OpenEMM is a feature-rich web-based enterprise application for email
marketing, newsletters and service mails (transaction mails and
event or time triggered mails). OpenEMM offers a great user interface,
sophisticated bounce management, link tracking, lots of graphical
realtime statistics, a CMS module and a scripting feature to implement
individual tasks.
OpenEMM is the first open source application for e-mail marketing.
Its code base has been developed since 1999 and is used - as part
of the commercial software product E-Marketing Manager (EMM) - by
companies like IBM, Daimler, Siemens and Deutsche Telekom.
OpenEMM offers already more than 95% of the functionality of most
commercial products and some features most commercial products do
not offer right now (for example MySQL support and CMS functionality).
Chromium B.S.U. is a fast paced, arcade-style, top-scrolling space shooter.
This is the +j version Mailman which solves issues about
platform dependent characters in e-mail written in Japanese language
and includes additional patches.
Security and Features:
- An XSS vulnerability, CVE-2011-0707, has been fixed.
- A new mm_cfg.py setting AUTHENTICATION_COOKIE_LIFETIME has been added.
- Fixed the command line scripts add_members, sync_members and
clone_member to properly handle banned addresses.
- and so on
GOBLIN is a C++ class library focussed on graph optimization and network
programming problems. It deals with all of the standard graph optimization
problems discussed by textbooks and in courses on combinatorial optimization.
Today, GOBLIN provides strongly polynomial algorithms for the following graph
optimization problems:
- Shortest paths in graphs and digraphs with negative lengths.
- Negative cycles and minimum mean cycles.
- Strong and 2-connected components.
- Minimum spanning trees, arborescences and 1-trees.
- Maximum st-flows, feasible circulations and b-flows.
- Min-cost st-flows, b-flows and circulations.
- Assignment problems of any kind.
- 1-matchings, b-matchings, capacitated b-matchings, f-factors and
degree-constrained subgraphs.
- Directed and undirected Chinese postman problems, T-joins.
The library also includes methods for NP-hard problems, namely TSP, ATSP,
stable sets and graph colouring.
This is a port of The Internet Junkbuster Proxy(TM). An excelent way
to enhance your privacy while browsing the web. And it also happens
to do a great job of filtering out all those annoying banner ads!
This modified version allows one to specify appearance of blocked GIFs.
It can automatically compress text/html and text/plain documents for clients
which support Accept-Encoding: gzip (e.g. Netscape 4.7, Internet Explorer 5,
Lynx 2.8.3) to save downstream modem/network bandwidth. It uses the zlib
compression library to perform on-the-fly compression of HTML documents.
Please note that this software does not support IPv6. See www/privoxy
for a worth followup of this software.
The DragonFly Mail Agent is a small Mail Transport Agent (MTA),
designed for home and office use. It accepts e-mail messages
from locally installed Mail User Agents (MUA) and delivers the
messages either locally or to a remote destination. Remote
delivery includes several features like TLS/SSL support and
SMTP authentication, but not MX record lookups. Therefore,
dma is currently not suitable for direct remote delivery.
However, it works very well for handling local mail plus
secure mail submission to a remote smarthost (e.g. for
travelling mobile computers).
Since dma is not intended as a replacement for real, big MTAs
like sendmail(8) or postfix(1), it does not listen on port 25
for incoming connections.
Tox is a decentralized, secure messenger with audio and video chat capabilities.
You can see it as an alternative to Skype.
This is only the core library. To use it, you have to install a client, like
e.g. net-im/toxic, net-im/qTox or net-im/uTox.
Tox isn't complete yet, but we encourage you to contribute to help make us
awesome!
Suck and blow are simple companion utilities for sending data over
a TCP socket. They are easy to use and appropriate when FTP is
unavailable, or too much of a hassle, e.g., in single-user mode,
from within shell scripts, etc.
Blow reads the data from standard input, while suck writes it to
standard output. Either program may originate the TCP connection,
and the TCP port may be specified if desired.
Wapiti allows you to audit the security of your web applications.
It performs "black-box" scans, i.e. it does not study the source code of
the application but will scans the webpages of the deployed webapp,
looking for scripts and forms where it can inject data.
Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to
see if a script is vulnerable.
This port contains packages from a near-minimal installation of Fedora 10
Linux. These packages, in conjunction with the Linux kernel module,
form the basis of the Linux compatibility environment. It is designed to
provide a nice user experience by using the FreeBSD configuration for
corresponding Linux stuff where possible. Because of this any work which
needs to chroot into the Linux base may not work as expected (no fallthrough
to the FreeBSD config possible).