Description: PAIDA is pure Python scientific analysis package and implements
AIDA (Abstract Interfaces for Data Analysis). The main features are:
- Pure Python! (so works on both Python and Jython)
- Creating/Plotting the histogram, ntuple, profile and cloud
- Fitting parameter optimization with constraints and its parabolic and
asymmetric error evaluation
- XML based storing
Ws2300 manipulates the LaCrosse WS-2300 weather station via its RS232
interface. It can read and write values, and can continuously log data from
WS-2300 to a file or SQL database.
Crank is short for "CRyptANalysis toolKit", and its overall purpose is to
provide a powerful and extensible environment for solving classical
(pen-and-paper) ciphers, providing as much automation as possible. Classical
ciphers include common schemes like monoalphabetic substitutions, where each
letter of the alphabet is mapped to another (usually different) letter
consistently through the text. The first version of Crank is restricting
itself to these special ciphers. Other algorithms forever devoid of Crank's
attentions include Enigma, RSA, DES, MurkelFish, or anything else invented
after 1900. They're hard(er).
DenyHosts is a script intended to be run by *ix system administrators to
help thwart ssh server attacks.
If you've ever looked at your ssh log (/var/log/auth.log ) you may be alarmed
to see how many hackers attempted to gain access to your server.
Denyhosts helps you:
- Parses /var/log/auth.log to find all login attempts
- Can be run from the command line, cron or as a daemon (new in 0.9)
- Records all failed login attempts for the user and offending host
- For each host that exceeds a threshold count, records the evil host
- Keeps track of each non-existent user (eg. sdada) when a login attempt failed.
- Keeps track of each existing user (eg. root) when a login attempt failed.
- Keeps track of each offending host (hosts can be purged )
- Keeps track of suspicious logins
- Keeps track of the file offset, so that you can reparse the same file
- When the log file is rotated, the script will detect it
- Appends /etc/hosts.allow
- Optionally sends an email of newly banned hosts and suspicious logins.
- Resolves IP addresses to hostnames, if you want
This the stable version of Clam Antivirus.
Clam Antivirus is command line virus scanner written entirely in C
and its database is kept up to date. It also detects polymorphic
viruses, scans compressed files and supported by AMaViS.
Optionally you can use the clamav-milter interface to connect
clamav with sendmail.
Doorman is a port knocking implementation which allows a server to run
silently, invisibly, with all TCP ports closed except to those who know...
the secret knock!
Bcrypt is a blowfish file encryption utility which aims for cross-platform
portability.
In addition to providing 448-bit encryption, bcrypt overwrites input files with
random garbage before deletion in order to make low-level data recovery much
more difficult.
BFBTester will perform checks of single and multiple argument command
line overflows and environment variable overflows. BFBTester will also
watch for tempfile creation activity to alert the user of any programs
using unsafe tempfile names.
fswatch:
- is a utility to guard changes in a file system.
- is composed of three simple programs: fswbuild, fswcmp, fswshow. fswbuild
builds a file system information database. fswcmp compares two database files
and returns what changes a in file system have been introduced. fswshow shows
contents of database file. a file information database is platform
independent.
- can collect the following information about files (and directories): inode,
links, uid, gid, mode, size, flags, ctime, checksum (sha1) ; and can show
which files were added, deleted or changed.
- is one of many similar utilities. the main difference is the configuration.
you can define different settings for every directory in a directory tree.
moreover, it is very small and fast.
This is a simple encryption tool to work with home-grown encryption
algorithms. It can run as either a GUI, a command-line application, or
a network proxy.