Crypt::License decodes an encrypted file and attempts to decrypt it by first,
looking for a hash pointer in the caller program called $ptr2_License. The
hash contains the path to the License file and an optional 'private' key list
of modules which will decrypt only with the 'private' key. OR, a hash key of
'next' with no particular value that indicates to look to the next caller on
the stack for the License pointer. If the pointer is not present or the
License file is not found successfully, then no further action is taken. If the
License file is successfully opened, and the contents validated then the
attached encrypted module is loaded and the seconds remaining until License
expiration are returned or now() in the case of no expiration. Undef is
returned for an expired license (module fails to load).
Violet is a UML editor with these benefits:
* It is very easy to learn and use
* It draws nice-looking class, sequence, state, object and use-case diagrams
* It is completely free (distributed under the GNU General Public License)
* It is cross-platform
Violet is intended for students, teachers, and authors who need to produce
simple UML diagrams quickly. It is not intended as an industrial strength
tool. Here are some of the features that industrial-strength UML programs have
and that Violet does not have:
* Code generation. Violet does not generate any source code from UML diagrams.
* Reverse engineering. Violet does not generate UML diagrams from source code
* Semantic checking of models. You can use Violet to draw contradictory
diagrams XMI export or import. Violet does not generate files that can be
imported into other UML tools, nor can it read model files from other tools
If you just want to draw simple UML diagrams without too much fuss, chances
are you'll like Violet. If you have more serious needs, check out one of the
other programs.
Pidl is an IDL compiler written in Perl that aims to be somewhat
compatible with the midl compiler. IDL stands for "Interface Definition
Language".
Pidl can generate stubs for DCE/RPC server code, DCE/RPC client code and
ethereal dissectors for DCE/RPC traffic.
IDL compilers like pidl take a description of an interface as their
input and use it to generate C (though support for other languages may
be added later) code that can use these interfaces, pretty print data
sent using these interfaces, or even generate ethereal dissectors that
can parse data sent over the wire by these interfaces.
Pidl takes IDL files in the same format as is used by midl, converts it
to a .pidl file (which contains pidl's internal representation of the
interface) and can then generate whatever output you need. .pidl files
should be used for debugging purposes only. Write your interface
definitions in .idl format.
The goal of pidl is to implement a IDL compiler that can be used while
developing the RPC subsystem in Samba (for both marshalling/unmarshalling
and debugging purposes).
PuzzleTama is a tetris-like puzzle game for X Window System.
OPTIONS:
usage: xpuzzletama [options]
-display display Specify display name
-rensa n How many balls is need to disappear.
(Score registration available only 3)
-install Install colormap
-mouse Use mouse
-net Multi player through net
-host host Specify host when multi playing
You can also configure mouse button.
-rturn button-number default 1
-fall button-number default 2
-lturn button-number default 3
The gif2png program converts files from the obsolescent Graphic
Interchange Format to Portable Network Graphics. The conversion
preserves all graphic information, including transparency, perfectly.
The gif2png program can even recover data from corrupted GIFs.
The distribution also includes a Python script, web2png, that will
convert entire web hierarchies (images and HTML or PHP pages). The
script requires Python 1.5.2.
Original author:
Alexander Lehmann
Surblhost is a small program to see if hostnames are listed in the Spam
URI Realtime Blocklists (SURBL).
Hosts that are blacklisted means that global spam email have been reported
to contain links to these hosts.
Many popular spam email filters use these lists to identify spam email,
but this program makes it possible to use the lists for any conceivable
purpose, such as filtering out bad hosts from URL redirection, and so on.
Ploy is a commandline-tool to provision, manage and control server instances.
What kind of server instances these are depends on the used plugins. There
are plugins for EC2 (ploy_ec2), FreeBSD Jails (ploy_ezjail) and more.
You can create, delete, monitor and ssh into instances while ploy handles the
details like ssh fingerprint checking. Additional plugins provide advanced
functionality like integrating Fabric (ploy_fabric) and Ansible (ploy_ansible).
A-Team MySQL LDAP Authenticator (ateam_mysql_ldap_auth) is an authentication
plugin for MySQL 5.5.7 and up, and has been tested with 5.6 under FreeBSD.
This module allows you to create MySQL users that are then authenticated
against an LDAP server. This reduces administrative overhead and eliminates
your users having to remember a seperate username and password for MySQL.
Just like MySQL Enterprise's PAM module, for client side authentication
this plugin uses the clear_text password module as the LDAP server must
perform the password hasing and comparison. For command line clients this
is done by setting the following environment variable:
export LIBMYSQL_ENABLE_CLEARTEXT_PLUGIN=1
In MySQL Workbench this is acheived by going to go to the "Advanced" tab and
checking "Enable Cleartext Authentication Plugin" when editing a connction.
!!! IMPORTANT:
!!! ------------------------------------------------------------------------
!!! ENSURE THE COMMUNICATIONS PATH BETWEEN THE CLIENT AND SERVER IS SECURE!
!!! ------------------------------------------------------------------------
!!! By default MySQL does not use SSL so additional steps and network design
!!! are needed to ensure you're not exposing your credetials.
Allows include files to be used in shells the same way they are with C.
The file with the include code needs to be included. This is done by
figuring out were it is located using which. . `which sh-include` will
take care of it for sh.
sh example...
. `which sh-include`
include fileGetLine
line=`fileGetLine /etc/group 4`
Two player game in a 3D ellipsoid playground. Players are cars with a
magnetic director, able to attract or reject a ball in order to throw
it through a goal placed in the center of the playing field. It sounds
easy... but remember that reality is fuzzy!