XmBibTeX is a Motif (LessTif) reference manager based on the BibTeX
file format. It allows to add, delete, and edit references. The
references can be saved in the BibTeX file format and also written on
a LaTeX file that can be printed using LaTeX and BibTeX. References
can be retrieved by several search strategies. Import of references
from the Medline and Inspec file format is included. However, I found
that the Medline file format is not unique. Up to now, there are
import filters available for the "Ovid Medline", the "PubMed Medline"
and for the "Spirs Medline" format. It would be nice if some people
could write additional import filters for other file formats.
CDO is a collection of command line Operators to manipulate and analyse Climate
model Data. Supported file formats are GRIB, netCDF, SERVICE, EXTRA and IEG.
There are more than 250 operators available. The following table gives a short
overview about the main categories.
* File information (info, sinfo, diff, ...)
* File operations (copy, cat, merge, split*, ...)
* Selection (selcode, selvar, sellevel, seltimestep, ...)
* Missing values (setctomiss, setmisstoc, setrtomiss)
* Arithmetic (add, sub, mul, div, ...)
* Mathematical functions (sqrt, exp, log, sin, cos, ...)
* Comparision (eq, ne, le, lt, ge, gt, ...)
* Conditions (ifthen, ifnotthen, ifthenc, ifnotthenc)
* Field statistic (fldsum, fldavg, fldstd, fldmin, fldmax, ...)
* Vertical statistic (vertsum, vertavg, vertstd, vertmin, ...)
* Time range statistic (timavg, yearavg, monavg, dayavg, ...)
* Ensemble statistic (enssum, ensavg, ensstd, ensmin, ...)
* Regression (detrend)
* Field interpolation (remapbil, remapcon, remapdis, ...)
* Vertical interpolation (ml2pl, ml2hl)
* Time interpolation (inttime, intyear)
Gringotts is an application to store sensitive data like passwords, pincodes,
credit card numbers, etc. Features:
* Fast, light GTK2 interface.
* Good integration with GNOME, as well as all the other window managers.
* High stress on safety & security.
* Not only "normal" string passwords can be used, but any file can be the
password to your data.
* 8 encryption algorythms are available through the mcrypt library:
RIJNDAEL-128 (AES), RIJNDAEL-256, SERPENT, TWOFISH, CAST 256, SAFER+, LOKI97,
3DES.
* 2 160-bit hash algorythms, used to generate the key: SHA1, RIPEMD160.
* 2 compression types, with 4 compression levels each: ZLib, BZip2.
* Complete & easy management of entries' order.
* Complete Search function.
* Very intuitive usability, you won't need any manual.
* It comes with a thread-safe C library, libGringotts, that can be used in any
other project to save data in files in a simple and safe way.
racoon speaks IKE (ISAKMP/Oakley) key management protocol, to
establish security association with other hosts.
This is the IPSec-tools version of racoon.
Enchancements:
- Support of NAT-T and IKE fragmentation.
- Support of many authentication algorithms.
- Tons of bugfixes.
Known issues:
- Non-threaded implementation. Simultaneous key negotiation performance
should be improved.
- Cannot negotiate keys for per-socket policy.
- Cryptic configuration syntax - blame IPsec specification too...
- Needs more documentation.
Design choice, not a bug:
- racoon negotiate IPsec keys only. It does not negotiate policy. Policy must
be configured into the kernel separately from racoon. If you want to
support roaming clients, you may need to have a mechanism to put policy
for the roaming client after phase 1 finishes.
Nmap is a utility for network exploration and security auditing.
It supports various types of host discovery (determine which hosts
are up), many port scanning techniques for different protocols,
version detection (determine service protocols and application
versions listening behind ports), and TCP/IP stack fingerprinting
(remote host OS or device identification). Nmap also offers
flexible target and port specification, decoy/stealth scanning,
sunRPC scanning, and much more.
Also included is Ncat, the nc(1) work-a-like of the Nmap project.
Refer to the separate port security/zenmap for those parts of the
Nmap toolset which depend on python. The translated manual pages
for Nmap are contained in security/nmap-i18n-man.
See the web page and the Phrack Magazine article (Volume 7, Issue 51
September 01, 1997, article 11 of 17) http://nmap.org/p51-11.html
Firewall Builder consists of object-oriented GUI and set of policy compilers
for various firewall platforms. In Firewall Builder, firewall policy is a set
of rules, each rule consists of abstract objects which represent real network
objects and services (hosts, routers, firewalls, networks, protocols).
Firewall Builder helps user maintain database of objects and allows policy
editing using simple drag-and-drop operations.
Preferences and objects databases are stored in XML format.
GUI and policy compilers are completely independent. Support for a new firewall
platform can be added to GUI without any changes done to the program, although
new policy compiler must be written. This provides for consistent abstract
model and the same GUI for different firewall platforms. Currently three most
popular free firewalls are supported: ipchains, iptables and ipfilter.
Because of this, Firewall Builder can be used to manage firewalls built on
variety of platforms including, but not limited to, Linux running ipchains or
iptables and FreeBSD or Solaris running ipfilter.
[ excerpt from developer's www site ]
The Cryptokit library for Objective Caml provides a variety of
cryptographic primitives that can be used to implement cryptographic
protocols in security-sensitive applications. The primitives provided
include:
Symmetric-key cryptography: AES, DES, Triple-DES, ARCfour, in ECB,
CBC, CFB and OFB modes. Public-key cryptography: RSA encryption and
signature; Diffie-Hellman key agreement. Hash functions and MACs:
SHA-1, MD5, and MACs based on AES and DES. Random number generation.
Encodings and compression: base 64, hexadecimal, Zlib compression.
Additional ciphers and hashes can easily be used in conjunction
with the library. In particular, basic mechanisms such as chaining
modes, output buffering, and padding are provided by generic classes
that can easily be composed with user-provided ciphers. More
generally, the library promotes a "Lego"-like style of constructing
and composing transformations over character streams.
The Filter-Crypto distribution provides the means to convert your Perl
files into an encrypted, yet still runnable, format to hide the source
code from casual prying eyes.
This is achieved using a Perl source code filter. The encrypted files,
produced using the Filter::Crypto::CryptFile module automatically have
one (unencrypted) line added to the start of them which loads the
Filter::Crypto::Decrypt module. The latter is a Perl source code filter
which decrypts the remaining (encrypted) part of the Perl file
on-the-fly when it is run. See perlfilter if you want to know more
about how Perl source code filters work.
Encrypted files can also be produced more conveniently using the
crypt_file script, or (if you also have the PAR module available) using
the PAR::Filter::Crypto module. The latter can be utilised by the
standard PAR tools to produce PAR archives in which your Perl files are
encrypted.
Tie::EncryptedHash augments Perl hash semantics to build secure, encrypting
containers of data. Tie::EncryptedHash introduces special hash fields that are
coupled with encrypt/decrypt routines to encrypt assignments at STORE() and
decrypt retrievals at FETCH(). By design, encrypting fields are associated with
keys that begin in single underscore. The remaining keyspace is used for
accessing normal hash fields, which are retained without modification.
While the password is set, a Tie::EncryptedHash behaves exactly like a standard
Perl hash. This is its transparent mode of access. Encrypting and normal fields
are identical in this mode. When password is deleted, encrypting fields are
accessible only as ciphertext. This is Tie::EncryptedHash's opaque mode of
access, optimized for serialization.
This is a program that implements the RFC1413 identification server. It
was very much inspired by Dan Bernstein's original 'authd' (but unlike
that program doesn't use 'netstat' to get some of the information) It
uses the kernel information directly. (And is due to that fact a lot
faster). Dan has now written another version of the 'authd' daemon that
uses his 'kstuff' to read the kernel information. Unlike that daemon,
this will use only normally available kernel access functions (and is due
to that more limited in the different machines it support). Please note
that this daemon used to be called pauthd but has changed name to better
reflect what it does (and to conform to the new RFC).