Ports Search

Results 16,56116,570 of 17,754 for %E6%8E%A7%E5%88%B6%E5%8F%B0.(0.011 seconds)
print/xmbibtex-1.7 (Score: 4.578865E-5)
Reference manager based on the BibTeX file format
XmBibTeX is a Motif (LessTif) reference manager based on the BibTeX file format. It allows to add, delete, and edit references. The references can be saved in the BibTeX file format and also written on a LaTeX file that can be printed using LaTeX and BibTeX. References can be retrieved by several search strategies. Import of references from the Medline and Inspec file format is included. However, I found that the Medline file format is not unique. Up to now, there are import filters available for the "Ovid Medline", the "PubMed Medline" and for the "Spirs Medline" format. It would be nice if some people could write additional import filters for other file formats.
science/cdo-1.7.1 (Score: 4.578865E-5)
Climate Data Operators
CDO is a collection of command line Operators to manipulate and analyse Climate model Data. Supported file formats are GRIB, netCDF, SERVICE, EXTRA and IEG. There are more than 250 operators available. The following table gives a short overview about the main categories. * File information (info, sinfo, diff, ...) * File operations (copy, cat, merge, split*, ...) * Selection (selcode, selvar, sellevel, seltimestep, ...) * Missing values (setctomiss, setmisstoc, setrtomiss) * Arithmetic (add, sub, mul, div, ...) * Mathematical functions (sqrt, exp, log, sin, cos, ...) * Comparision (eq, ne, le, lt, ge, gt, ...) * Conditions (ifthen, ifnotthen, ifthenc, ifnotthenc) * Field statistic (fldsum, fldavg, fldstd, fldmin, fldmax, ...) * Vertical statistic (vertsum, vertavg, vertstd, vertmin, ...) * Time range statistic (timavg, yearavg, monavg, dayavg, ...) * Ensemble statistic (enssum, ensavg, ensstd, ensmin, ...) * Regression (detrend) * Field interpolation (remapbil, remapcon, remapdis, ...) * Vertical interpolation (ml2pl, ml2hl) * Time interpolation (inttime, intyear)
security/gringotts-1.2.10 (Score: 4.578865E-5)
GTK application to securely store sensitive data
Gringotts is an application to store sensitive data like passwords, pincodes, credit card numbers, etc. Features: * Fast, light GTK2 interface. * Good integration with GNOME, as well as all the other window managers. * High stress on safety & security. * Not only "normal" string passwords can be used, but any file can be the password to your data. * 8 encryption algorythms are available through the mcrypt library: RIJNDAEL-128 (AES), RIJNDAEL-256, SERPENT, TWOFISH, CAST 256, SAFER+, LOKI97, 3DES. * 2 160-bit hash algorythms, used to generate the key: SHA1, RIPEMD160. * 2 compression types, with 4 compression levels each: ZLib, BZip2. * Complete & easy management of entries' order. * Complete Search function. * Very intuitive usability, you won't need any manual. * It comes with a thread-safe C library, libGringotts, that can be used in any other project to save data in files in a simple and safe way.
security/ipsec-tools-0.8.2 (Score: 4.578865E-5)
KAME racoon IKE daemon, ipsec-tools version
racoon speaks IKE (ISAKMP/Oakley) key management protocol, to establish security association with other hosts. This is the IPSec-tools version of racoon. Enchancements: - Support of NAT-T and IKE fragmentation. - Support of many authentication algorithms. - Tons of bugfixes. Known issues: - Non-threaded implementation. Simultaneous key negotiation performance should be improved. - Cannot negotiate keys for per-socket policy. - Cryptic configuration syntax - blame IPsec specification too... - Needs more documentation. Design choice, not a bug: - racoon negotiate IPsec keys only. It does not negotiate policy. Policy must be configured into the kernel separately from racoon. If you want to support roaming clients, you may need to have a mechanism to put policy for the roaming client after phase 1 finishes.
security/nmap-7.25.b2 (Score: 4.578865E-5)
Port scanning utility for large networks
Nmap is a utility for network exploration and security auditing. It supports various types of host discovery (determine which hosts are up), many port scanning techniques for different protocols, version detection (determine service protocols and application versions listening behind ports), and TCP/IP stack fingerprinting (remote host OS or device identification). Nmap also offers flexible target and port specification, decoy/stealth scanning, sunRPC scanning, and much more. Also included is Ncat, the nc(1) work-a-like of the Nmap project. Refer to the separate port security/zenmap for those parts of the Nmap toolset which depend on python. The translated manual pages for Nmap are contained in security/nmap-i18n-man. See the web page and the Phrack Magazine article (Volume 7, Issue 51 September 01, 1997, article 11 of 17) http://nmap.org/p51-11.html
security/fwbuilder-5.1.0 (Score: 4.578865E-5)
Firewall Builder GUI and policy compilers
Firewall Builder consists of object-oriented GUI and set of policy compilers for various firewall platforms. In Firewall Builder, firewall policy is a set of rules, each rule consists of abstract objects which represent real network objects and services (hosts, routers, firewalls, networks, protocols). Firewall Builder helps user maintain database of objects and allows policy editing using simple drag-and-drop operations. Preferences and objects databases are stored in XML format. GUI and policy compilers are completely independent. Support for a new firewall platform can be added to GUI without any changes done to the program, although new policy compiler must be written. This provides for consistent abstract model and the same GUI for different firewall platforms. Currently three most popular free firewalls are supported: ipchains, iptables and ipfilter. Because of this, Firewall Builder can be used to manage firewalls built on variety of platforms including, but not limited to, Linux running ipchains or iptables and FreeBSD or Solaris running ipfilter.
security/cryptokit-1.6 (Score: 4.578865E-5)
Variety of cryptographic primitives for Objective Caml
[ excerpt from developer's www site ] The Cryptokit library for Objective Caml provides a variety of cryptographic primitives that can be used to implement cryptographic protocols in security-sensitive applications. The primitives provided include: Symmetric-key cryptography: AES, DES, Triple-DES, ARCfour, in ECB, CBC, CFB and OFB modes. Public-key cryptography: RSA encryption and signature; Diffie-Hellman key agreement. Hash functions and MACs: SHA-1, MD5, and MACs based on AES and DES. Random number generation. Encodings and compression: base 64, hexadecimal, Zlib compression. Additional ciphers and hashes can easily be used in conjunction with the library. In particular, basic mechanisms such as chaining modes, output buffering, and padding are provided by generic classes that can easily be composed with user-provided ciphers. More generally, the library promotes a "Lego"-like style of constructing and composing transformations over character streams.
security/Filter-Crypto-2.07 (Score: 4.578865E-5)
Create runnable Perl files encrypted with OpenSSL libcrypto
The Filter-Crypto distribution provides the means to convert your Perl files into an encrypted, yet still runnable, format to hide the source code from casual prying eyes. This is achieved using a Perl source code filter. The encrypted files, produced using the Filter::Crypto::CryptFile module automatically have one (unencrypted) line added to the start of them which loads the Filter::Crypto::Decrypt module. The latter is a Perl source code filter which decrypts the remaining (encrypted) part of the Perl file on-the-fly when it is run. See perlfilter if you want to know more about how Perl source code filters work. Encrypted files can also be produced more conveniently using the crypt_file script, or (if you also have the PAR module available) using the PAR::Filter::Crypto module. The latter can be utilised by the standard PAR tools to produce PAR archives in which your Perl files are encrypted.
security/Tie-EncryptedHash-1.24 (Score: 4.578865E-5)
Hashes (and objects based on hashes) with encrypting fields
Tie::EncryptedHash augments Perl hash semantics to build secure, encrypting containers of data. Tie::EncryptedHash introduces special hash fields that are coupled with encrypt/decrypt routines to encrypt assignments at STORE() and decrypt retrievals at FETCH(). By design, encrypting fields are associated with keys that begin in single underscore. The remaining keyspace is used for accessing normal hash fields, which are retained without modification. While the password is set, a Tie::EncryptedHash behaves exactly like a standard Perl hash. This is its transparent mode of access. Encrypting and normal fields are identical in this mode. When password is deleted, encrypting fields are accessible only as ciphertext. This is Tie::EncryptedHash's opaque mode of access, optimized for serialization.
security/pidentd-3.0.19 (Score: 4.578865E-5)
RFC1413 identification server
This is a program that implements the RFC1413 identification server. It was very much inspired by Dan Bernstein's original 'authd' (but unlike that program doesn't use 'netstat' to get some of the information) It uses the kernel information directly. (And is due to that fact a lot faster). Dan has now written another version of the 'authd' daemon that uses his 'kstuff' to read the kernel information. Unlike that daemon, this will use only normally available kernel access functions (and is due to that more limited in the different machines it support). Please note that this daemon used to be called pauthd but has changed name to better reflect what it does (and to conform to the new RFC).