IM (Internet Message) provides a series of user interface commands
(imput, imget, imls, ...) and backend Perl5 modules to integrate
E-mail and NetNews user interface. They are designed to be used both
from Mew version 1.x and on command line.
The folder style of IM is exactly the same as that of MH. So, you can
replace MH with this package without any migration works. Moreover,
you are able to operate your messages both by IM and MH with
consistent manner.
IM is copyrighted by IM developing team. You can redistribute it
and/or modify it under the modified BSD license.
Although you installed IM successfully, yet you must be initialized on
your home directory at once. Execute imsetup command with your account
after im installed.
% imsetup
F-Prot Antivirus for BSD Workstations utilizes the renowned F-Prot
Antivirus scanning engine for primary scan but has in addition to
that a system of internal heuristics devised to search for unknown
viruses.
This version of F-Prot is a command line on-demand scanner.
Please note that the license explicitly permits that F-Prot Antivirus
for BSD Workstations is free for personal users on personal
workstations. For any other use please consult their website for
licensing information.
F3 (Fight Flash Fraud or Fight Fake Flash) tests the full capacity
of a flash card (flash drive, flash disk, pendrive). It writes to
the card and then checks if it can read it. It will assure that
you haven't been sold a card with a smaller capacity than stated.
WARNING: All data on the tested disk might be lost!
U2F is an open 2-factor authentication standard that enables keychain devices,
mobile phones and other devices to securely access any number of web-based
services - instantly and with no drivers or client software needed
libp0f is the autotools version of p0f-2.x with support for 3rd-party
linkage. libp0f splits the core p0f functionality from the p0f-2.x
application. The p0f library is installed as libp0f.so so
p0f2 and libp0f can co-exist independantly.
The F-1 Spirit remake is mostly identical to the original Konami
classic F-1 Spirit game in that you first have to clear tracks in
a top-down view with stock cars, rally cars and so on by accumulating
points given for finishing in the first places until you actually
get to play the Formula 1 tracks.
Otherwise there are quite some enhancements, namely improved graphics,
improved music, more realistic physics, real shape shown in the
maps, camera rotation and zoom, split screen for up to four players,
(online) highscore tables and replay saving.
im-ja is a Japanese input module for GTK2.
Currently supported input modes are: hiragana, katakana, half-width
katakana, zenkaku, Canna, FreeWnn, and Kanji character recognition
(based on Kanjipad).
Conversion hotkeys, status window, preedit text colors, etc. can be
customized through a GUI. An optional applet is also included for the
gnome-panel which can be used to display and change the input method.
Tex2im is a simple tool that converts LaTeX formulas into high resolution
pixmap graphics for inclusion in text processors or presentations. I
encountered the problem that the formulas generated by the editors of common
office packages usually were the ugliest part of my scientific presentations;
on the other hand I didn't want to use latex for my transparencies. On the
latex side I'm aware of the slitex and foiltex packages, nevertheless I
consider them to be masochistic. EPS import can be nice, but commonly you get
either display or printing problems. Also, often its nice just to copy
formulas out of you latex documents.
from the README:
Passive OS fingerprinting is based on information coming from a remote host
when it establishes a connection to our system. Captured packets contain
enough information to identify the operating system. In contrast to active
scanners such as nmap and QueSO, p0f does not send anything to the host being
identified.
For more information, read Spitzner's text at:
http://www.enteract.com/~lspitz/finger.html .
from the maintainer:
Use of this program requires read access to the packet filtering
device, typically /dev/bpf0. Granting such access allows the users
who have it to put your Ethernet device into promiscuous mode and
sniff your network. See
http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
if you do not understand how this can be harmful. Running p0f with
no options will cause it to analyse packets intended for other
hosts.
from the README:
Passive OS fingerprinting is based on information coming from a remote host
when it establishes a connection to our system. Captured packets contain
enough information to identify the operating system. In contrast to active
scanners such as nmap and QueSO, p0f does not send anything to the host being
identified.
For more information, read Spitzner's text at:
http://www.enteract.com/~lspitz/finger.html .
from the maintainer:
Use of this program requires read access to the packet filtering
device, typically /dev/bpf0. Granting such access allows the users
who have it to put your Ethernet device into promiscuous mode and
sniff your network. See
http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
if you do not understand how this can be harmful. Running p0f with
no options will cause it to analyse packets intended for other
hosts.