U-Boot loader and related files for Raspberry Pi 2
To install this bootloader, copy ALL the files in the share/u-boot/u-boot-rpi2
directory to the first partition, formatted as FAT32, on an SD card.
This version is patched so that:
* ELF and API features are enabled.
* The default environment is trimmed to just what's needed to boot.
* The saveenv command writes to the file uboot.env on the FAT partition.
For information about running FreeBSD on RaspberryPi, see
For general information about U-Boot see WWW: http://www.denx.de/wiki/U-Boot
STF::Dispatcher::PSGI implements the basic STF Protocol
(http://stf-storage.github.com) dispatcher component. It does not know
how to actually store or retrieve data, so you must implement that
portion yourself.
The reason this exists is mainly to allow you to testing systems that
interact with STF servers. For example, setting up the main STF
implementation is quite a pain if all you want to do is to test your
application, but with this module, you can easily create a dummy STF
dispatcher.
This manual page documents briefly the checklink command, a.k.a. the W3C
Link Checker.
checklink is a program that reads an HTML or XHTML document, extracts a
list of anchors and lists and checks that no anchor is defined twice and
that all the links are dereferenceable, including the fragments. It warns
about HTTP redirects, including directory redirects, and can check
recursively a part of a web site.
The program can be used either as a command line tool or as a CGI script.
Mod_authnz_external is an Apache module used for authentication. The Apache HTTP
Daemon can be configured to require users to supply logins and passwords
before accessing pages in some directories. Authentication is the process of
checking if the password given is correct for a user. Apache has standard
modules for authenticating out of several different kinds of databases.
Mod_authnz_external is a flexible tool for creating authentication systems based
on other databases.
This port gives the same funcionality as mod_auth_external, but over apache 2.2.
Mod_authnz_external is an Apache module used for authentication. The Apache HTTP
Daemon can be configured to require users to supply logins and passwords
before accessing pages in some directories. Authentication is the process of
checking if the password given is correct for a user. Apache has standard
modules for authenticating out of several different kinds of databases.
Mod_authnz_external is a flexible tool for creating authentication systems based
on other databases.
This port gives the same funcionality as mod_auth_external, but over apache 2.4.
Rancid monitors a router's (or device's) configuration, including software
and hardware (cards, serial numbers, etc), using CVS. Rancid currently
supports Bay routers, Cisco routers, Juniper routers, Catalyst switches,
Foundry switches, Redback NASs, ADC EZT3 muxes, MRTd (and thus likely IRRd),
Alteon switches, HP Procurve switches, Hitachi routers.
Rancid logs into each of the devices in a router table file, runs various
commands, chomps the output, and emails any differences from the previous
collection to a mail list.
A looking glass is also included with rancid, based on Ed Kern's in use on
http://nitrous.digex.net/. Rancid version has added functions, supports Cisco,
Juniper, and Foundry and uses the login scripts that come with rancid;
so it can use rsh, telnet, or ssh to connect to your router(s).
Rancid monitors a router's (or device's) configuration, including software
and hardware (cards, serial numbers, etc), using CVS. Rancid currently
supports Bay routers, Cisco routers, Juniper routers, Catalyst switches,
Foundry switches, Redback NASs, ADC EZT3 muxes, MRTd (and thus likely IRRd),
Alteon switches, HP Procurve switches, Hitachi routers.
Rancid logs into each of the devices in a router table file, runs various
commands, chomps the output, and emails any differences from the previous
collection to a mail list.
A looking glass is also included with rancid, based on Ed Kern's in use on
http://nitrous.digex.net/. Rancid version has added functions, supports Cisco,
Juniper, and Foundry and uses the login scripts that come with rancid;
so it can use rsh, telnet, or ssh to connect to your router(s).
Common Data Format (CDF) is a conceptual data abstraction for storing
multi-dimensional data sets. The basic component of CDF is a software
programming interface that is a device independent view of the CDF data
model. The application developer is insulated from the actual physical
file format for reasons of conceptual simplicity, device independence,
and future expandability. CDF files created on any given platform can
be transported to any other platform on to which CDF is ported and used
with any CDF tools or layered applications. A more detailed introduction
to CDF can be found in the CDF User's Guide.
A comparison between CDF, netCDF, HDF and HDF5 is available at
<http://cdf.gsfc.nasa.gov/html/FAQ.html>.
relaxconf contains a set of text menu based utilities for configuring RelaxBSD
(a LiveCD system base on FreeBSD),they're also useful for FreeBSD user.
relaxconf: The main menu, allow the following utilities.
relaxsnddetect: Auto detects audio cards (if present) and loads
appropriate modules.
relaxmountdisk: Auto mount other file systems (such as ufs,msdosfs,
ntfs,ext2fs).
relax[u]mountusb: Auto mount/umount USB removable storage.
relaxnetconf: Allow the user to setting network interface such as
ppp(pppoe),ethernet interface.
relaxxconf: Allow the user to generating an xorg.conf file for use
with Xorg(also XFree86).
relaxlangconf: Allow the user to appoint the locale language.
- Only for LiveCD:
relaxsavesetting: Allows user to save preferences in a compressed file.
relaxloadsetting: Auto seek and load preference save file in a partition.
relaxmediabackup: Backup your person data.
relaxrestore: Restore your person data.
relaxinstaller: Launch BSD/RelaxBSD Installer to install LiveCD.
http://sourceforge.net/projects/relaxbsd
This is a set of two keyboards that provides a single implementation for many
Roman writing systems across Africa, based on results compiled from data from
Benin, Burkina Faso, Cameroon, Chad, Cote d'Ivoire, Nigeria, Senegal and Togo.
The keyboards are written in Keyman keyboard language and developed by SIL
Non-Roman Script Initiative (NRSI). The software is distributed under the
X11-style license (http://scripts.sil.org/X11License).
This port installs the keyboard so that it can be used through SCIM or
IBus KMFL IMEngine (textproc/scim-kmfl-imengine, textproc/ibus-kmfl).
Two layouts are provided:
* mnemonic layout for any keyboard (using deadkeys);
* positional layout for US keyboard (using deadkeys and/or shift-states, i.e.
RALT and LALT keys).