Ports Search

Results 1,5911,600 of 17,660 for descr%3A%22spam filter%22.(0.011 seconds)
security/cfs-1.5.0.b (Score: 0.0017693123)
Cryptographic file system implemented as a user-space NFS server
This is CFS, Matt Blaze's Cryptographic File System. It provides transparent encryption and decryption of selected directory trees. It is implemented as a user-level NFS server and thus does not require any kernel modifications. For an overview of how to use it, read "${PREFIX}/share/doc/cfs/notes.ms" and the manual pages. There is a paper describing CFS at: http://www.crypto.com/papers/cfs.pdf
security/libadacrypt-20151019 (Score: 0.0017693123)
Crypto library for Ada with a nice API
This is a crypto library for Ada with a nice API and is written for the i386 and x86_64 hardware architecture. Symmetric cryptography supported: * Blockciphers: AES, Twofish, 3DES, Serpent * Hash functions: SHA-1, SHA-256, SHA-384, SHA-512, Whirlpool * MACs: RMAC, HMAC, CMAC * Modes of operation: BPS, CFB, Ctr, OFB * Authenticated Encryption Schemes: OCB, SIV, McOE Assymmetric cryptography supported: * DSA signature scheme * OEAP-RSA * ECDSA, ECDH Unsigned big number library features: * Primary cyclic group arithmetic (Z_p) * Binary Field arithmetic support * Elliptic Curve arithmetic
security/Sudo-0.33 (Score: 0.0017693123)
Perl extension for running a command line sudo
Sudo runs commands as another user, provided the system sudo implementation is setup to enable this. This does not allow running applications securely, simply it allows the programmer to run a program as another user (suid) using the sudo tools rather than suidperl. Suidperl is not generally recommended for secure operation as another user. While sudo itself is a single point tool to enable one user to execute commands as another sudo does not itself make you any more or less secure.
security/wapiti-2.3.0 (Score: 0.0017693123)
Wapiti is a vulnerability scanner for web applications
Wapiti allows you to audit the security of your web applications. It performs "black-box" scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed webapp, looking for scripts and forms where it can inject data. Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable.
textproc/Spreadsheet-WriteExcel-2.40 (Score: 0.0017693123)
Write to a cross-platform Excel binary file
The Spreadsheet::WriteExcel module can be used to create a cross-platform Excel binary file. Multiple worksheets can be added to a workbook and formatting can be applied to cells. Text, numbers, formulas, hyperlinks and images can be written to the cells. The Excel file produced by this module is compatible with Excel 5, 95, 97, 2000, 2002 and 2003, also Gnumeric and OpenOffice. This module cannot be used to write to an existing Excel file.
www/emk-sinatra-url-for-0.2.1 (Score: 0.0017693123)
Construct absolute paths and full URLs for a Sinatra application
sinatra-url-for constructs absolute paths and full URLs for handlers in a Sinatra application. Assuming that your application is running on example.com, and that it has been mapped to /myapp, you should be able call url_for from within a handler as follows: url_for "/" # Returns "/myapp/" url_for "/foo" # Returns "/myapp/foo" url_for "/foo", :full # Returns "http://example.com/myapp/foo"
Bitstream Cyberbit is a TrueType font that covers Unicode 2.0
Bitstream Cyberbit is a TrueType font. It is an international font, containing characters from many languages. Each character is encoded with its Unicode value, according to Unicode 2.0 standards. Cyberbit was developed by Bitstream to provide Unicode Consortium members with a test font. It is therefore distributed freely to customers that need advanced multilingual fonts for testing and other non-commercial uses. Customers that wish to use Cyberbit for other purposes must license the font from Bitstream.
x11-toolkits/Tk-804.033 (Score: 0.0017693123)
Re-port of a perl5 interface to Tk8.4
This a re-port of a perl interface to Tk8.4 (John Ousterhout's production release). Perl API is essentially the same as Tk800.025 but has not been verified as compliant. It also includes all the C code parts of Tix8.1.4 from SourceForge. The perl code corresponding to Tix's Tcl code is not fully implemented. This version (Tk804.025) is only likely to work with perl5.8+.
sysutils/dolly-0.58.c (Score: 0.0017681348)
Program to clone harddisks/partitions over a fast switched network
[ excerpt taken from distfile's README ] Dolly is used to clone the installation of one machine to (possibly many) other machines. It can distribute image-files (even gnu-zipped), partitions or whole hard disk drives to other partitions or hard disk drives. As it forms a "virtual TCP ring" to distribute data, it works best with fast switched networks (we were able to clone a 2 GB Windows NT partition to 15 machines in our cluster over Gigabit Ethernet in less than 4 minutes). As dolly clones whole partitions block-wise it works for most filesystems. We used it to clone partitions of the following type: Linux, Windows NT, Oberon, Solaris (most of our machines have multi boot setups). We have a small (additional) Linux installation on all of our machines or use a small one-floppy-disk-linux (e.g. muLinux) to do the cloning. On newer machines we use PXE to boot a small system in a RAM disk. From that system we then clone the hard disks in the machines.
devel/IPC-Mmap-0.21 (Score: 0.0017582339)
Provides a minimal mmap() interface for both POSIX and Win32
Provides an object-oriented interface to either the POSIX mmap() or Win32 equivalent APIs to memory map a file into a process's address space for general memory access. IPC::Mmap provides only a minimal interface without the additional overhead of tie'd variables or locking enforced in other modules (e.g., Sys::Mmap, Win32::MMF); hence, the application is responsible for performing read()'s and write()'s on the IPC::Mmap object, and calling any needed lock() and unlock() methods, as required by concurrent processes. Memory mapped files provide an alternate shared memory mechanism for multiple processes. The technique maps the OS's file system buffers for a given file into each mmap()'ing process's virtual memory space, thereby permitting each process to essentially share the same physical memory. Refer to the excellent "Advanced Programming in the UNIX Environment", Stevens et al., Addison-Wesley Publisher for a detailed reference on the POSIX implementation. IPC::Mmap provides OS-agnostic wrappers for both the POSIX and Win32 memory mapped file capabilities.