This is CFS, Matt Blaze's Cryptographic File System. It provides
transparent encryption and decryption of selected directory trees.
It is implemented as a user-level NFS server and thus does not
require any kernel modifications.
For an overview of how to use it, read "${PREFIX}/share/doc/cfs/notes.ms"
and the manual pages. There is a paper describing CFS at:
http://www.crypto.com/papers/cfs.pdf
This is a crypto library for Ada with a nice API and is written for the
i386 and x86_64 hardware architecture.
Symmetric cryptography supported:
* Blockciphers: AES, Twofish, 3DES, Serpent
* Hash functions: SHA-1, SHA-256, SHA-384, SHA-512, Whirlpool
* MACs: RMAC, HMAC, CMAC
* Modes of operation: BPS, CFB, Ctr, OFB
* Authenticated Encryption Schemes: OCB, SIV, McOE
Assymmetric cryptography supported:
* DSA signature scheme
* OEAP-RSA
* ECDSA, ECDH
Unsigned big number library features:
* Primary cyclic group arithmetic (Z_p)
* Binary Field arithmetic support
* Elliptic Curve arithmetic
Sudo runs commands as another user, provided the system sudo
implementation is setup to enable this. This does not allow running
applications securely, simply it allows the programmer to run a
program as another user (suid) using the sudo tools rather than
suidperl. Suidperl is not generally recommended for secure operation
as another user. While sudo itself is a single point tool to enable
one user to execute commands as another sudo does not itself make you
any more or less secure.
Wapiti allows you to audit the security of your web applications.
It performs "black-box" scans, i.e. it does not study the source code of
the application but will scans the webpages of the deployed webapp,
looking for scripts and forms where it can inject data.
Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to
see if a script is vulnerable.
The Spreadsheet::WriteExcel module can be used to create
a cross-platform Excel binary file. Multiple worksheets can be added
to a workbook and formatting can be applied to cells. Text, numbers,
formulas, hyperlinks and images can be written to the cells.
The Excel file produced by this module is compatible with Excel 5, 95,
97, 2000, 2002 and 2003, also Gnumeric and OpenOffice.
This module cannot be used to write to an existing Excel file.
sinatra-url-for constructs absolute paths and full URLs for
handlers in a Sinatra application. Assuming that your application
is running on example.com, and that it has been mapped to /myapp,
you should be able call url_for from within a handler as follows:
url_for "/" # Returns "/myapp/"
url_for "/foo" # Returns "/myapp/foo"
url_for "/foo", :full # Returns "http://example.com/myapp/foo"
Bitstream Cyberbit is a TrueType font. It is an international font, containing
characters from many languages. Each character is encoded with its Unicode
value, according to Unicode 2.0 standards.
Cyberbit was developed by Bitstream to provide Unicode Consortium members with
a test font. It is therefore distributed freely to customers that need advanced
multilingual fonts for testing and other non-commercial uses. Customers that
wish to use Cyberbit for other purposes must license the font from Bitstream.
This a re-port of a perl interface to Tk8.4 (John Ousterhout's production
release).
Perl API is essentially the same as Tk800.025 but has not
been verified as compliant.
It also includes all the C code parts of Tix8.1.4 from SourceForge.
The perl code corresponding to Tix's Tcl code is not fully implemented.
This version (Tk804.025) is only likely to work with perl5.8+.
[ excerpt taken from distfile's README ]
Dolly is used to clone the installation of one machine to (possibly
many) other machines. It can distribute image-files (even gnu-zipped),
partitions or whole hard disk drives to other partitions or hard
disk drives. As it forms a "virtual TCP ring" to distribute data,
it works best with fast switched networks (we were able to clone a
2 GB Windows NT partition to 15 machines in our cluster over Gigabit
Ethernet in less than 4 minutes).
As dolly clones whole partitions block-wise it works for most
filesystems. We used it to clone partitions of the following type:
Linux, Windows NT, Oberon, Solaris (most of our machines have multi
boot setups). We have a small (additional) Linux installation on
all of our machines or use a small one-floppy-disk-linux (e.g.
muLinux) to do the cloning. On newer machines we use PXE to boot a
small system in a RAM disk. From that system we then clone the hard
disks in the machines.
Provides an object-oriented interface to either the POSIX mmap() or
Win32 equivalent APIs to memory map a file into a process's address
space for general memory access. IPC::Mmap provides only a minimal
interface without the additional overhead of tie'd variables or
locking enforced in other modules (e.g., Sys::Mmap, Win32::MMF); hence,
the application is responsible for performing read()'s and write()'s
on the IPC::Mmap object, and calling any needed lock() and unlock()
methods, as required by concurrent processes.
Memory mapped files provide an alternate shared memory mechanism for
multiple processes. The technique maps the OS's file system buffers
for a given file into each mmap()'ing process's virtual memory space,
thereby permitting each process to essentially share the same physical
memory. Refer to the excellent "Advanced Programming in the UNIX
Environment", Stevens et al., Addison-Wesley Publisher for a detailed
reference on the POSIX implementation. IPC::Mmap provides OS-agnostic
wrappers for both the POSIX and Win32 memory mapped file capabilities.