Ports Search

Results 6,7016,710 of 18,669 for descr.zh_CN%3A%E9%81%8F%E5%88%B6%E5%9E%83%E5%9C%BE.(0.017 seconds)
print/cups-bjnp-2.0 (Score: 2.3547228E-4)
CUPS backend for Canon USB over IP protocol
CUPS backend for the canon proprietary USB over IP network printing protocol, BJNP. This backend is based on reverse engineering using TCP/IP. It can be used with CUPS 1.2 - 1.7 (verified). This backend allows Cups to connect over the network to a Canon printers
print/ttf2pt1-3.4.4 (Score: 2.3547228E-4)
True Type Font to Postscript Type 1 Converter
TTF2PT1 is a modification of Andrew Weeks TTF2PFA True Type to Postscript Type 3 converter. Which will convert Most True Type Fonts to and Adobe Type 1 .pfa file. The files produced are in human readable form, which further needs to be encrypted with the t1utilities, to work with most software requiring type 1 fonts.
science/libxc-3.0.0 (Score: 2.3547228E-4)
Library of exchange-correlation functionals for DFT
Libxc is library of exchange-correlation functionals for density-functional theory. The aim is to provide a portable, well tested and reliable set of exchange and correlation functionals that can be used by all the ETSF codes and also other codes. In libxc you can find different types of functionals: LDA, GGA, hybrids, and mGGA (experimental).
security/afterglow-1.6.2 (Score: 2.3547228E-4)
Collection of graph-generating scripts
AfterGlow is a collection of scripts which facilitate the process of generating event graphs and treemaps. AfterGlow 1.x is written in Perl and generates output that can be read by GraphViz or LGL. All the scripts and other files for afterglow are installed in %%DATADIR%%
security/amavisd-new-2.10.1 (Score: 2.3547228E-4)
Mail scanner interface between mailer and content checkers
amavisd-new is a performance-enhanced daemonized version of amavis-perl Note that the installation is different than the original package, and the integration into your MTA can be different, so please read the README and INSTALL files very carefully. amavisd-new also supports SpamAssassin integration.
security/op-1.32 (Score: 2.3547228E-4)
Controlled privilege escalation tool
The op tool provides a flexible means for system administrators to grant access to certain root operations without having to give them full superuser privileges. Different sets of users may access different operations, and the security-related aspects of each operation can be carefully controlled.
security/Authen-SASL-Cyrus-0.13 (Score: 2.3547228E-4)
XS SASL Authentication
SASL is a generic mechanism for authentication used by several network protocols. Authen::SASL::Cyrus provides an implementation framework that all protocols should be able to share. The XS framework makes calls into the existing libsasl2.so shared library to perform SASL client connection functionality, including loading existing shared library mechanisms.
security/Crypt-Serpent-1.01 (Score: 2.3547228E-4)
Perl implementation of the Serpent encryption algorithm
Serpent was designed by Ross Anderson, Eli Biham and Lars Knudsen as a candidate for the Advanced Encryption Standard. It has been selected as one of the five finalists in the AES competition. Serpent is faster than DES and more secure than Triple DES. It provides users with a very high level of assurance that no shortcut attack will be found. To achieve this, the algorithm's designers limited themselves to well understood cryptography mechanisms, so that they could rely on the wide experience and proven techniques of block cipher cryptanalysis. The algorithm uses twice as many rounds as are necessary to block all currently known shortcut attacks. This means that Serpent should be safe against as yet unknown attacks that may be capable of breaking the standard 16 rounds used in many types of encryption today. However, the fact that Serpent uses so many rounds means that it is the slowest of the five AES finalists. But this shouldn't be an issue because it still outperforms Triple DES. The algorithm's designers maintain that Serpent has a service life of at least a century.
security/chrootuid-1.3 (Score: 2.3547228E-4)
Simple wrapper that combines chroot(8) and su(1) into one program
The chrootuid command combines chroot(8) and su(1) into one program, so that there is no need to have commands such as /usr/bin/su in the restricted environment. Access to the file system is restricted to the newroot subtree and privileges are restricted to those of the newuser account (which must be a known account in the unrestricted environment). See also jail(8)
security/Nmap-Scanner-1.0 (Score: 2.3547228E-4)
Perform and manipulate nmap scans using perl
This set of modules provides perl class wrappers for the network mapper (nmap) scanning tool (see http://www.insecure.org/nmap/). Using these modules, a developer, network administrator, or other techie can create perl routines or classes which can be used to automate and integrate nmap scans elegantly into new and existing perl scripts.