AuthServiceProxy is an improved version of python-jsonrpc.
It includes the following generic improvements:
- HTTP connections persist for the life of the AuthServiceProxy object
- sends protocol 'version', per JSON-RPC 1.1
- sends proper, incrementing 'id'
- uses standard Python json lib
- can optionally log all RPC calls and results
- JSON-2.0 batch support
It also includes the following bitcoin-specific details:
- sends Basic HTTP authentication headers
- parses all JSON numbers that look like floats as Decimal,
and serializes Decimal values to JSON-RPC connections.
Provides a CAPTCHA for Python using the reCAPTCHA service. Does not require
any imaging libraries because the CAPTCHA is served directly from reCAPTCHA.
Also allows you to securely obfuscate emails with Mailhide. This functionality
requires pycrypto. This library requires two types of API keys. If you'd like
to use the CAPTCHA, you'll need a key from http://recaptcha.net/api/getkey.
For Mailhide, you'll need a key from http://mailhide.recaptcha.net/apikey.
This is a driver for "homebrew" type serial LIRC reveivers as
described here:
http://lirc.org/receivers.html
It overrides the `normal' uart(4) driver, if you have that driver
already loaded or statically in your kernel (like it is in GENERIC)
then you need to load uartlirc.ko from loader.conf(5) (or manually
via the loader prompt) for the override to work. The driver provides
a /dev/lircX node for each serial port in addition to the normal
tty nodes /dev/cuauX etc, so you can still use other serial ports
normally should you have more than one.
Note: it only supports PCI/motherboard serial ports not ones connected
via USB, for USB you can use mceusb hardware supported via webcamd,
or FTDI hardware supported by comms/lirc natively via libftdi, see:
http://wiki.freebsd.org/WebcamCompat
and the comms/lirc port's pkg-message.
This module wraps most methods of most Xapian classes. The missing classes and
methods should be added in the future. It also provides a simplified, more
'perlish' interface - as demonstrated above.
The Xapian library is evolving very quickly at the time of writing, hence any
documentation placed here would be likely to become out of date quite rapidly,
and I do not have the patience to write some which could rapidly become
redundant.
Apologies to those of you considering using this module. For the time being, I
would suggest garnering what you can from the tests and examples provided, or
reading through the Xapian documentation on http://www.xapian.org/, notably the
API documentation at http://www.xapian.org/docs/apidoc/html/annotated.html
If you encounter problems, email either me or preferably the Xapian-discuss
mailing list (which I am on - subscription details can be found on the Xapian
web site).
This module wraps most methods of most Xapian classes. The missing classes
and methods should be added in the future. It also provides a simplified,
more 'perlish' interface - as demonstrated above.
The Xapian library is evolving very quickly at the time of writing,
hence any documentation placed here would be likely to become out of
date quite rapidly, and I do not have the patience to write some which
could rapidly become redundant.
Apologies to those of you considering using this module. For the time
being, I would suggest garnering what you can from the tests and
examples provided, or reading through the Xapian documentation on
http://www.xapian.org/, notably the API documentation at
http://www.xapian.org/docs/apidoc/html/annotated.html
If you encounter problems, email either me or preferably the
Xapian-discuss mailing list (which I am on - subscription details can
be found on the Xapian web site).
S10sh is a USB/serial userspace driver for the Canon PowerShot digital cameras.
Using S10sh you can download, upload and explore the images captured with your
PowerShot camera. The interface is quite similar to DOS's command.com.
S10sh supports the following PowerShot models:
G1 (works with USB, not reported if works with the serial interface)
G3 (from local patches, perhaps needs further testing/debug)
S10 (serial and USB)
S20 (serial and USB)
S100 aka Digital Ixus (USB only, since it lacks the serial interface)
A20 (needs testing)
A50 (serial only, supported with problems)
Pro70 (serial only, supported with problems)
Other models are reported to work as well: Elph S400, Digital Ixus V3, S30,
A60, EOS-10D.
With the release of libusb 0.1.3b (http://sourceforge.net/projects/libusb/),
S10sh gained USB support under FreeBSD.
The original author's web page is http://www.kyuzz.org/antirez/s10sh.html
from the README:
Passive OS fingerprinting is based on information coming from a remote host
when it establishes a connection to our system. Captured packets contain
enough information to identify the operating system. In contrast to active
scanners such as nmap and QueSO, p0f does not send anything to the host being
identified.
For more information, read Spitzner's text at:
http://www.enteract.com/~lspitz/finger.html .
from the maintainer:
Use of this program requires read access to the packet filtering
device, typically /dev/bpf0. Granting such access allows the users
who have it to put your Ethernet device into promiscuous mode and
sniff your network. See
http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
if you do not understand how this can be harmful. Running p0f with
no options will cause it to analyse packets intended for other
hosts.
from the README:
Passive OS fingerprinting is based on information coming from a remote host
when it establishes a connection to our system. Captured packets contain
enough information to identify the operating system. In contrast to active
scanners such as nmap and QueSO, p0f does not send anything to the host being
identified.
For more information, read Spitzner's text at:
http://www.enteract.com/~lspitz/finger.html .
from the maintainer:
Use of this program requires read access to the packet filtering
device, typically /dev/bpf0. Granting such access allows the users
who have it to put your Ethernet device into promiscuous mode and
sniff your network. See
http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
if you do not understand how this can be harmful. Running p0f with
no options will cause it to analyse packets intended for other
hosts.
Net::Random - get random data from online sources
This module gets truly random data from online sources. Or at least,
they claim to be truly random.
The two sources of randomness above correspond to
http://www.fourmilab.ch/cgi-bin/uncgi/Hotbits?nbytes=1024&fmt=hex and
http://random.org/cgi-bin/randbyte?nbytes=1024&format=hex.
We always get chunks of 1024 bytes at a time, storing it in a pool
which is used up as and when needed. The pool is shared between all
objects using the same randomness source. When we run out of randomness
we go back to the source for more juicy random goodness.
The maintainers of both randomness sources claim that their data
is *truly* random. A some simple tests show that they are certainly
more random than the rand() function on this 'ere machine.
The String::Koremutake module converts to and from Koremutake Memorable
Random Strings.
The term "Memorable Random String" was thought up by Sean B. Palmer as a
name for those strings like dopynl, glargen, glonknic, spoopwiddle, and
kebble etc. that don't have any conventional sense, but can be used as
random identifiers, especially in URIs to keep them persistent. See
http://infomesh.net/2001/07/MeRS/
Koremutake is a MeRS algorithm which is used by Shorl
(http://shorl.com/koremutake.php). As they explain: "It is, in plain
language, a way to express any large number as a sequence of syllables.
The general idea is that word-sounding pieces of information are a lot
easier to remember than a sequence of digits."