Ports 搜索

共有18,669项符合descr.zh_CN%3A%E9%81%8F%E5%88%B6%E5%9E%83%E5%9C%BE的查询结果,以下是第6,0916,100项(搜索用时0.011秒)
security/Crypt-Anubis-1.0.4 (Score: 2.5742833E-4)
Crypt::CBC-compliant block cipher
Anubis is a variable-length key, 128-bit block cipher designed by Vincent Rijmen and Paulo S. L. M. Barreto. Anubis was submitted as a NESSIE candidate. Key length can be 128, 160, 192, 224, 256, 288, or 320 bits. The default key length in this implementation is 128 bits.
security/Crypt-Camellia_PP-0.02 (Score: 2.5742833E-4)
Pure Perl Camellia 128-bit block cipher module
Crypt::Camellia_PP is a pure perl implementation of Camellia, a 128-bit symmetrical block cipher with 128-bit, 192-bit, and 256-bit key from NTT and Mitsubishi Electric Corporation. It is one of the approved encryption methods to be used by European Union as well as specified in several Internet RFCs. See also: http://info.isl.ntt.co.jp/crypt/eng/camellia/index.html
security/OpenCA-PKCS7-0.9.1.1.1 (Score: 2.5742833E-4)
Perl extension for basic handling PKCS#7 Signatures
This module contains all functions needed for handling PKCS#7 signatures. It requires some parameters to be passed such as a reference to a OpenCA::OpenSSL instance. This module provides an interface to PKCS#7 structures, no specific crypto functions are performed (see the OpenCA::OpenSSL module for this).
security/net-ssh-gateway-1.2.0 (Score: 2.5742833E-4)
Establish Net::SSH connections through firewalls
Net::SSH::Gateway is a library for programmatically tunneling connections to servers via a single "gateway" host. It is useful for establishing Net::SSH connections to servers behind firewalls, but can also be used to forward ports and establish connections of other types, like HTTP, to servers with i restricted access. * Easily manage forwarded ports * Establish Net::SSH connections through firewalls
security/openvpn-2.3.12 (Score: 2.5742833E-4)
Secure IP/Ethernet tunnel daemon
OpenVPN is a robust, scalable and highly configurable VPN (Virtual Private Network) daemon which can be used to securely link two or more private networks using an encrypted tunnel over the internet. It can operate over UDP or TCP, can use SSL or a pre-shared secret to authenticate peers, and in SSL mode, one server can handle many clients.
security/yafic-1.2.2 (Score: 2.5742833E-4)
Yet Another File Integrity Checker, similar to Tripwire
yafic is Yet Another File Integrity Checker. yafic saves information about the state of a filesystem to a database. Later, yafic can be used to compare the current state of the filesystem against the saved database, letting you know of any changed, added, or removed files.
sysutils/afio-2.5 (Score: 2.5742833E-4)
Archiver and backup program with builtin compression
Afio makes cpio-format archives. It deals fairly gracefully with potential input data corruption. Supports multi-volume archives during interactive operation. Afio can make compressed archives that are much safer than compressed tar, or cpio archives. Afio has a tremendous number of options. Afio might be best used as an `archive engine' in a backup script.
sysutils/archivemount-0.6.1 (Score: 2.5742833E-4)
Mount archives with FUSE
Archivemount is a piece of glue code between libarchive (http://people.freebsd.org/~kientzle/libarchive/) and FUSE (http://fuse.sourceforge.net). It can be used to mount a (possibly compressed) archive (as in .tar.gz or .tar.bz2) and use it like an ordinary filesystem.
sysutils/cronic-3 (Score: 2.5742833E-4)
Shell script that handles cron error detection
Cronic is a small shim shell script for wrapping cron jobs so that cron only sends email when an error has occurred. Cronic defines an error as any non-trace error output or a non-zero result code. Cronic filters Bash execution traces (or anything matching PS4) from the error output, so jobs can be run with execution tracing to aid forensic debugging.
sysutils/ddpt-0.95 (Score: 2.5742833E-4)
dd tool that specializes in files that are block devices
The ddpt utility is a variant of the standard Unix command dd which copies files. The ddpt utility specializes in files that are block devices. For block devices that understand the SCSI command set, finer grain control over the copy may be available via a SCSI pass-through interface.