CUPS backend for the canon proprietary USB over IP network printing
protocol, BJNP. This backend is based on reverse engineering using
TCP/IP. It can be used with CUPS 1.2 - 1.7 (verified). This backend allows Cups
to connect over the network to a Canon printers
TTF2PT1 is a modification of Andrew Weeks TTF2PFA True Type to Postscript
Type 3 converter. Which will convert Most True Type Fonts to and Adobe
Type 1 .pfa file. The files produced are in human readable form, which
further needs to be encrypted with the t1utilities, to work with most
software requiring type 1 fonts.
Libxc is library of exchange-correlation functionals for density-functional
theory. The aim is to provide a portable, well tested and reliable set of
exchange and correlation functionals that can be used by all the ETSF codes
and also other codes.
In libxc you can find different types of functionals: LDA, GGA, hybrids,
and mGGA (experimental).
AfterGlow is a collection of scripts which facilitate the process of
generating event graphs and treemaps. AfterGlow 1.x is written in Perl
and generates output that can be read by GraphViz or LGL.
All the scripts and other files for afterglow are installed in
%%DATADIR%%
amavisd-new is a performance-enhanced daemonized version of amavis-perl
Note that the installation is different than the original package, and the
integration into your MTA can be different, so please read the README and
INSTALL files very carefully.
amavisd-new also supports SpamAssassin integration.
The op tool provides a flexible means for system administrators to grant access
to certain root operations without having to give them full superuser
privileges. Different sets of users may access different operations, and the
security-related aspects of each operation can be carefully controlled.
SASL is a generic mechanism for authentication used by several network
protocols. Authen::SASL::Cyrus provides an implementation framework
that all protocols should be able to share.
The XS framework makes calls into the existing libsasl2.so shared
library to perform SASL client connection functionality, including
loading existing shared library mechanisms.
Serpent was designed by Ross Anderson, Eli Biham and Lars Knudsen
as a candidate for the Advanced Encryption Standard. It has been
selected as one of the five finalists in the AES competition.
Serpent is faster than DES and more secure than Triple DES. It
provides users with a very high level of assurance that no shortcut
attack will be found. To achieve this, the algorithm's designers
limited themselves to well understood cryptography mechanisms, so
that they could rely on the wide experience and proven techniques
of block cipher cryptanalysis. The algorithm uses twice as many
rounds as are necessary to block all currently known shortcut
attacks. This means that Serpent should be safe against as yet
unknown attacks that may be capable of breaking the standard 16
rounds used in many types of encryption today. However, the fact
that Serpent uses so many rounds means that it is the slowest of
the five AES finalists. But this shouldn't be an issue because it
still outperforms Triple DES. The algorithm's designers maintain
that Serpent has a service life of at least a century.
The chrootuid command combines chroot(8) and su(1) into one program,
so that there is no need to have commands such as /usr/bin/su in the
restricted environment. Access to the file system is restricted to
the newroot subtree and privileges are restricted to those of the
newuser account (which must be a known account in the unrestricted
environment).
See also jail(8)
This set of modules provides perl class wrappers for the network mapper
(nmap) scanning tool (see http://www.insecure.org/nmap/). Using these
modules, a developer, network administrator, or other techie can create
perl routines or classes which can be used to automate and integrate
nmap scans elegantly into new and existing perl scripts.