Ports Search

Results 18,10118,110 of 18,669 for descr.zh_CN%3A%E9%81%8F%E5%88%B6%E5%9E%83%E5%9C%BE.(0.061 seconds)
multimedia/kaa-base-0.6.0 (Score: 2.3425835E-5)
Kaa Media Repository
The Kaa Media Repository is a set of python modules related to media. Kaa modules are based on parts from Freevo and modules created for MeBox. Kaa exists to encourage code sharing between these projects, and to serve as an umbrella for several previously disparate media-related modules in order to make them available from one (unique) namespace. Kaa provides a base module that implements the common features needed for application development, such as mainloop management, timers, signals, callbacks, file descriptor monitors, etc. Kaa's other modules provide specific media-related functionality, such as retrieving metadata on arbitrary media files (kaa.metadata, previously called mmpython), Python wrappers for Imlib2, Xine, and Evas, and many other high level APIs for easily creating applications that deal with video and audio. Kaa is named after the python character in the Jungle Book by Rudyard Kipling.
multimedia/kaa-imlib2-0.2.3 (Score: 2.3425835E-5)
Kaa Media Repository - imlib2 wrapper for python
The Kaa Media Repository is a set of python modules related to media. Kaa modules are based on parts from Freevo and modules created for MeBox. Kaa exists to encourage code sharing between these projects, and to serve as an umbrella for several previously disparate media-related modules in order to make them available from one (unique) namespace. Kaa provides a base module that implements the common features needed for application development, such as mainloop management, timers, signals, callbacks, file descriptor monitors, etc. Kaa's other modules provide specific media-related functionality, such as retrieving metadata on arbitrary media files (kaa.metadata, previously called mmpython), Python wrappers for Imlib2, Xine, and Evas, and many other high level APIs for easily creating applications that deal with video and audio. Kaa is named after the python character in the Jungle Book by Rudyard Kipling.
multimedia/kaa-metadata-0.7.7 (Score: 2.3425835E-5)
Kaa Media Repository - media file metadata parser
The Kaa Media Repository is a set of python modules related to media. Kaa modules are based on parts from Freevo and modules created for MeBox. Kaa exists to encourage code sharing between these projects, and to serve as an umbrella for several previously disparate media-related modules in order to make them available from one (unique) namespace. Kaa provides a base module that implements the common features needed for application development, such as mainloop management, timers, signals, callbacks, file descriptor monitors, etc. Kaa's other modules provide specific media-related functionality, such as retrieving metadata on arbitrary media files (kaa.metadata, previously called mmpython), Python wrappers for Imlib2, Xine, and Evas, and many other high level APIs for easily creating applications that deal with video and audio. Kaa is named after the python character in the Jungle Book by Rudyard Kipling.
net-im/naim-0.11.8.3.2 (Score: 2.3425835E-5)
Console ncurses-based AIM, ICQ, IRC, and Lily client
naim is a console client for AOL Instant Messenger (AIM), AOL I Seek You (ICQ), Internet Relay Chat (IRC), and The lily CMC. It includes unique features like zero-configuration peer to peer encryption, automatic message queueing, and incoming message modification (to correct common spelling mistakes and expand common abbreviations; see /help filter). It also includes powerful dynamic module support, allowing developers to modify all major aspects of naim's behavior. When combined with GNU Screen, naim is great to use as a chat client as well as an answering machine. Individual users can detach, log out, pack up and go home, then log back in from anywhere on the Internet to resume their naim session.
net-mgmt/nstreams-1.0.4 (Score: 2.3425835E-5)
Analyses network traffic and produces ipfw rules to allow it
Nstreams is a program which analyzes the streams that occur on a network. It displays which streams are generated by the users between several networks, and between the networks and the outside. It can optionally generate the ipchains or ipfw rules that will match these streams, thus only allowing what is required for the users, and nothing more. Nstreams can parse the tcpdump output, or the files generated with the -w option of tcpdump. It can also directly sniff the data that occurs on the network. This product was designed by HSC and coded by Renaud Deraison (deraison@cvs.nessus.org), author of the Nessus software (www.nessus.org). It is available for free and under GNU license.
net/nettest-92.11.09 (Score: 2.3425835E-5)
Performs client and server functions for timing data throughput
The nettest and nettestd commands invoke client and server programs that are used for timing data throughput of vari- ous methods of interprocess communication. For TCP and OSI connections, the nettest program establishes a connec- tion with the nettestd program, and then it does count writes of size bytes, followed by count reads of size bytes. For UDP, the nettest program performs only writes; reads are not performed. The nettestd program, if used with UDP connections, reads the data packets and prints a message for each data packet it receives. The number and size of the reads and writes may not correlate with the number and size of the actual data packets that are trans- ferred; it depends on the protocol that is chosen. If you append an optional k (or K) to the size, count, or bufsize value, the number specified is multiplied by 1024.
net/Net-Frame-1.16 (Score: 2.3425835E-5)
Base framework for frame crafting
Net::Frame is a fork of Net::Packet. The goal here was to greatly simplify the use of the frame crafting framework. Net::Packet does many things undercover, and it was difficult to document all the thingies. Also, Net::Packet may suffer from unease of use, because frames were assembled using layers stored in L2, L3, L4 and L7 attributes. Net::Frame removes all this, and is splitted in different modules, for those who only want to use part of the framework, and not whole framework. Finally, anyone can create a layer, and put it on his CPAN space, because of the modularity Net::Frame offers. For an example, see Net::Frame::Layer::ICMPv4 on my CPAN space.
net/netaddr-0.7.18 (Score: 2.3425835E-5)
Manipulation of IPv4, IPv6, CIDR, EUI and MAC network addresses
A pure Python network address representation and manipulation library. netaddr provides a Pythonic way of working with: - IPv4 and IPv6 addresses and subnets - MAC addresses, OUI and IAB identifiers, IEEE EUI-64 identifiers - Arbitrary (non-aligned) IP address ranges and IP address sets - Various non-CIDR IP range formats such as nmap and glob-style formats Included are routines for: - Generating, sorting and summarizing IP addresses and networks - Performing easy conversions between address notations and formats - Detecting, parsing and formatting network address representations - Performing set-based operations on groups of IP addresses and subnets - Working with arbitrary IP address ranges and formats - Accessing OUI and IAB organisational information published by IEEE - Accessing IP address and block information published by IANA API documentation for the latest release is available here: https://pythonhosted.org/netaddr/
net/tcpmssd-1.1 (Score: 2.3425835E-5)
Utility to correct requested TCP receive segment size
tcpmssd was written by Ruslan Ermilov <ru@FreeBSD.org> based on work done by Patrick Bihan-Faou <patrick@mindstep.com>. tcpmssd is a divert(4) program that adjusts outgoing TCP data so that the requested segment size is not greater than the amount allowed by the interface MTU. This is necessary in many setups to avoid problems caused by routers that drop ICMP Datagram Too Big messages. Without these messages, the originating machine sends data, it passes the rogue router then hits a machine that has an MTU that is not big enough for the data. Because the IP Don't Fragment option is set, this machine sends an ICMP Datagram Too Big message back to the originator and drops the packet. The rogue router drops the ICMP message and the originator never gets to discover that it must reduce the fragment size or drop the IP Don't Fragment option from its outgoing data.
net/tcptraceroute-1.5.b7 (Score: 2.3425835E-5)
Traceroute implementation using TCP packets
tcptraceroute is a traceroute implementation using TCP packets. The more traditional traceroute(8) sends out either UDP or ICMP ECHO packets with a TTL of one, and increments the TTL until the destination has been reached. By printing the gateways that generate ICMP time exceeded messages along the way, it is able to determine the path packets are taking to reach the destination. The problem is that with the widespread use of firewalls on the modern Internet, many of the packets that traceroute(8) sends out end up being filtered, making it impossible to completely trace the path to the destination. However, in many cases, these firewalls will permit inbound TCP packets to specific ports that hosts sitting behind the firewall are listening for connections on. By sending out TCP SYN packets instead of UDP or ICMP ECHO packets, tcptraceroute is able to bypass the most common firewall filters.