Ports Search

Results 14,62114,630 of 17,754 for %E6%8E%A7%E5%88%B6%E5%8F%B0.(0.011 seconds)
security/rekall_gui-1.5.0.p4 (Score: 5.4946377E-5)
GUI component of the Rekall framework
The Rekall Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibility into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.
security/gag-2.9 (Score: 5.4946377E-5)
Stacheldraht (DOS attack) agent detector
"gag" is a program to scan for "stacheldraht" agents, which are part of an active "stacheldraht" network. It will not detect trinoo, the original Tribe Flood Network (TFN), or TFN2K agents. For methods of detecting trinoo and Tribe Flood Network, see: http://staff.washington.edu/dittrich/misc/trinoo.analysis http://staff.washington.edu/dittrich/misc/tfn.analysis (Why "gag"? Its supposed to be a running joke I started in the trinoo analysis. trinoo/trinot, "tribe"/civilize, gag/sicken&gesundheit!. Read the ddos trilogy to find out!)
security/i2p-0.9.16 (Score: 5.4946377E-5)
Anonymizing network
[ excerpt from developer's web site ] I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person. No network can be "perfectly anonymous". The continued goal of I2P is to make attacks more and more difficult to mount. Its anonymity will get stronger as the size of the network increases and with ongoing academic review.
security/seccure-0.5 (Score: 5.4946377E-5)
Elliptic Curve Crypto Utility for Reliable Encryption
The seccure toolset implements a selection of asymmetric algorithms based on elliptic curve cryptography (ECC). In particular it offers public key encryption / decryption, signature generation / verification and key establishment. ECC schemes offer a much better key size to security ratio than classical systems (RSA, DSA). Keys are short enough to make direct specification of keys on the command line possible (sometimes this is more convenient than the management of PGP-like key rings). seccure builds on this feature and therefore is the tool of choice whenever lightweight asymmetric cryptography -- independent of key servers, revocation certificates, the Web of Trust or even configuration files -- is required.
shells/ksh93-20120801 (Score: 5.4946377E-5)
Official AT&T release of KornShell 93
KSH-93 is the most recent version of the KornShell Language described in "The KornShell Command and Programming Language," by Morris Bolsky and David Korn of AT&T Bell Laboratories. The KornShell is a shell programming language, which is upward compatible with "sh" (the Bourne Shell), and is intended to conform to the IEEE P1003.2/ISO 9945.2 Shell and Utilities standard. KSH-93 provides an enhanced programming environment in addition to the major command-entry features of the BSD shell "csh". With KSH-93, medium-sized programming tasks can be performed at shell-level without a significant loss in performance. In addition, "sh" scripts can be run on KSH-93 without modification.
shells/vshnu-1.0305 (Score: 5.4946377E-5)
New Visual Shell
In the Unix tradition, it works with things already there and fills a empty niche. When incorporating it into your Unix environment, you keep your command line shell, your editor, your pager, and access to all your tools, tricks and know-how. Vshnu can operate as an optional supplemental visual mode to your command line shell. You switch between command line and visual mode easily as you wish. Your interface bandwidth and power for Unix operations is on a higher plane and life gets sweeter.
sysutils/bsdstats-6.0 (Score: 5.4946377E-5)
Monthly script for reporting anonymous statistics about your machine
BSDstats is an attempt to produce reasonably accurate statistics on deployments of BSD operating systems. This is useful for marketing, project advocacy, hardware vendors and purchasers, device driver maintainers, and port maintainers. The major problem that we are trying to address is vendors who do not feel that BSD operating systems present enough of a market to bother supporting. Meant to be run monthly or during bootup, this script submits statistics anonymously to a central server (http://bsdstats.org). Potentially sensitive details like IP addresses and hostnames are not stored by or relayed through the BSDstats server.
sysutils/abck-2.2 (Score: 5.4946377E-5)
Manage intrusion attempts recorded in the system log
'abck' is an interactive tool to examine intrusion attempts and decide what, if anything, to do about them. It reads through /var/log/messages looking for evidence of an intrusion attempt. Upon finding such a record, 'abck' qualifies it against information supplied by the user on the command line to determine if the record is to be processed. As packaged, 'abck' handles several common types of intrusion attempt records, but it can easily be expanded to handle others. You need a reasonably current copy of Python to run the main script.
sysutils/filebeat-1.2.3 (Score: 5.4946377E-5)
Collect logs locally and send to remote logstash
Beats is the platform for building lightweight, open source data shippers for many types of operational data you want to enrich with Logstash, search and analyze in Elasticsearch, and visualize in Kibana. Whether you're interested in log files, infrastructure metrics, network packets, or any other type of data, Beats serves as the foundation for keeping a beat on your data. Filebeat is a lightweight, open source shipper for log file data. As the next-generation Logstash Forwarder, Filebeat tails logs and quickly sends this information to Logstash for further parsing and enrichment or to Elasticsearch for centralized storage and analysis.
sysutils/flexbackup-1.2.1 (Score: 5.4946377E-5)
Perl-based flexible backup system that can use dump/afio/cpio/tar
A flexible backup tool Features: o Easy to configure o Uses dump, afio, GNU tar, cpio, pax, or zip archivers o Full and numbered levels of incremental backup (acts like "dump") o Compression and buffering options for all backup types o Does remote filesystems (over rsh/ssh; no special service) o Can backup only files not owned by rpm, or changed from rpm version o Writes to tapes, on-disk archive files, or on-disk directory trees o Keeps a table of contents so you know archives are on each tape o Nice log files You can get additional information about remote backup strategies using SSH at http://www.sysfault.org/flexbackup.html