Ports Search

Results 3,1113,120 of 18,669 for descr.zh_CN%3A%E9%81%8F%E5%88%B6%E5%9E%83%E5%9C%BE.(0.009 seconds)
security/Crypt-License-2.04 (Score: 5.9055537E-4)
Perl extension to examine a license
Crypt::License decodes an encrypted file and attempts to decrypt it by first, looking for a hash pointer in the caller program called $ptr2_License. The hash contains the path to the License file and an optional 'private' key list of modules which will decrypt only with the 'private' key. OR, a hash key of 'next' with no particular value that indicates to look to the next caller on the stack for the License pointer. If the pointer is not present or the License file is not found successfully, then no further action is taken. If the License file is successfully opened, and the contents validated then the attached encrypted module is loaded and the seconds remaining until License expiration are returned or now() in the case of no expiration. Undef is returned for an expired license (module fails to load).
devel/violet-2.1.0 (Score: 5.903441E-4)
Violet is a easy to learn and use UML editor
Violet is a UML editor with these benefits: * It is very easy to learn and use * It draws nice-looking class, sequence, state, object and use-case diagrams * It is completely free (distributed under the GNU General Public License) * It is cross-platform Violet is intended for students, teachers, and authors who need to produce simple UML diagrams quickly. It is not intended as an industrial strength tool. Here are some of the features that industrial-strength UML programs have and that Violet does not have: * Code generation. Violet does not generate any source code from UML diagrams. * Reverse engineering. Violet does not generate UML diagrams from source code * Semantic checking of models. You can use Violet to draw contradictory diagrams XMI export or import. Violet does not generate files that can be imported into other UML tools, nor can it read model files from other tools If you just want to draw simple UML diagrams without too much fuss, chances are you'll like Violet. If you have more serious needs, check out one of the other programs.
devel/Parse-Pidl-4.3.11 (Score: 5.9033046E-4)
IDL compiler written in Perl
Pidl is an IDL compiler written in Perl that aims to be somewhat compatible with the midl compiler. IDL stands for "Interface Definition Language". Pidl can generate stubs for DCE/RPC server code, DCE/RPC client code and ethereal dissectors for DCE/RPC traffic. IDL compilers like pidl take a description of an interface as their input and use it to generate C (though support for other languages may be added later) code that can use these interfaces, pretty print data sent using these interfaces, or even generate ethereal dissectors that can parse data sent over the wire by these interfaces. Pidl takes IDL files in the same format as is used by midl, converts it to a .pidl file (which contains pidl's internal representation of the interface) and can then generate whatever output you need. .pidl files should be used for debugging purposes only. Write your interface definitions in .idl format. The goal of pidl is to implement a IDL compiler that can be used while developing the RPC subsystem in Samba (for both marshalling/unmarshalling and debugging purposes).
games/xpuzzletama-1.5b (Score: 5.903199E-4)
Puzzle tama, a Tetris like game
PuzzleTama is a tetris-like puzzle game for X Window System. OPTIONS: usage: xpuzzletama [options] -display display Specify display name -rensa n How many balls is need to disappear. (Score registration available only 3) -install Install colormap -mouse Use mouse -net Multi player through net -host host Specify host when multi playing You can also configure mouse button. -rturn button-number default 1 -fall button-number default 2 -lturn button-number default 3
graphics/gif2png-2.5.9 (Score: 5.903199E-4)
Converts GIF images to a PNG format
The gif2png program converts files from the obsolescent Graphic Interchange Format to Portable Network Graphics. The conversion preserves all graphic information, including transparency, perfectly. The gif2png program can even recover data from corrupted GIFs. The distribution also includes a Python script, web2png, that will convert entire web hierarchies (images and HTML or PHP pages). The script requires Python 1.5.2. Original author: Alexander Lehmann
mail/surblhost-0.8.0 (Score: 5.903199E-4)
Check if a hostname is blacklisted
Surblhost is a small program to see if hostnames are listed in the Spam URI Realtime Blocklists (SURBL). Hosts that are blacklisted means that global spam email have been reported to contain links to these hosts. Many popular spam email filters use these lists to identify spam email, but this program makes it possible to use the lists for any conceivable purpose, such as filtering out bad hosts from URL redirection, and so on.
sysutils/ploy-1.2.1 (Score: 5.903199E-4)
Manage servers through a central configuration
Ploy is a commandline-tool to provision, manage and control server instances. What kind of server instances these are depends on the used plugins. There are plugins for EC2 (ploy_ec2), FreeBSD Jails (ploy_ezjail) and more. You can create, delete, monitor and ssh into instances while ploy handles the details like ssh fingerprint checking. Additional plugins provide advanced functionality like integrating Fabric (ploy_fabric) and Ansible (ploy_ansible).
databases/ateam_mysql_ldap_auth-1.0 (Score: 5.900821E-4)
A-Team MySQL LDAP authentication plugin
A-Team MySQL LDAP Authenticator (ateam_mysql_ldap_auth) is an authentication plugin for MySQL 5.5.7 and up, and has been tested with 5.6 under FreeBSD. This module allows you to create MySQL users that are then authenticated against an LDAP server. This reduces administrative overhead and eliminates your users having to remember a seperate username and password for MySQL. Just like MySQL Enterprise's PAM module, for client side authentication this plugin uses the clear_text password module as the LDAP server must perform the password hasing and comparison. For command line clients this is done by setting the following environment variable: export LIBMYSQL_ENABLE_CLEARTEXT_PLUGIN=1 In MySQL Workbench this is acheived by going to go to the "Advanced" tab and checking "Enable Cleartext Authentication Plugin" when editing a connction. !!! IMPORTANT: !!! ------------------------------------------------------------------------ !!! ENSURE THE COMMUNICATIONS PATH BETWEEN THE CLIENT AND SERVER IS SECURE! !!! ------------------------------------------------------------------------ !!! By default MySQL does not use SSL so additional steps and network design !!! are needed to ensure you're not exposing your credetials.
shells/shell-include-0.1.2 (Score: 5.884112E-4)
Include system for shell scripts
Allows include files to be used in shells the same way they are with C. The file with the include code needs to be included. This is done by figuring out were it is located using which. . `which sh-include` will take care of it for sh. sh example... . `which sh-include` include fileGetLine line=`fileGetLine /etc/group 4`
games/gillo-1.0.b1 (Score: 5.8770145E-4)
Players are cars throwing a magnetic fuzzy ball into a goal
Two player game in a 3D ellipsoid playground. Players are cars with a magnetic director, able to attract or reject a ball in order to throw it through a goal placed in the center of the playing field. It sounds easy... but remember that reality is fuzzy!