Ports Search

Results 3,5913,600 of 5,886 for /net-im/.(0.005 seconds)
science/paida-3.2.1.2.10 (Score: 0.0070083328)
Pure Python scientific analysis package
Description: PAIDA is pure Python scientific analysis package and implements AIDA (Abstract Interfaces for Data Analysis). The main features are: - Pure Python! (so works on both Python and Jython) - Creating/Plotting the histogram, ntuple, profile and cloud - Fitting parameter optimization with constraints and its parabolic and asymmetric error evaluation - XML based storing
science/ws2300-1.9 (Score: 0.0070083328)
Driver for the LaCrosse WS-2300 weather station
Ws2300 manipulates the LaCrosse WS-2300 weather station via its RS232 interface. It can read and write values, and can continuously log data from WS-2300 to a file or SQL database.
security/crank-0.2.1 (Score: 0.0070083328)
CRyptANalysis toolKit
Crank is short for "CRyptANalysis toolKit", and its overall purpose is to provide a powerful and extensible environment for solving classical (pen-and-paper) ciphers, providing as much automation as possible. Classical ciphers include common schemes like monoalphabetic substitutions, where each letter of the alphabet is mapped to another (usually different) letter consistently through the text. The first version of Crank is restricting itself to these special ciphers. Other algorithms forever devoid of Crank's attentions include Enigma, RSA, DES, MurkelFish, or anything else invented after 1900. They're hard(er).
security/denyhosts-2.6 (Score: 0.0070083328)
Script to thwart ssh attacks
DenyHosts is a script intended to be run by *ix system administrators to help thwart ssh server attacks. If you've ever looked at your ssh log (/var/log/auth.log ) you may be alarmed to see how many hackers attempted to gain access to your server. Denyhosts helps you: - Parses /var/log/auth.log to find all login attempts - Can be run from the command line, cron or as a daemon (new in 0.9) - Records all failed login attempts for the user and offending host - For each host that exceeds a threshold count, records the evil host - Keeps track of each non-existent user (eg. sdada) when a login attempt failed. - Keeps track of each existing user (eg. root) when a login attempt failed. - Keeps track of each offending host (hosts can be purged ) - Keeps track of suspicious logins - Keeps track of the file offset, so that you can reparse the same file - When the log file is rotated, the script will detect it - Appends /etc/hosts.allow - Optionally sends an email of newly banned hosts and suspicious logins. - Resolves IP addresses to hostnames, if you want
security/clamav-0.99.2 (Score: 0.0070083328)
Command line virus scanner written entirely in C
This the stable version of Clam Antivirus. Clam Antivirus is command line virus scanner written entirely in C and its database is kept up to date. It also detects polymorphic viruses, scans compressed files and supported by AMaViS. Optionally you can use the clamav-milter interface to connect clamav with sendmail.
security/doorman-0.81 (Score: 0.0070083328)
Port knocking implementation, both daemon and client
Doorman is a port knocking implementation which allows a server to run silently, invisibly, with all TCP ports closed except to those who know... the secret knock!
security/bcrypt-1.1 (Score: 0.0070083328)
Cross-platform blowfish encryption utility
Bcrypt is a blowfish file encryption utility which aims for cross-platform portability. In addition to providing 448-bit encryption, bcrypt overwrites input files with random garbage before deletion in order to make low-level data recovery much more difficult.
security/bfbtester-2.0.1 (Score: 0.0070083328)
Security tool for testing binaries for overflows
BFBTester will perform checks of single and multiple argument command line overflows and environment variable overflows. BFBTester will also watch for tempfile creation activity to alert the user of any programs using unsafe tempfile names.
security/fswatch-0.02.b5 (Score: 0.0070083328)
File system checksum checker
fswatch: - is a utility to guard changes in a file system. - is composed of three simple programs: fswbuild, fswcmp, fswshow. fswbuild builds a file system information database. fswcmp compares two database files and returns what changes a in file system have been introduced. fswshow shows contents of database file. a file information database is platform independent. - can collect the following information about files (and directories): inode, links, uid, gid, mode, size, flags, ctime, checksum (sha1) ; and can show which files were added, deleted or changed. - is one of many similar utilities. the main difference is the configuration. you can define different settings for every directory in a directory tree. moreover, it is very small and fast.
security/gcipher-1.1 (Score: 0.0070083328)
Simple encryption tool
This is a simple encryption tool to work with home-grown encryption algorithms. It can run as either a GUI, a command-line application, or a network proxy.