This port contains packages from a near-minimal installation of CentOS 7
Linux. These packages, in conjunction with the Linux kernel module,
form the basis of the Linux compatibility environment. It is designed to
provide a nice user experience by using the FreeBSD configuration for
corresponding Linux stuff where possible. Because of this any work which
needs to chroot into the Linux base may not work as expected (no fallthrough
to the FreeBSD config possible).
This port contains packages from a near-minimal installation of CentOS 6
Linux. These packages, in conjunction with the Linux kernel module,
form the basis of the Linux compatibility environment. It is designed to
provide a nice user experience by using the FreeBSD configuration for
corresponding Linux stuff where possible. Because of this any work which
needs to chroot into the Linux base may not work as expected (no fallthrough
to the FreeBSD config possible).
The Institute of Electrical and Electronics Engineers (IEEE) assigns an
Organizational Unique Identifier (OUI) to manufacturers of network
interfaces. Each interface has a Media Access Control (MAC) address of six
bytes. The first three bytes are the OUI.
This module allows you to take a MAC address and turn it into the OUI and
vendor information. You can, for instance, scan a network, collect MAC
addresses, and turn those addresses into vendors. With vendor information,
you can often guess at what you are looking at (e.g. an Apple
product).
You can use this as a module as its individual functions, or call it as a
script with a list of MAC addresses as arguments. The module can figure it
out.
This module tries to persistently cache with DBM::Deep the OUI information
so it can avoid using the network. If it cannot load DBM::Deep, it uses a
normal hash (which is lost when the process finishes). You can preload
this cache with the load_cache() function. So far, the module looks in the
current working directory for a file named mac_oui.db to find the cache. I
need to come up with a way to let the user set that location.
Mutt is a small but very powerful text-based MIME mail client. Mutt
is highly configurable, and is well suited to the mail power user with
advanced features like key bindings, keyboard macros, mail threading,
regular expression searches and a powerful pattern matching language
for selecting groups of messages.
This is japanized development version.
see /usr/local/share/doc/mutt/README.JA-PATCH
-
IWASHITA Yoji
shuna@pop16.odn.ne.jp
F# is an open-source, strongly typed, multi-paradigm programming
language encompassing functional, imperative and object-oriented
programming techniques. F# is most often used as a cross-platform CLI
language, but can also be used to generate JavaScript and GPU code.
F# is developed by The F# Software Foundation and Microsoft. An open
source, cross-platform edition of F# is available from the F# Software
Foundation. F# is also a fully supported language in Visual Studio.
Other tools supporting F# development include Mono, MonoDevelop,
SharpDevelop and the WebSharper tools for JavaScript and HTML5 web
programming.
F# originated as a variant of ML and has been influenced by OCaml, C#,
Python, Haskell, Scala and Erlang.
mod_dosevasive is an evasive maneuvers module for Apache to provide evasive
action in the event of an HTTP DoS or DDoS attack or brute force attack.
It is also designed to be a detection and network management tool, and can be
easily configured to talk to ipchains, firewalls, routers, and etcetera.
mod_dosevasive presently reports abuses via email and syslog facilities.
Detection is performed by creating an internal dynamic hash table of IP
Addresses and URIs, and denying any single IP address from any of the
following:
* Requesting the same page more than a few times per second
* Making more than 50 concurrent requests on the same child per second
* Making any requests while temporarily blacklisted (on a blocking list)
This method has worked well in both single-server script attacks as well as
distributed attacks, but just like other evasive tools, is only as useful to
the point of bandwidth and processor consumption (e.g. the amount of bandwidth
and processor required to receive/process/respond to invalid requests), which
is why it's a good idea to integrate this with your firewalls and routers for
maximum protection.
This module instantiates for each listener individually, and therefore has a
built-in cleanup mechanism and scaling capabilities. Because of this per-child
design, legitimate requests are never compromised (even from proxies and NAT
addresses) but only scripted attacks. Even a user repeatedly clicking on
'reload' should not be affected unless they do it maliciously. mod_dosevasive
is fully tweakable through the Apache configuration file, easy to incorporate
into your web server, and easy to use.
This is autopano-sift-2.4 ported to plain "C"
The source is kept as close as possible to the original version.
It should have the same inputs and outputs as the original "C#" version
which is available in ports as graphics/autopano-sift
This will inject base classes to your module using the Class::C3 method
resolution order.
Please note: these are not plugins that can take precedence over methods
declared in MyModule. If you want something like that, consider
MooseX::Object::Pluggable.
[ excerpt taken from distfile's README ]
Dolly is used to clone the installation of one machine to (possibly
many) other machines. It can distribute image-files (even gnu-zipped),
partitions or whole hard disk drives to other partitions or hard
disk drives. As it forms a "virtual TCP ring" to distribute data,
it works best with fast switched networks (we were able to clone a
2 GB Windows NT partition to 15 machines in our cluster over Gigabit
Ethernet in less than 4 minutes).
As dolly clones whole partitions block-wise it works for most
filesystems. We used it to clone partitions of the following type:
Linux, Windows NT, Oberon, Solaris (most of our machines have multi
boot setups). We have a small (additional) Linux installation on
all of our machines or use a small one-floppy-disk-linux (e.g.
muLinux) to do the cloning. On newer machines we use PXE to boot a
small system in a RAM disk. From that system we then clone the hard
disks in the machines.
Gzip (GNU zip) is a compression utility designed to be a replacement
for compress. Its main advantages over compress are much better
compression and freedom from patented algorithms.