Ports 搜索

共有17,773项符合comment.zh_CN%3A%E6%8E%A7%E5%88%B6%E5%8F%B0的查询结果,以下是第1,8411,850项(搜索用时0.008秒)
net-mgmt/weplab-0.1.5 (Score: 0.0024714195)
WepLab is a tool designed to teach how WEP works
WepLab is a tool designed to teach how WEP works, what different vulnerabilities it has, and how they can be used in practice to break a WEP protected wireless network. So far, WepLab more than a Wep Key Cracker, is a Wep Security Analyzer designed from an educational point of view.
net/Net-Ifconfig-Wrapper-0.14 (Score: 0.0024714195)
Provides a unified way to configure network interfaces
Perl module which provides a unified way to configure network interfaces.
net/Net-LDAP-Makepath-1.0.1 (Score: 0.0024714195)
Provides a method for creating paths in LDAP simply
Net::LDAP::Makepath - Provides a methode for creating paths in LDAP simply.
net/Net_Finger-1.0.1 (Score: 0.0024714195)
PEAR class that provides a tool for querying finger servers
PEAR::Net_Finger class provides a tool for querying finger servers.
net/tcpsplit-0.2 (Score: 0.0024714195)
Breaks a libpcap trace along TCP connection boundaries
The tcpsplit utility breaks a single libpcap packet trace into some number of sub-traces, breaking the trace along TCP connection boundaries so that a TCP connection doesn't end up split across two sub-traces. This is useful for making large trace files tractable for in-depth analysis and for subsetting a trace for developing analysis on only part of a trace.
security/libkpass-5 (Score: 0.0024714195)
Library for a reading/writing KeePass 1.x DB
Libkpass is a from-scratch C implementation of reading and writing KeePass 1.x format password databases.
security/pbnj-2.04 (Score: 0.0024714195)
Suite of tools to monitor changes on a network
PBNJ is a network suite to monitor changes that occur on a network over time. It does this by checking for changes on the target machine(s), which includes the details about the services running on them as well as the service state. PBNJ parses the data from a scan and stores it in a database. PBNJ uses Nmap to perform scans.
security/softhsm-1.3.7 (Score: 0.0024714195)
Software implementation of a Hardware Security Module (HSM)
SoftHSM is an implementation of a cryptographic store accessible through a PKCS #11 interface. You can use it to explore PKCS #11 without having a Hardware Security Module. It is being developed as a part of the OpenDNSSEC project. SoftHSM uses Botan for its cryptographic operations.
security/softhsm-2.1.0 (Score: 0.0024714195)
Software implementation of a Hardware Security Module (HSM)
SoftHSM is an implementation of a cryptographic store accessible through a PKCS #11 interface. You can use it to explore PKCS #11 without having a Hardware Security Module. It is being developed as a part of the OpenDNSSEC project. SoftHSM Version 2 is using openssl for its cryptographic operations.
sysutils/fdupes-1.6.1 (Score: 0.0024714195)
Fdupes is a program for identifying or deleting duplicate files
FDUPES is a program for identifying or deleting duplicate files residing within specified directories.