The Kaa Media Repository is a set of python modules related to
media.
Kaa modules are based on parts from Freevo and modules created for
MeBox. Kaa exists to encourage code sharing between these projects,
and to serve as an umbrella for several previously disparate
media-related modules in order to make them available from one
(unique) namespace.
Kaa provides a base module that implements the common features
needed for application development, such as mainloop management,
timers, signals, callbacks, file descriptor monitors, etc. Kaa's
other modules provide specific media-related functionality, such
as retrieving metadata on arbitrary media files (kaa.metadata,
previously called mmpython), Python wrappers for Imlib2, Xine, and
Evas, and many other high level APIs for easily creating applications
that deal with video and audio.
Kaa is named after the python character in the Jungle Book by Rudyard
Kipling.
The Kaa Media Repository is a set of python modules related to
media.
Kaa modules are based on parts from Freevo and modules created for
MeBox. Kaa exists to encourage code sharing between these projects,
and to serve as an umbrella for several previously disparate
media-related modules in order to make them available from one
(unique) namespace.
Kaa provides a base module that implements the common features
needed for application development, such as mainloop management,
timers, signals, callbacks, file descriptor monitors, etc. Kaa's
other modules provide specific media-related functionality, such
as retrieving metadata on arbitrary media files (kaa.metadata,
previously called mmpython), Python wrappers for Imlib2, Xine, and
Evas, and many other high level APIs for easily creating applications
that deal with video and audio.
Kaa is named after the python character in the Jungle Book by Rudyard
Kipling.
The Kaa Media Repository is a set of python modules related to
media.
Kaa modules are based on parts from Freevo and modules created for
MeBox. Kaa exists to encourage code sharing between these projects,
and to serve as an umbrella for several previously disparate
media-related modules in order to make them available from one
(unique) namespace.
Kaa provides a base module that implements the common features
needed for application development, such as mainloop management,
timers, signals, callbacks, file descriptor monitors, etc. Kaa's
other modules provide specific media-related functionality, such
as retrieving metadata on arbitrary media files (kaa.metadata,
previously called mmpython), Python wrappers for Imlib2, Xine, and
Evas, and many other high level APIs for easily creating applications
that deal with video and audio.
Kaa is named after the python character in the Jungle Book by Rudyard
Kipling.
naim is a console client for AOL Instant Messenger (AIM), AOL I Seek You
(ICQ), Internet Relay Chat (IRC), and The lily CMC.
It includes unique features like zero-configuration peer to peer encryption,
automatic message queueing, and incoming message modification (to correct
common spelling mistakes and expand common abbreviations; see /help filter).
It also includes powerful dynamic module support, allowing developers to
modify all major aspects of naim's behavior.
When combined with GNU Screen, naim is great to use as a chat client as
well as an answering machine. Individual users can detach, log out, pack
up and go home, then log back in from anywhere on the Internet to resume
their naim session.
Nstreams is a program which analyzes the streams that occur on a network. It
displays which streams are generated by the users between several networks,
and between the networks and the outside. It can optionally generate the
ipchains or ipfw rules that will match these streams, thus only allowing what
is required for the users, and nothing more.
Nstreams can parse the tcpdump output, or the files generated with the -w
option of tcpdump. It can also directly sniff the data that occurs on the
network.
This product was designed by HSC and coded by Renaud Deraison
(deraison@cvs.nessus.org), author of the Nessus software (www.nessus.org). It
is available for free and under GNU license.
The nettest and nettestd commands invoke client and server
programs that are used for timing data throughput of vari-
ous methods of interprocess communication. For TCP and
OSI connections, the nettest program establishes a connec-
tion with the nettestd program, and then it does count
writes of size bytes, followed by count reads of size
bytes. For UDP, the nettest program performs only writes;
reads are not performed. The nettestd program, if used
with UDP connections, reads the data packets and prints a
message for each data packet it receives. The number and
size of the reads and writes may not correlate with the
number and size of the actual data packets that are trans-
ferred; it depends on the protocol that is chosen. If you
append an optional k (or K) to the size, count, or bufsize
value, the number specified is multiplied by 1024.
Net::Frame is a fork of Net::Packet. The goal here was to greatly
simplify the use of the frame crafting framework. Net::Packet does
many things undercover, and it was difficult to document all the thingies.
Also, Net::Packet may suffer from unease of use, because frames were
assembled using layers stored in L2, L3, L4 and L7 attributes. Net::Frame
removes all this, and is splitted in different modules, for those who only
want to use part of the framework, and not whole framework.
Finally, anyone can create a layer, and put it on his CPAN space, because
of the modularity Net::Frame offers. For an example,
see Net::Frame::Layer::ICMPv4 on my CPAN space.
A pure Python network address representation and manipulation library.
netaddr provides a Pythonic way of working with:
- IPv4 and IPv6 addresses and subnets
- MAC addresses, OUI and IAB identifiers, IEEE EUI-64 identifiers
- Arbitrary (non-aligned) IP address ranges and IP address sets
- Various non-CIDR IP range formats such as nmap and glob-style formats
Included are routines for:
- Generating, sorting and summarizing IP addresses and networks
- Performing easy conversions between address notations and formats
- Detecting, parsing and formatting network address representations
- Performing set-based operations on groups of IP addresses and subnets
- Working with arbitrary IP address ranges and formats
- Accessing OUI and IAB organisational information published by IEEE
- Accessing IP address and block information published by IANA
API documentation for the latest release is available here:
https://pythonhosted.org/netaddr/
tcpmssd was written by Ruslan Ermilov <ru@FreeBSD.org> based on work
done by Patrick Bihan-Faou <patrick@mindstep.com>.
tcpmssd is a divert(4) program that adjusts outgoing TCP data so that
the requested segment size is not greater than the amount allowed by
the interface MTU.
This is necessary in many setups to avoid problems caused by routers
that drop ICMP Datagram Too Big messages. Without these messages,
the originating machine sends data, it passes the rogue router then
hits a machine that has an MTU that is not big enough for the data.
Because the IP Don't Fragment option is set, this machine sends an
ICMP Datagram Too Big message back to the originator and drops the
packet. The rogue router drops the ICMP message and the originator
never gets to discover that it must reduce the fragment size or drop
the IP Don't Fragment option from its outgoing data.
tcptraceroute is a traceroute implementation using TCP packets.
The more traditional traceroute(8) sends out either UDP or ICMP ECHO
packets with a TTL of one, and increments the TTL until the destination
has been reached. By printing the gateways that generate ICMP time
exceeded messages along the way, it is able to determine the path
packets are taking to reach the destination.
The problem is that with the widespread use of firewalls on the modern
Internet, many of the packets that traceroute(8) sends out end up being
filtered, making it impossible to completely trace the path to the
destination. However, in many cases, these firewalls will permit inbound
TCP packets to specific ports that hosts sitting behind the firewall are
listening for connections on. By sending out TCP SYN packets instead of
UDP or ICMP ECHO packets, tcptraceroute is able to bypass the most
common firewall filters.