The SHA module allows you to use the NIST SHA message digest algorithm
from within Perl programs.
The final message digest value is returned by the digest operation as
a 20-byte binary string. This operation delivers the result of
operations since the last new or reset operation. Once the operation
has been performed, the context must be reset before being used to
calculate another digest value.
This is a small command-line utility for encryption and decryption
using the principle of one-time pads (OTPs). One or more data files
given to pad are XORd with each other and with RNG output, resulting
in two or more output files. The output files are indistinguishable
from random noise, except that when the pad utility is used to XOR
them together again, the original data files may be recovered.
Jason Harris <jharris@widomaker.com>
Not all web applications are built in the same ways, and hence, many
must be analyzed individually. SPIKE Proxy is a professional-grade
tool for looking for application-level vulnerabilities in web
applications. SPIKE Proxy covers the basics, such as SQL Injection and
cross-site-scripting, but it's completely open Python infrastructure
allows advanced users to customize it for web applications that other
tools fall apart on.
This library is used to gain direct access to the functions exposed by Daniel
J. Bernstein's nacl library via libsodium or tweetnacl. It has been constructed
to maintain extensive documentation on how to use nacl as well as being
completely portable. The file in libnacl/__init__.py can be pulled out and
placed directly in any project to give a single file binding to all of nacl.
Simple command-line pseudo terminal manager:
allows to run coprocesses talking to each other thru their tty and/or pty.
Most useful to drive from scripts programs that want a tty, as in
cotty -d -- pppd silent 192.168.0.1:192.168.0.2 \
-- ssh -t root@remote pppd
This particular use has been obsoleted under Linux
(but probably not under the various free BSDs and proprietary Unices),
as it can be done without cotty with
pppd pty 'ssh -t root@remote pppd' silent 192.168.0.1:192.168.0.2
mhddfs - Multi HDD [FUSE] File System
File system for unifying several mount points into one
This FUSE-based file system allows mount points (or directories) to be
combined, simulating a single big volume which can merge several hard
drives or remote file systems. It is like unionfs, but can choose the
drive with the most free space to create new files on, and can move
data transparently between drives.
This is a daemon the uses the LM78/79, WINBond 83781/83782/83783/83626
or the ASUS 99127 hardware monitor chips to warn the operator when
something is out of range. The software is capable of monitoring up
to 3 temperatures, 3 fan speeds and 7 voltages. The configuration file
specifies which functions are active and their acceptable ranges.
With the healthdc companion program the status can be read from any
networked computer. The healthd daemon's network connection is protected
by libwrap and /etc/hosts.allow.
Interface for statvfs() and fstatvfs()
Unless you need access to the bsize, flag, and namemax values, you should
probably look at using Filesys::DfPortable or Filesys::Df instead.
The statvfs() and fstatvfs() functions will return a list of values, or
will return undef and set $! if there was an error.
The values returned are described in the statvfs header or the statvfs()
man page.
The module assumes that if you have statvfs(), fstatvfs() will also be
available.
This library allows you to manage schedule which has structure similar
to crontab(5) format. It offers methods to detect clash between
schedules (with or without duration considered), and can also tell when,
and how often they clash.
From the viewpoint of data structure, one major difference compared to
crontab(5) is a concept of duration. Each schedule has its own duration,
and clash detection can be done upon that.
-Anton
<tobez@FreeBSD.org>
Duplicity backs directories by producing encrypted tar-format volumes and
uploading them to a remote or local file server. Because duplicity uses
librsync, the incremental archives are space efficient and only record the
parts of files that have changed since the last backup. Because duplicity
uses GnuPG to encrypt and/or sign these archives, they will be safe from
spying and/or modification by the server.