Ports Search

Results 10,93110,940 of 17,660 for descr%3A%22spam filter%22.(0.011 seconds)
ports-mgmt/portupgrade-2.4.14 (Score: 1.296674E-4)
FreeBSD ports/packages administration and management tool suite
Portupgrade is a tool to upgrade installed packages via ports or packages. You can upgrade installed packages without having to reinstall depending or dependent packages. It can automatically trace dependency chains up and down upgrading packages recursively. This package also includes the following utilities: portinstall: Helps you install new ports in a handy way. portcvsweb: Instantly lets you browse change history via CVSweb. portversion: Replaces pkg_version(1) and helps you upgrade packages with portupgrade(1). (runs much faster) portsclean: Cleans ports workdir's, unreferenced distfiles, old and orphan shared libraries, and stale packages. portsdb: Creates binary database from the ports INDEX. ports_glob: Expands ports globs. pkg_deinstall: Wraps pkg_delete(1) and provides additional features. pkg_fetch: Fetches packages from a remote site. pkg_glob: Expands package globs. pkg_which: Checks which package a file came from quickly. pkgdb: Manages and searches the package database. pkgdu: Display a disk usage for installed packages.
science/cdf3-3.3.0 (Score: 1.296674E-4)
Device independent view of the CDF data model
Common Data Format (CDF) is a conceptual data abstraction for storing multi-dimensional data sets. The basic component of CDF is a software programming interface that is a device independent view of the CDF data model. The application developer is insulated from the actual physical file format for reasons of conceptual simplicity, device independence, and future expandability. CDF files created on any given platform can be transported to any other platform on to which CDF is ported and used with any CDF tools or layered applications. A more detailed introduction to CDF can be found in the CDF User's Guide. A comparison between CDF, netCDF, HDF and HDF5 is available at <http://cdf.gsfc.nasa.gov/html/FAQ.html>.
science/svmlight-6.02 (Score: 1.296674E-4)
Implementation of Support Vector Machines (SVMs) in C
SVMlight is an implementation of Vapnik's Support Vector Machine [Vapnik, 1995] for the problem of pattern recognition, for the problem of regression, and for the problem of learning a ranking function. The optimization algorithms used in SVMlight are described in [Joachims, 2002a ]. [Joachims, 1999a]. The algorithm has scalable memory requirements and can handle problems with many thousands of support vectors efficiently. The software also provides methods for assessing the generalization performance efficiently. It includes two efficient estimation methods for both error rate and precision/recall. XiAlpha-estimates [Joachims, 2002a, Joachims, 2000b] can be computed at essentially no computational expense, but they are conservatively biased. Almost unbiased estimates provides leave-one-out testing. SVMlight exploits that the results of most leave-one-outs (often more than 99%) are predetermined and need not be computed [Joachims, 2002a].
security/fpm2-0.79 (Score: 1.296674E-4)
Program that allows you to securely store the passwords
Figaro's Password Manager 2 is a program that allows you to securely store the passwords using GTK2 interface. Features include: - Passwords are encrypted with the AES-256 algorithm. - Copy passwords or usernames to the clipboard/primary selection. - If the password is for a web site, FPM2 can keep track of the URLs of your login screens and can automatically launch your browser. In this capacity, FPM2 acts as a kind of bookmark manager. - You can teach FPM2 to launch other applications, and optionally pass hostnames, usernames or passwords to the command line. - FPM2 also has a password generator that can choose passwords for you. It allows you to determine how long the password should be, and what types of characters (lower case, upper case, numbers and symbols) should be used. You can even have it avoid ambiguous characters such as a capital O or the number zero. - Auto-minimise and/or auto-locking passwords database after configurable time to the tray icon.
security/keynote-2.3 (Score: 1.296674E-4)
Trust-Management System
KeyNote is a simple and flexible trust-management system designed to work well for a variety of large- and small- scale Internet-based applications. It provides a single, unified language for both local policies and credentials. KeyNote policies and credentials, called `assertions,' contain predicates that describe the trusted actions permitted by the holders of specific public keys. KeyNote assertions are essentially small, highly-structured programs. A signed assertion, which can be sent over an untrusted network, is also called a `credential assertion.' Credential assertions, which also serve the role of certificates, have the same syntax as policy assertions but are also signed by the principal delegating the trust. This is an example implementation of the KeyNote Trust-Management System as specified in IETF draft <draft-blaze-ietf-trustmgt-keynote-02.txt>.
security/libident-0.32 (Score: 1.296674E-4)
Small library to interface the ident protocol server (rfc1413)
COPYRIGHT ISSUES: This version of 'libident' is hereby released into the Public Domain. It may be distributed for a fee or without a fee. We only ask you not to pretend you wrote it. If you make any changes, please send sources or a diff of it to us (pen@lysator.liu.se or pell@lysator.liu.se), so we can keep _one_ unified version of libident available... COMMENTS: This is the second stab at a small library to interface to the Ident protocol server. Maybe this will work correctly on some machines.. :-) The ident-tester.c file is a small daemon (to be started from Inetd) that does an ident lookup on you if you telnet into it. Can be used to verify that your Ident server is working correctly. I'm currently running this "ident-tester" on port 114 at lysator.liu.se (130.236.254.1) if you wish to test your server.
security/Crypt-Tea_JS-2.23 (Score: 1.296674E-4)
Next gen Tiny Encryption Algorithm in Perl and Javascript
This module implements TEA, the Tiny Encryption Algorithm, and some Modes of Use, in Perl and JavaScript. The $key is a sufficiently longish string; at least 17 random 8-bit bytes for single encryption. Crypt::Tea_JS can be used for secret-key encryption in general, or, in particular, to communicate securely between browser and web-host. In this case, the simplest arrangement is for the user to enter the key into a JavaScript variable, and for the host to retrieve that user's key from a database. Or, for extra security, the first message (or even each message) between browser and host could contain a random challenge-string, which each end would then turn into a signature, and use that signature as the encryption-key for the session (or the reply).
security/tinc-1.0.28 (Score: 1.296674E-4)
Virtual Private Network (VPN) daemon
tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet. Because the tunnel appears to the IP level network code as a normal network device, there is no need to adapt any existing software. This tunnelling allows VPN sites to share information with each other over the Internet without exposing any information to others. A single tinc daemon can accept more than one connection at a time, thus making it possible to create larger virtual networks, because some limitations are circumvented. Instead of most other VPN implementations, tinc encapsulates each network packet in its own UDP packet, instead of encapsulating all into one TCP or even PPP over TCP stream. This results in lower latencies, less overhead, and in general better responsiveness and throughput. LICENSE: GPL3 or later with execption to link with OpenSSL
sysutils/bksh-1.7 (Score: 1.296674E-4)
Backup-only shell
bksh is a simple (some would say trivial) program designed to be used as a shell by ssh or rsh-like programs. All it does it to copy its input to a restricted set of backup files. It was made to allow administrators to create backup servers in potentially hostile environments without allowing full shell access to the server or the client. Features: - tape only or file & tape backups (compile-time config) - automatic file rotation allows keeping a history of backups - configurable number of files kept (static compile-time or dynamic) - allows naming of backup files on command line - works as a restricted shell to limit access to server - very simple and short ANSI C code, easy to audit
sysutils/disktool-2.0 (Score: 1.296674E-4)
XView sysadmin tool for monitoring diskfull situations
`disktool' is an XView program to monitor up to 64 filesystems simultaneously and alert you when a particular filesystem is low on space. disktool is set-up to "un-iconify" when a filesystem it is monitoring has reached its' user-definable "critical threshold". A Unix command can also be initiated when this threshold is reached. The command and un-iconifying can be repeated every so many polls, configurable from the cmdline or from the Properties pop-up. The properties pop-up is obtained by selecting any gauge with the right mouse button. The middle mouse button has also been mapped to force a filesystem poll to update the displayed data. `disktool' is a good sysadmin tool for monitoring diskfull situations to avoid datafile corruption.