 07:01:25 +00:00
parent a03386997b
commit c5d811a37d
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=288737
58 changed files with 58 additions and 58 deletions

View file

@ -7,7 +7,7 @@ common words, and even some commands. The GOK will provide an
alternative interface to common commands and functions within alternative interface to common commands and functions within
applications that utilize the AT SPI. applications that utilize the AT SPI.
The GOK is is designed to be usable by many alternative input The GOK is designed to be usable by many alternative input
methods, i.e. not a common keyboard and mouse combination. methods, i.e. not a common keyboard and mouse combination.
WWW: http://www.gok.ca WWW: http://www.gok.ca

View file

@ -1,4 +1,4 @@
Ghostess is a a graphical DSSI host, based on jack-dssi-host, but Ghostess is a graphical DSSI host, based on jack-dssi-host, but
capable of saving and restoring plugin configuration, as well as capable of saving and restoring plugin configuration, as well as
specifying MIDI channels and layering synths. ghostess includes specifying MIDI channels and layering synths. ghostess includes
three MIDI drivers: an ALSA sequencer MIDI driver, a (clumsy but three MIDI drivers: an ALSA sequencer MIDI driver, a (clumsy but

View file

@ -1,4 +1,4 @@
id3 enables to to retrieve and update information from ID3 tags in id3 enables to retrieve and update information from ID3 tags in
MP3 files. It supports version 1.0, 1.1 and 2.2+ (only reading text- and MP3 files. It supports version 1.0, 1.1 and 2.2+ (only reading text- and
url-frames at the moment). url-frames at the moment).

View file

@ -3,7 +3,7 @@ XML-based Standard Hex Format (SHF).
Shftool is also a working converter/generator/extractor Shftool is also a working converter/generator/extractor
between/to/of SHF-files and other hex formats. between/to/of SHF-files and other hex formats.
SHF is specified in the the following Internet Draft: SHF is specified in the following Internet Draft:
http://ietf.org/internet-drafts/draft-strombergson-shf-06.txt http://ietf.org/internet-drafts/draft-strombergson-shf-06.txt
WWW: http://www.df.lth.se/~triad/krad/shftool/ WWW: http://www.df.lth.se/~triad/krad/shftool/

View file

@ -1,4 +1,4 @@
This is the the client and protocol library for the Drizzle project. This is the client and protocol library for the Drizzle project.
The server, drizzled, will use this as for protocol library. Client The server, drizzled, will use this as for protocol library. Client
utilities and any new projects that require low-level protocol utilities and any new projects that require low-level protocol
communication (like proxies). Other language interfaces (PHP communication (like proxies). Other language interfaces (PHP

View file

@ -1,6 +1,6 @@
mywwwatcher is php application intended to handle the administration mywwwatcher is php application intended to handle the administration
of MySQL over the web interface. It is small, quick, easy to use of MySQL over the web interface. It is small, quick, easy to use
alternative to phpMyAdmin. In comparison with with phpMyAdmin alternative to phpMyAdmin. In comparison with phpMyAdmin
is this application more oriented to hand writing of SQL queries is this application more oriented to hand writing of SQL queries
and their use for later use. and their use for later use.
It enables also other tasks like database dump, import, export (csv, html), It enables also other tasks like database dump, import, export (csv, html),

View file

@ -6,7 +6,7 @@ can be used to store all relevant information about these
non-relationships so they can later be introspected and examined. non-relationships so they can later be introspected and examined.
This module is fairly esoteric and, unless you are dynamically This module is fairly esoteric and, unless you are dynamically
creating something out of of a DBIC Schema, is probably the wrong creating something out of a DBIC Schema, is probably the wrong
solution for whatever it is you are trying to do. Please be advised solution for whatever it is you are trying to do. Please be advised
that compatibility is not guaranteed for DBIx::Class 0.09000+. We that compatibility is not guaranteed for DBIx::Class 0.09000+. We
will try to mantain all compatibility, but internal changes might will try to mantain all compatibility, but internal changes might

View file

@ -1,4 +1,4 @@
Module::Install is a a standalone, extensible installer for Perl modules. Module::Install is a standalone, extensible installer for Perl modules.
It is designed to be a drop-in replacement for ExtUtils::MakeMaker, and is a It is designed to be a drop-in replacement for ExtUtils::MakeMaker, and is a
descendent of CPAN::MakeMaker. descendent of CPAN::MakeMaker.
Please type "perldoc Module::Install" after installation to see the Please type "perldoc Module::Install" after installation to see the

View file

@ -2,7 +2,7 @@ Object::Destroyer allows for the creation of "Destroy" handles. The
handle is "attached" to the circular relationship, but is not a part handle is "attached" to the circular relationship, but is not a part
of it. When the destroy handle falls out of scope, it will be cleaned of it. When the destroy handle falls out of scope, it will be cleaned
up correctly, and while being cleaned up, it will also force the data up correctly, and while being cleaned up, it will also force the data
structure it is attached to to be destroyed as well. Object::Destroyer structure it is attached to be destroyed as well. Object::Destroyer
can call a specified release method on an object (or method DESTROY by can call a specified release method on an object (or method DESTROY by
default). Alternatively, it can execute an arbitrary user code passed default). Alternatively, it can execute an arbitrary user code passed
to constructor as a code reference. to constructor as a code reference.

View file

@ -9,7 +9,7 @@ data exchange and storage.
The module is written in C and it is up to 250 times faster when compared to The module is written in C and it is up to 250 times faster when compared to
the other python JSON implementations which are written directly in python. the other python JSON implementations which are written directly in python.
This speed gain varies with the complexity of the data and the operation and This speed gain varies with the complexity of the data and the operation and
is the the range of 10-200 times for encoding operations and in the range of is the range of 10-200 times for encoding operations and in the range of
100-250 times for decoding operations. 100-250 times for decoding operations.
WWW: http://www.python.org/pypi/python-cjson/ WWW: http://www.python.org/pypi/python-cjson/

View file

@ -1,5 +1,5 @@
py-rioritized_methods is an extension to PEAK-Rules to prioritize py-rioritized_methods is an extension to PEAK-Rules to prioritize
methods in order to to avoid AmbiguousMethods situations.This module methods in order to avoid AmbiguousMethods situations.This module
provides four decorators: provides four decorators:
prioritized_when prioritized_when
prioritized_around prioritized_around

View file

@ -2,7 +2,7 @@ A Ruby gem to manage ISO 3166 country names and their
corresponding alpha-2 and alpha-3 codes. Additional corresponding alpha-2 and alpha-3 codes. Additional
support has been added for ISO 4127 currency information support has been added for ISO 4127 currency information
and standard conventions for states in the USA and standard conventions for states in the USA
(based on the the 3166-2:US code). (based on the 3166-2:US code).
ISO 3166 country codes reference: ISO 3166 country codes reference:
http://en.wikipedia.org/wiki/ISO_3166-1 http://en.wikipedia.org/wiki/ISO_3166-1

View file

@ -6,7 +6,7 @@ TIJmp is written to be fast and have a small footprint, both memory- and cpu-
wise. This means that the jvm will run at almost full speed, until you use wise. This means that the jvm will run at almost full speed, until you use
tijmp to find some information. tijmp to find some information.
TIJmp uses C code to talk to the jvm and it uses swing to show the the tables TIJmp uses C code to talk to the jvm and it uses swing to show the tables
of information. So tijmp is written in C (using jvmti and jni) and Java. of information. So tijmp is written in C (using jvmti and jni) and Java.
TIJmp runs in the same jvm as the program being profiled. This means that it TIJmp runs in the same jvm as the program being profiled. This means that it

View file

@ -1,4 +1,4 @@
Kasablanca is a a graphical ftp client for KDE. Kasablanca is a graphical ftp client for KDE.
Features: Features:
o ftps encryption via AUTH TLS o ftps encryption via AUTH TLS

View file

@ -1,5 +1,5 @@
excido is a free (GPL) game. It combines (simple|old school|arcadey) gameplay excido is a free (GPL) game. It combines (simple|old school|arcadey) gameplay
with 3D OpenGL graphics graphics and OpenAL positional audio. Excido is not a with 3D OpenGL graphics and OpenAL positional audio. Excido is not a
highly complex experience, but you may enjoy it as a small diversion. highly complex experience, but you may enjoy it as a small diversion.
Excido was developed under GNU/Linux, and has also been found to work on MacOS Excido was developed under GNU/Linux, and has also been found to work on MacOS

View file

@ -10,7 +10,7 @@ on the bottom and scores :). The more rows disappear at a time, the more
scores you have. If you can't place the whole figure on the bottom, then it scores you have. If you can't place the whole figure on the bottom, then it
stays on the wall and this wall became frozen (you can't place figures on stays on the wall and this wall became frozen (you can't place figures on
it) for a while. After nth rows were successfully cleared, you will receive it) for a while. After nth rows were successfully cleared, you will receive
bonus figure and go to to the next level - game speed will be increased. bonus figure and go to the next level - game speed will be increased.
Your task is to play more longer and earn more scores. Your task is to play more longer and earn more scores.
WWW: http://www.xnc.dubna.su/xwelltris/ WWW: http://www.xnc.dubna.su/xwelltris/

View file

@ -1,7 +1,7 @@
Backfract is an animated wallpaper program for Unix with X windows. Backfract is an animated wallpaper program for Unix with X windows.
It fills your background window with a fractal image, then every It fills your background window with a fractal image, then every
15 minutes it will update the image by zooming in or out. As it 15 minutes it will update the image by zooming in or out. As it
zooms in on it it uses a simple heuristic to try to stay with zooms in, it uses a simple heuristic to try to stay with
"interesting" scenes. "interesting" scenes.
WWW: http://www.inetarena.com/~wms/comp/backfract/ WWW: http://www.inetarena.com/~wms/comp/backfract/

View file

@ -1,3 +1,3 @@
Bmp2html is a simple program that converts a bmpfile to to a html file. Bmp2html is a simple program that converts a bmpfile to a html file.
EXAMPLES: http://critical.ch/bmp2html/ EXAMPLES: http://critical.ch/bmp2html/

View file

@ -3,7 +3,7 @@ OpenGL API (JSR-231), and is designed to provide hardware-supported 3D graphics
to applications written in Java. JOGL provides full access to the APIs in the to applications written in Java. JOGL provides full access to the APIs in the
OpenGL 1.3 - 3.0, >= 3.1, ES 1.x and ES 2.x specification as well as nearly all OpenGL 1.3 - 3.0, >= 3.1, ES 1.x and ES 2.x specification as well as nearly all
vendor extensions. It integrates with the AWT and Swing widget sets, as well vendor extensions. It integrates with the AWT and Swing widget sets, as well
with custom windowing toolkits using the the NativeWindow API. It is part of a with custom windowing toolkits using the NativeWindow API. It is part of a
suite of open-source technologies initiated by the Game Technology Group at Sun suite of open-source technologies initiated by the Game Technology Group at Sun
Microsystems. Microsystems.

View file

@ -1,5 +1,5 @@
AC3D is a 3D object/scene modeller available for Linux, Windows 95/NT, and AC3D is a 3D object/scene modeller available for Linux, Windows 95/NT, and
SGI. It is is very easy to use, yet powerful - anyone can create good looking SGI. It is very easy to use, yet powerful - anyone can create good looking
3D objects in a few minutes. It outputs POV-Ray, VRML (1 and 2), RenderMan, 3D objects in a few minutes. It outputs POV-Ray, VRML (1 and 2), RenderMan,
Dive, Massive and other formats. Dive, Massive and other formats.

View file

@ -1,4 +1,4 @@
This uses the the Imager to find the average gray value This uses the Imager to find the average gray value
for a image. for a image.
WWW: http://search.cpan.org/dist/Imager-AverageGray/ WWW: http://search.cpan.org/dist/Imager-AverageGray/

View file

@ -1,4 +1,4 @@
This module provides an interface to to the vcg graphing tool. It supports a This module provides an interface to the vcg graphing tool. It supports a
limited selection of options and file formats. The vcg graphing tool homepage limited selection of options and file formats. The vcg graphing tool homepage
is currently http://rw4.cs.uni-sb.de/users/sander/html/gsvcg1.html but is is currently http://rw4.cs.uni-sb.de/users/sander/html/gsvcg1.html but is
being actively developed elsewhere. being actively developed elsewhere.

View file

@ -2,6 +2,6 @@ With PEAR::Image_Barcode class you can create a barcode representation of a
given string. given string.
This class uses GD function because this the generated graphic can be any of This class uses GD function because this the generated graphic can be any of
GD supported supported image types. GD supported image types.
WWW: http://pear.php.net/package/Image_Barcode/ WWW: http://pear.php.net/package/Image_Barcode/

View file

@ -1,4 +1,4 @@
This is the PHP extension of the Puzzle library, which is is designed to This is the PHP extension of the Puzzle library, which is designed to
quickly find visually similar images (GIF, PNG, JPG), even if they have been quickly find visually similar images (GIF, PNG, JPG), even if they have been
resized, recompressed, recolored or slightly modified. resized, recompressed, recolored or slightly modified.
The library is free, lightweight yet very fast, configurable, easy to use The library is free, lightweight yet very fast, configurable, easy to use

View file

@ -1,5 +1,5 @@
This is a Java port of GNU getopt, a class for parsing command line arguments This is a Java port of GNU getopt, a class for parsing command line arguments
passed to programs. It it based on the C getopt() functions in glibc 2.0.6 and passed to programs. It is based on the C getopt() functions in glibc 2.0.6 and
should parse options in a 100% compatible manner. should parse options in a 100% compatible manner.
WWW: http://www.urbanophile.com/~arenn/hacking/download.html#getopt WWW: http://www.urbanophile.com/~arenn/hacking/download.html#getopt

View file

@ -1,7 +1,7 @@
Optional extras for the CMU implementation of Common Lisp. Optional extras for the CMU implementation of Common Lisp.
Optional packages for graphical user interfaces and other Common Lisp Optional packages for graphical user interfaces and other Common Lisp
applications and libraries are are on: applications and libraries are on:
ftp://cmucl.cons.org/pub/lisp/cmucl/ ftp://cmucl.cons.org/pub/lisp/cmucl/

View file

@ -5,7 +5,7 @@ transforms it into a Buechi automaton, using a generalized Buechi
automaton as an intermediate step. Each automaton is simplified automaton as an intermediate step. Each automaton is simplified
on-the-fly in order to save memory and time. As usual the LTL formula on-the-fly in order to save memory and time. As usual the LTL formula
is simplified before any treatment. ltl2ba is more efficient than is simplified before any treatment. ltl2ba is more efficient than
Spin 3.4.1, with regard to the the size of the resulting automaton, Spin 3.4.1, with regard to the size of the resulting automaton,
the time of the computation, and the memory used. the time of the computation, and the memory used.
WWW: http://www.lsv.ens-cachan.fr/~gastin/ltl2ba/ WWW: http://www.lsv.ens-cachan.fr/~gastin/ltl2ba/

View file

@ -10,7 +10,7 @@ difficult task for a human, as small differences in numerical output values
are expected. File differencing utilites, such as diff(1), will generally are expected. File differencing utilites, such as diff(1), will generally
produce voluminous output, often longer than the original files. produce voluminous output, often longer than the original files.
ndiff solves this problem. Taking two two text files expected to be ndiff solves this problem. Taking two text files expected to be
identical, or at least numerically similar, it allows to specify absolute identical, or at least numerically similar, it allows to specify absolute
and/or relative error tolerances for differences between numerical values and/or relative error tolerances for differences between numerical values
in the two files, and then reports only the lines with values exceeding in the two files, and then reports only the lines with values exceeding

View file

@ -1,4 +1,4 @@
Statistics::R will permit the control of the the R (R-project) interpreter Statistics::R will permit the control of the R (R-project) interpreter
through Perl in different architectures and OS. through Perl in different architectures and OS.
WWW: http://search.cpan.org/dist/Statistics-R/ WWW: http://search.cpan.org/dist/Statistics-R/

View file

@ -1,6 +1,6 @@
PRNG is a collection of portable, high-performance ANSI-C implementations of PRNG is a collection of portable, high-performance ANSI-C implementations of
pseudorandom number generators such as linear congruential, inversive pseudorandom number generators such as linear congruential, inversive
congruential, and explicit inversive congruential random number generators (LCG, congruential, and explicit inversive congruential random number generators (LCG,
ICG and EICG, respectively) created by Otmar Lendl and and Josef Leydold. ICG and EICG, respectively) created by Otmar Lendl and Josef Leydold.
WWW: http://statistik.wu-wien.ac.at/software/prng/index.html WWW: http://statistik.wu-wien.ac.at/software/prng/index.html

View file

@ -1,2 +1,2 @@
Callid is a tool to be be able to show incoming calls in a web-based interface. Callid is a tool to be able to show incoming calls in a web-based interface.
the calls are logged through the ISDN D-Channel. the calls are logged through the ISDN D-Channel.

View file

@ -1,4 +1,4 @@
If you use Perl to manage interactive sessions with with the If you use Perl to manage interactive sessions with the
command-line interfaces of networked appliances, then you might find command-line interfaces of networked appliances, then you might find
this module useful. this module useful.

View file

@ -6,7 +6,7 @@ bytes. The first three bytes are the OUI.
This module allows you to take a MAC address and turn it into the OUI and This module allows you to take a MAC address and turn it into the OUI and
vendor information. You can, for instance, scan a network, collect MAC vendor information. You can, for instance, scan a network, collect MAC
addresses, and turn those addresses into vendors. With vendor information, addresses, and turn those addresses into vendors. With vendor information,
you can often guess at what what you are looking at (e.g. an Apple you can often guess at what you are looking at (e.g. an Apple
product). product).
You can use this as a module as its individual functions, or call it as a You can use this as a module as its individual functions, or call it as a

View file

@ -1,4 +1,4 @@
radsecproxy is a generic RADIUS proxy that in addition to to usual RADIUS radsecproxy is a generic RADIUS proxy that in addition to usual RADIUS
UDP transport, also supports TLS (RadSec), as well as RADIUS over TCP and UDP transport, also supports TLS (RadSec), as well as RADIUS over TCP and
DTLS. The aim is for the proxy to have sufficient features to be flexible, DTLS. The aim is for the proxy to have sufficient features to be flexible,
while at the same time to be small, efficient and easy to configure. while at the same time to be small, efficient and easy to configure.

View file

@ -3,7 +3,7 @@ monitors traffic on any number of Ethernet interfaces and examines ARP replies
and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP
request that is in conflict with its notion of "correct" Ethernet/IP address request that is in conflict with its notion of "correct" Ethernet/IP address
pairs, it logs the attack if logging is enabled, and, if the Ethernet pairs, it logs the attack if logging is enabled, and, if the Ethernet
interface that the attack was seen on is is configured as being in aggressive interface that the attack was seen on is configured as being in aggressive
mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with
the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables
of hosts on the local network segment. The corrective gratuitous ARP request of hosts on the local network segment. The corrective gratuitous ARP request

View file

@ -1,7 +1,7 @@
The BlindElephant Web Application Fingerprinter attempts to discover The BlindElephant Web Application Fingerprinter attempts to discover
the version of a (known) web application by comparing static files the version of a (known) web application by comparing static files
at known locations against precomputed hashes for versions of those at known locations against precomputed hashes for versions of those
files in all all available releases. The technique is fast, files in all available releases. The technique is fast,
low-bandwidth, non-invasive, generic, and highly automatable. low-bandwidth, non-invasive, generic, and highly automatable.
WWW: http://blindelephant.sourceforge.net/ WWW: http://blindelephant.sourceforge.net/

View file

@ -1,6 +1,6 @@
GSS is an implementation of the Generic Security Service Application Program GSS is an implementation of the Generic Security Service Application Program
Interface (GSS-API). GSS-API is used by network servers (e.g., IMAP, SMTP) to Interface (GSS-API). GSS-API is used by network servers (e.g., IMAP, SMTP) to
provide security security services, e.g., authenticate clients against servers. provide security services, e.g., authenticate clients against servers.
GSS consists of a library and a manual. GSS consists of a library and a manual.
WWW: http://www.gnu.org/software/gss/ WWW: http://www.gnu.org/software/gss/

View file

@ -5,7 +5,7 @@ Cryptography.
Two interfaces are provided in the module. The first is Two interfaces are provided in the module. The first is
straight block encryption/decryption the second does base64 straight block encryption/decryption the second does base64
mime encoding/decoding of the encrypted/decrypted blocks. mime encoding/decoding of the encrypted/decrypted blocks.
The idea is the the two sides have a shared secret that The idea is the two sides have a shared secret that
supplies one of the keys and a randomly generated block of supplies one of the keys and a randomly generated block of
bytes provides the second key. The random key is passed in bytes provides the second key. The random key is passed in
cleartext between the two sides. cleartext between the two sides.

View file

@ -7,7 +7,7 @@
straight block encryption/decryption the second does base64 straight block encryption/decryption the second does base64
mime encoding/decoding of the encrypted/decrypted blocks. mime encoding/decoding of the encrypted/decrypted blocks.
The idea is the the two sides have a shared secret that The idea is that the two sides have a shared secret that
supplies one of the keys and a randomly generated block of supplies one of the keys and a randomly generated block of
bytes provides the second key. The random key is passed in bytes provides the second key. The random key is passed in
cleartext between the two sides. cleartext between the two sides.

View file

@ -1,6 +1,6 @@
Text::Password::Pronounceable - Generate pronounceable passwords Text::Password::Pronounceable - Generate pronounceable passwords
This module generates pronuceable passwords, based the the This module generates pronuceable passwords, based the
English digraphs by D Edwards. English digraphs by D Edwards.
WWW: http://search.cpan.org/dist/Text-Password-Pronounceable/ WWW: http://search.cpan.org/dist/Text-Password-Pronounceable/

View file

@ -1,5 +1,5 @@
PAM module which permits authentication for arbitrary services via PAM module which permits authentication for arbitrary services via
ssh-agent. Written with sudo in mind, but like any auth PAM module, ssh-agent. Written with sudo in mind, but like any auth PAM module,
can be used for for many purposes. can be used for many purposes.
WWW: http://pamsshagentauth.sourceforge.net/ WWW: http://pamsshagentauth.sourceforge.net/

View file

@ -1,6 +1,6 @@
Replacement for htpasswd. Replacement for htpasswd.
This port will install htpasswd.py that can be found in trac trac contrib This port will install htpasswd.py that can be found in trac contrib
directory. directory.
WWW: http://trac.edgewall.org/browser/trunk/contrib/htpasswd.py WWW: http://trac.edgewall.org/browser/trunk/contrib/htpasswd.py

View file

@ -6,7 +6,7 @@ the industry, but will bring new ideas and technologies to the field.
OISF is part of and funded by the Department of Homeland Security's Directorate OISF is part of and funded by the Department of Homeland Security's Directorate
for Science and Technology HOST program (Homeland Open Security Technology), for Science and Technology HOST program (Homeland Open Security Technology),
by the the Navy's Space and Naval Warfare Systems Command (SPAWAR), as well as by the Navy's Space and Naval Warfare Systems Command (SPAWAR), as well as
through the very generous support of the members of the OISF Consortium. through the very generous support of the members of the OISF Consortium.
More information about the Consortium is available, as well as a list of our More information about the Consortium is available, as well as a list of our

View file

@ -15,7 +15,7 @@ This package contains the following programs:
- mkhybrid (an ISO-9660/HFS filesystem image creator) - mkhybrid (an ISO-9660/HFS filesystem image creator)
Link to mkisofs. Link to mkisofs.
- readcd (a data CD reading and recording program) - readcd (a data CD reading and recording program)
May be used to to write to DVD-RAM and to copy Solaris boot CD's. May be used to write to DVD-RAM and to copy Solaris boot CD's.
- scgcheck (checks and validates the ABI of libscg) - scgcheck (checks and validates the ABI of libscg)
- rscsi (daemon providing access to local SCSI-devices over the network) - rscsi (daemon providing access to local SCSI-devices over the network)

View file

@ -15,7 +15,7 @@ This package contains the following programs:
- mkhybrid (an ISO-9660/HFS filesystem image creator) - mkhybrid (an ISO-9660/HFS filesystem image creator)
Link to mkisofs. Link to mkisofs.
- readcd (a data CD reading and recording program) - readcd (a data CD reading and recording program)
May be used to to write to DVD-RAM and to copy Solaris boot CD's. May be used to write to DVD-RAM and to copy Solaris boot CD's.
- scgcheck (checks and validates the ABI of libscg) - scgcheck (checks and validates the ABI of libscg)
- rscsi (daemon providing access to local SCSI-devices over the network) - rscsi (daemon providing access to local SCSI-devices over the network)

View file

@ -1,4 +1,4 @@
This is a network-based backup system based of of rync. It can do full and This is a network-based backup system based of rync. It can do full and
incremental backups to a remote file server. It relies on rsync for the incremental backups to a remote file server. It relies on rsync for the
host to host copy and uses hard links to provide multiple snapshots of the host to host copy and uses hard links to provide multiple snapshots of the
data without duplicating identical files. data without duplicating identical files.

View file

@ -4,7 +4,7 @@ written in Keyman keyboard language and developed as a part of Varamozhi
Project under the LGPL license. Project under the LGPL license.
The Mozhi is intended to be the most intuitive scheme for Malayalam speakers. The Mozhi is intended to be the most intuitive scheme for Malayalam speakers.
It simplifies what the user needs to remember and is is not phonetically It simplifies what the user needs to remember and is not phonetically
accurate. accurate.
This keymap supports the current standard for Malayalam Chillus (i.e. without This keymap supports the current standard for Malayalam Chillus (i.e. without

View file

@ -1,5 +1,5 @@
makefaq is a Python program that creates a Frequently Asked Questions (FAQ) makefaq is a Python program that creates a Frequently Asked Questions (FAQ)
list from a specially formatted text data file. For output, it can can list from a specially formatted text data file. For output, it can
generate either an HTML page, a text file, or a DocBook XML file. generate either an HTML page, a text file, or a DocBook XML file.
WWW: http://www.lodestar2.com/software/makefaq/ WWW: http://www.lodestar2.com/software/makefaq/

View file

@ -17,7 +17,7 @@ is not up against a numeric substring in another, the non-numeric always comes
first. This is fudged by reading pretending that the lack of a number substring first. This is fudged by reading pretending that the lack of a number substring
has the value -1, like so: has the value -1, like so:
* The start of a string is exceptional: leading non-\W (non-word, * The start of a string is exceptional: leading non-\W (non-word,
non-digit) components are are ignored, and numbers come before letters. non-digit) components are ignored, and numbers come before letters.
* I define "numeric substring" just as sequences matching m/\d+/ -- * I define "numeric substring" just as sequences matching m/\d+/ --
scientific notation, commas, decimals, etc., are not seen. If your data has scientific notation, commas, decimals, etc., are not seen. If your data has
thousands separators in numbers ("20,000 Leagues Under The Sea" or "20.000 thousands separators in numbers ("20,000 Leagues Under The Sea" or "20.000

View file

@ -1,6 +1,6 @@
Read data from Excel spread sheets without Microsoft! Provides an API to allow Read data from Excel spread sheets without Microsoft! Provides an API to allow
any application to read Excel documents. The xlreader tool converts Excel data any application to read Excel documents. The xlreader tool converts Excel data
to tab delimited, CSV or SQL inserts. Written in C. Based on the the Java to tab delimited, CSV or SQL inserts. Written in C. Based on the Java
version by Andrew Khan. version by Andrew Khan.
This project was designed out of frustration. This project was designed out of frustration.

View file

@ -4,7 +4,7 @@ From the XP homepage:
detects all non well-formed documents. detects all non well-formed documents.
XP has the following design goals: Conformance and correctness, high XP has the following design goals: Conformance and correctness, high
performance and a layered structure. Is is currently non-validating but can performance and a layered structure. It is currently non-validating but can
parse all external entities. parse all external entities.
For more details, please see the XP homepage: For more details, please see the XP homepage:

View file

@ -3,7 +3,7 @@ variables to your CGI::Application modules. Lazy loading is used to
prevent the config file from being parsed if no configuration variables prevent the config file from being parsed if no configuration variables
are accessed during the request. are accessed during the request.
The format is detected automatically using Config::Auto. It it known to The format is detected automatically using Config::Auto. It is known to
support the following formats: colon separated, space separated, equals support the following formats: colon separated, space separated, equals
separated, XML, Perl code, and Windows INI. See that modules separated, XML, Perl code, and Windows INI. See that modules
documentation for complete details. documentation for complete details.

View file

@ -17,7 +17,7 @@ Registered developers have free access to the Alexa Web Information
Service during its beta period, but it is limited to 10,000 requests Service during its beta period, but it is limited to 10,000 requests
per subscription ID per day. per subscription ID per day.
There are some limitations, so be sure to read the The Amazon Alexa There are some limitations, so be sure to read The Amazon Alexa
Web Information Service FAQ. Web Information Service FAQ.
WWW: http://search.cpan.org/dist/Net-Amazon-AWIS/ WWW: http://search.cpan.org/dist/Net-Amazon-AWIS/

View file

@ -3,6 +3,6 @@ of the W3 CSS Validator application (http://jigsaw.w3.org/css-validator/).
With this package you can connect to a running instance of the validator and With this package you can connect to a running instance of the validator and
retrieve the validation results (true|false) as well as the errors and warnings retrieve the validation results (true|false) as well as the errors and warnings
for a a style sheet. for a style sheet.
WWW: http://pear.php.net/package/Services_W3C_CSSValidator/ WWW: http://pear.php.net/package/Services_W3C_CSSValidator/

View file

@ -1,7 +1,7 @@
Unicorn is an HTTP server for Rack applications designed to only serve fast Unicorn is an HTTP server for Rack applications designed to only serve fast
clients on low-latency, high-bandwidth connections and take advantage of clients on low-latency, high-bandwidth connections and take advantage of
features in Unix/Unix-like kernels. Slow clients should only be served by features in Unix/Unix-like kernels. Slow clients should only be served by
placing a reverse proxy capable of fully buffering both the the request and placing a reverse proxy capable of fully buffering both the request and
response in between Unicorn and slow clients. response in between Unicorn and slow clients.
WWW: http://unicorn.bogomips.org/ WWW: http://unicorn.bogomips.org/

View file

@ -9,6 +9,6 @@ Features
* PHP Output with built in authentication hooks * PHP Output with built in authentication hooks
* Fast Processing * Fast Processing
* Reporting right down the the location vistied * Reporting right down the location vistied
WWW: http://www.crc.net.nz/software/srg.php WWW: http://www.crc.net.nz/software/srg.php

View file

@ -1,7 +1,7 @@
webtrees is the web's leading online collaborative genealogy webtrees is the web's leading online collaborative genealogy
application. webtrees works from standard GEDCOM files, and is application. webtrees works from standard GEDCOM files, and is
therefore compatible with every major desktop application. webtrees therefore compatible with every major desktop application. webtrees
aims to to be efficient and effective by using the right combination aims to be efficient and effective by using the right combination
of third-party tools, design techniques and open standards. of third-party tools, design techniques and open standards.
WWW: http://webtrees.net/ WWW: http://webtrees.net/

View file

@ -1,4 +1,4 @@
Xephyr is a a kdrive server that outputs to a window on a pre-existing Xephyr is a kdrive server that outputs to a window on a pre-existing
'host' X display. Think Xnest but with support for modern extensions 'host' X display. Think Xnest but with support for modern extensions
like composite, damage and randr. like composite, damage and randr.