Ports Search

Results 5,7315,740 of 5,827 for /net-mgmt/.(0.006 seconds)
security/Authen-Simple-SMB-0.1 (Score: 0.004375564)
Simple SMB authentication
Authentication via SMB protocol.
security/Authen-Simple-SSH-0.1 (Score: 0.004375564)
Simple SSH authentication
Authentication via SSH protocol.
security/pam_fprint-20080330 (Score: 0.004375564)
PAM module offering finger print authentication using libfprint
pam_fprint is a simple PAM module which uses libfprint's fingerprint processing and verification functionality for authentication. In other words, instead of seeing a password prompt, you're asked to scan your fingerprint.
security/Crypt_CBC-1.0.1 (Score: 0.004375564)
PEAR class to emulate Perl's Crypt::CBC module
A PEAR class to emulate Perl's Crypt::CBC module.
security/fchksum-1.7.1 (Score: 0.004375564)
Python module to find the checksum of files
fchksum is a Python module to find the checksum of files. Currently it supports crc32 and md5 checksums. The advantage of using fchksum over the python md5 and zlib(.crc32) modules is both ease of use and speed. You only need to tell it the filename and the actual work is done by C code. Compared to the implementing a read loop in python with the standard python modules, fchksum is approximatly 2.0x faster in md5 and 1.1x faster in crc32.
security/openvpn-2.3.12 (Score: 0.004375564)
Secure IP/Ethernet tunnel daemon
OpenVPN is a robust, scalable and highly configurable VPN (Virtual Private Network) daemon which can be used to securely link two or more private networks using an encrypted tunnel over the internet. It can operate over UDP or TCP, can use SSL or a pre-shared secret to authenticate peers, and in SSL mode, one server can handle many clients.
security/plaso-1.5.0 (Score: 0.004375564)
Automatic creation of a super timeline
Plaso is the Python based back-end engine used by tools such as log2timeline for automatic creation of a super timelines. The goal of log2timeline (and thus plaso) is to provide a single tool that can parse various log files and forensic artifacts from computer and related systems, such as network equipment to produce a single correlated timeline. This timeline can then be easily analysed by forensic investigators/analysts, speeding up investigations by correlating the vast amount of information found on an average computer system.
security/tinyca-0.7.6 (Score: 0.004375564)
Simple graphical interface to manage a small Certification Authority
TinyCA is a simple graphical userinterface written in Perl/Tk to manage a small CA (Certification Authority). Currently TinyCA supports the following features: * unlimited number of CAs * support for creating and managing SubCAs * Creation and Revocation of x509 - S/MIME certificates * PKCS#10 Requests can be imported and signed * RSA and DSA keys can be generated and used * Servercertificates o Certificates can be exported as: PEM, DER, TXT and PKCS#12 o Certificates may be used with e.g. Apache, Postfix, OpenLDAP, Cyrus and FreeS/WAN * Clientcertificates o Certificates can be exported as: PEM, DER, TXT and PKCS#12 o Certificates may be used with e.g. Netscape, Konqueror, Opera, Internet Explorer, Outlook (Express) and FreeS/WAN * Certificate Revocation List o CRLs can be exported as: PEM, DER and TXT
sysutils/fatback-1.3 (Score: 0.004375564)
Recover deleted files from FAT filesystems
Fatback is a forensic tool for undeleting files from FAT file systems. Fatback is different from other undelete tools in that it does the following: * Runs under UNIX environments * Can undelete files automatically * Supports Long File Names * Supports FAT12, FAT16, and FAT32 * Powerful interactive mode * Recursively undeletes deleted directories * Recovers lost cluster chains * Works with single partitions or whole disks
sysutils/keyboard-daemon-0.7 (Score: 0.004375564)
Listens on a keyboard device and executes commands on keypresses
The author has not found any simple programs that listen on a device and run commands based on the values received. keyboard-daemon binds to a device (for example, a remote control) and listens for button presses. These are then mapped to programs that are executed.