This port contains packages from a near-minimal installation of CentOS 7
Linux. These packages, in conjunction with the Linux kernel module,
form the basis of the Linux compatibility environment. It is designed to
provide a nice user experience by using the FreeBSD configuration for
corresponding Linux stuff where possible. Because of this any work which
needs to chroot into the Linux base may not work as expected (no fallthrough
to the FreeBSD config possible).
This port contains packages from a near-minimal installation of CentOS 6
Linux. These packages, in conjunction with the Linux kernel module,
form the basis of the Linux compatibility environment. It is designed to
provide a nice user experience by using the FreeBSD configuration for
corresponding Linux stuff where possible. Because of this any work which
needs to chroot into the Linux base may not work as expected (no fallthrough
to the FreeBSD config possible).
The Institute of Electrical and Electronics Engineers (IEEE) assigns an
Organizational Unique Identifier (OUI) to manufacturers of network
interfaces. Each interface has a Media Access Control (MAC) address of six
bytes. The first three bytes are the OUI.
This module allows you to take a MAC address and turn it into the OUI and
vendor information. You can, for instance, scan a network, collect MAC
addresses, and turn those addresses into vendors. With vendor information,
you can often guess at what you are looking at (e.g. an Apple
product).
You can use this as a module as its individual functions, or call it as a
script with a list of MAC addresses as arguments. The module can figure it
out.
This module tries to persistently cache with DBM::Deep the OUI information
so it can avoid using the network. If it cannot load DBM::Deep, it uses a
normal hash (which is lost when the process finishes). You can preload
this cache with the load_cache() function. So far, the module looks in the
current working directory for a file named mac_oui.db to find the cache. I
need to come up with a way to let the user set that location.
Mutt is a small but very powerful text-based MIME mail client. Mutt
is highly configurable, and is well suited to the mail power user with
advanced features like key bindings, keyboard macros, mail threading,
regular expression searches and a powerful pattern matching language
for selecting groups of messages.
This is japanized development version.
see /usr/local/share/doc/mutt/README.JA-PATCH
-
IWASHITA Yoji
shuna@pop16.odn.ne.jp
F# is an open-source, strongly typed, multi-paradigm programming
language encompassing functional, imperative and object-oriented
programming techniques. F# is most often used as a cross-platform CLI
language, but can also be used to generate JavaScript and GPU code.
F# is developed by The F# Software Foundation and Microsoft. An open
source, cross-platform edition of F# is available from the F# Software
Foundation. F# is also a fully supported language in Visual Studio.
Other tools supporting F# development include Mono, MonoDevelop,
SharpDevelop and the WebSharper tools for JavaScript and HTML5 web
programming.
F# originated as a variant of ML and has been influenced by OCaml, C#,
Python, Haskell, Scala and Erlang.
mod_dosevasive是Apache的一个规避策略模块,它为Apache在遭受一个HTTP DoS或DDoS攻击或者强制
攻击事件时提供规避行动。
它也是一个检测和管理网络的工具,可以方便地配置以便与ipchains、网络防火墙、路由器等进行交互。
mod_dosevasive目前可以通过电子邮件和syslog等设施来报告滥用行为。
检测是通过创建一个IP地址和URI的内部动态哈希表,并拒绝任何单一的IP地址的以下行为:
* 每秒多次请求同一个页面
* 在同一个Apache Child上,每秒发起超过50个并发请求
* 在临时黑名单上(在阻止列表上)的IP,发起任意请求
这个方法对于单一服务器脚本攻击和分布式攻击同样行之有效,但是和其它规避工具一样,仅仅对保护带宽和
处理器消耗起作用(如,带宽总量和接收/处理/响应无效请求所需的处理器),因此,把它和你的网络防火
墙与路由器集成起来以达到最大保护,是个好主意。
这个模块为每个监听器单独地初始化一个实例,因此它有内建的清理机制和缩放功能。由于这种针对每个
Apache Child的设计,合法的请求从来不受影响(甚至是从代理和NAT地址),而仅仅针对脚本攻击。即使用户
重复地点击“刷新”也应该不受影响,除非他们不怀好意。mod_dosevasive完全通过Apache配置文件来配置,
很容易集成到你的web服务器上。
This is autopano-sift-2.4 ported to plain "C"
The source is kept as close as possible to the original version.
It should have the same inputs and outputs as the original "C#" version
which is available in ports as graphics/autopano-sift
This will inject base classes to your module using the Class::C3 method
resolution order.
Please note: these are not plugins that can take precedence over methods
declared in MyModule. If you want something like that, consider
MooseX::Object::Pluggable.
[ excerpt taken from distfile's README ]
Dolly is used to clone the installation of one machine to (possibly
many) other machines. It can distribute image-files (even gnu-zipped),
partitions or whole hard disk drives to other partitions or hard
disk drives. As it forms a "virtual TCP ring" to distribute data,
it works best with fast switched networks (we were able to clone a
2 GB Windows NT partition to 15 machines in our cluster over Gigabit
Ethernet in less than 4 minutes).
As dolly clones whole partitions block-wise it works for most
filesystems. We used it to clone partitions of the following type:
Linux, Windows NT, Oberon, Solaris (most of our machines have multi
boot setups). We have a small (additional) Linux installation on
all of our machines or use a small one-floppy-disk-linux (e.g.
muLinux) to do the cloning. On newer machines we use PXE to boot a
small system in a RAM disk. From that system we then clone the hard
disks in the machines.
Gzip (GNU zip) is a compression utility designed to be a replacement
for compress. Its main advantages over compress are much better
compression and freedom from patented algorithms.