stud is a network proxy that terminates TLS/SSL connections
and forwards the unencrypted traffic to some backend. It's
designed to handle 10s of thousands of connections
efficiently on multicore machines.
Subversion is a version control system designed to be as similar to cvs(1)
as possible, while fixing many outstanding problems with cvs(1).
This port adds Gnome Keyring support to Subversion.
PyOTP is a Python library for generating and verifying one-time passwords. It
can be used to implement two-factor (2FA) or multi-factor (MFA) authentication
methods in web applications and in other systems that require users to log in.
Sudoscript provides an audited shell using sudo(8) and script(1).
The front end script, sudoshell(1) contacts the daemon, sudoscriptd(8).
They agree on the location of a FIFO, which the daemon opens for read.
Sudoshell then runs script(1) with the FIFO as a typescript. The daemon
stamps each line of the script(1) output with a session id, then passes
the data over to another daemon. This daemon timestamps the data and stores
it in a log file which is /var/log/sudoscript. This daemon also keeps an eye
on the size of log files, and forks a rotator/compressor when it exceeds 2
MBytes.
This is is a set of Python bindings for the scrypt key derivation function.
Scrypt is useful when encrypting password as it is possible to specify a
minimum amount of time to use when encrypting and decrypting. If, for example,
a password takes 0.05 seconds to verify, a user won't notice the slight delay
when signing in, but doing a brute force search of several billion passwords
will take a considerable amount of time. This is in contrast to more
traditional hash functions such as MD5 or the SHA family which can be
implemented extremely fast on cheap hardware.
SWATCH - The Simple WATCHer and filter
Swatch is designed to monitor system activity. Swatch
requires a configuration file which contains pattern(s) to
look for and action(s) to do when each pattern is found.
Switzerland is a tool for testing networks, ISPs, and firewalls developed
by the Electronic Frontier Foundation (www.eff.org). It will spot IP
packets which are forged or modified between clients, inform you, and
give you copies of the modified packets.