Ports Search

Results 1,2611,270 of 1,385 for /security/.(0.003 seconds)
devel/kore-2.0.0 (Score: 0.017712988)
Web application framework for writing web APIs in C
Kore is an easy to use web application framework for writing scalable web APIs in C. Its main goals are security, scalability and allowing rapid development and deployment of such APIs. Because of this Kore is an ideal candidate for building robust, scalable and secure web things.
devel/art-0.9.01 (Score: 0.017712988)
Resource tracing, debugging, and profiling tool
Crossplatform method to trace software errors in runtime during resource manipulation is shown. A scheme for describing abstract resources and their functions in XML is presented. Due to separation it's possible to describe vast classes of resources without changing the analyzer core. Detected errors often have an influence on security, safety, robustness and resource optimal usage.
devel/Algorithm-LUHN-1.02 (Score: 0.017712988)
Calculate the Modulus 10 Double Add Double checksum
This module calculates the Modulus 10 Double Add Double checksum, also known as the LUHN Formula. This algorithm is used to verify credit card numbers and Standard & Poor's security identifiers such as CUSIP and CSIN. You can find plenty of information about the algorithm by searching the web for "modulus 10 double add double".
devel/Ice-3.6.2 (Score: 0.017712988)
Modern alternative to object middleware such as CORBA/COM/DCOM/COM+
The Internet Communications Engine (Ice) is a modern alternative to object middleware such as CORBA(TM) or COM/DCOM/COM+. Ice is easy to learn, yet provides a powerful network infrastructure for demanding technical applications. Ice shines where technologies such as SOAP or XML-RPC are too slow, or do not provide sufficient scalability or security.
devel/File-ExtAttr-1.09 (Score: 0.017712988)
Access to extended attributes of the files
File::ExtAttr is a Perl module providing access to the extended attributes of the files. Extended attributes are metadata associated with a file. Examples are access control lists (ACLs) and other security parameters. But users can add their own key=value pairs. Extended attributes are supported by FreeBSD starting from version 5.
devel/File-Temp-0.23.04 (Score: 0.017712988)
Perl5 module to generate temporary files or directories safely
File::Temp is a Perl5 module which can be used to generate temporary files (providing a filename and filehandle) or directories. Possible race conditions are avoided and some security checks are performed (e.g. making sure the sticky bit is set on world writeable temp directories).
finance/aqmoney-0.6.3 (Score: 0.017712988)
Manage your credit institute accounts using openhbci
Aqmoney is a homebanking application. Aqmoney is able to create both RDH mode ("security disc" mode called in other programs) and DDV mode (chip card) customers. A customer is one who has one or more account(s) at a credit institute. To manage accounts you must first create a customer.
finance/BitcoinArmory-0.93.3 (Score: 0.017712988)
Desktop bitcoin management system
An open source Bitcoin wallet management platform. Designed from the ground up to provide the highest level of security for heavily-invested Bitcoin users, while still maintaining a high degree of usability and convenience. Its ease of use and advanced features make it one of the most popular alternative Bitcoin clients.
games/r1q2-8012 (Score: 0.017712988)
Enhanced Quake II client/server focusing on stability
R1Q2 is an enhanced client/server for Quake II. Based on the id Software 3.21 source, rather than concentrate on fancy graphics, embedded MP3 players and other "gimmick" features, R1Q2 is focused on providing stability, security and speed whilst remaining fully compatible with existing mods and other clients.
graphics/libpuzzle-0.11 (Score: 0.017712988)
Library to find similar pictures
The Puzzle library is designed to quickly find visually similar images (GIF, PNG, JPG), even if they have been resized, recompressed, recolored or slightly modified. The library is free, lightweight yet very fast, configurable, easy to use and it has been designed with security in mind.