TransFig is a set of tools for creating TeX documents with graphics
which are portable, in the sense that they can be printed in a wide
variety of environments.
Drivers currently exist for the following graphics languages:
AutoCad slide, BOX, (E)EPIC macros, LaTeX picture environment,
PIC, PiCTeX, PNG, PostScript, Encapsulated Postscript, GIF,
IBM-GL, JPEG, PCX, MF (METAFONT), TeXtyl, TIFF, TPIC, XBM (X11
Bitmap), XPM (X11 Pixmap), and TK (tcl/tk). Fig2dev can be
configured with a subset of these drivers.
These programs convert between textual and binary representations of numbers.
ascii2binary reads input consisting of textual representations of numbers
separated by whitespace and produces as output the binary equivalents. The type
and precision of the binary output is selected using command line flags.
binary2ascii reads input consisting of binary numbers and converts them to
their textual representation. Command line flags specify the type and size
of the binary numbers and provide control over the format of the output.
Unsigned integers may be written out in binary, octal, decimal, or hexadecimal.
Signed integers may be written out only in binary or decimal. Floating point
numbers may be written out only decimal, either in standard or scientific
notation. (If you want to examine the binary representation of floating point
numbers, just treat the input as a sequence of unsigned characters.)
The two programs are useful for generating test data, for inspecting binary
files, and for interfacing programs that generate textual output to programs
that require binary input and conversely. They can also be useful when it is
desired to reformat numbers.
The Simple X Protocol Compressor
This program provides compression of the X protocol stream.
It is intended to be used to improve the performance of X applications
over a slow internet connection. (e.g. slip,cslip. or term) It assumes
a Unix operating system at both ends of the link. Transferring large
bitmaps or images through sxpc may be slower than not using it.
The algorithms used are geared primarily for the data exchanged
during interactive use where the same data may be sent several times
with only small changes. (e.g. editing)
WARNING WARNING DANGER DANGER
If you use this program use xauth to provide SECURITY, since
host-based security will be BYPASSED. See README.xauth in the work
sub-directory.
LinKNX is a backend for controlling a KNX/EIB home and building automation
system. It connects to eibd which is part of the BCU SDK and keeps state of
KNX devices such as lamps, window blinds, heating and so on.
Furthermore it provides a powerful, rule-based event after treatment, e.g.
for switching other KNX devices, sending e-mail or SMS or executing a shell
command. You can configure and control the LinKNX daemon using an XML-style
protocol via TCP network socket or Unix domain socket.
from the README:
Passive OS fingerprinting is based on information coming from a remote host
when it establishes a connection to our system. Captured packets contain
enough information to identify the operating system. In contrast to active
scanners such as nmap and QueSO, p0f does not send anything to the host being
identified.
For more information, read Spitzner's text at:
http://www.enteract.com/~lspitz/finger.html .
from the maintainer:
Use of this program requires read access to the packet filtering
device, typically /dev/bpf0. Granting such access allows the users
who have it to put your Ethernet device into promiscuous mode and
sniff your network. See
http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
if you do not understand how this can be harmful. Running p0f with
no options will cause it to analyse packets intended for other
hosts.
from the README:
Passive OS fingerprinting is based on information coming from a remote host
when it establishes a connection to our system. Captured packets contain
enough information to identify the operating system. In contrast to active
scanners such as nmap and QueSO, p0f does not send anything to the host being
identified.
For more information, read Spitzner's text at:
http://www.enteract.com/~lspitz/finger.html .
from the maintainer:
Use of this program requires read access to the packet filtering
device, typically /dev/bpf0. Granting such access allows the users
who have it to put your Ethernet device into promiscuous mode and
sniff your network. See
http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
if you do not understand how this can be harmful. Running p0f with
no options will cause it to analyse packets intended for other
hosts.
QuickCheck++ is a tool for testing C++ programs automatically,
inspired by QuickCheck, a similar library for Haskell programs.
In QuickCheck++, the application programmer provides a specification
of parts of its code in the form of properties which this code must
satisfy. Then, the QuickCheck++ utilities can check that these
properties holds in a large number of randomly generated test cases.
Specifications, i.e. properties, are written in C++ by deriving
from the quickcheck::Property class. This class contains members
not only to express the specification but also to observe the
distribution of test data and to write custom test data generators.
The framework also allows the specification of fixed test data, as
can be done with more traditional unit testing frameworks.
This module, when inherited by a package, allows that package's class to define
attribute handler subroutines for specific attributes. Variables and
subroutines subsequently defined in that package, or in packages derived from
that package may be given attributes with the same names as the attribute
handler subroutines, which will then be called in one of the compilation phases
(i.e. in a BEGIN, CHECK, INIT, run-time, or END block).
This module, when inherited by a package, allows that package's
class to define attribute handler subroutines for specific
attributes. Variables and subroutines subsequently defined in
that package, or in packages derived from that package may be
given attributes with the same names as the attribute handler
subroutines, which will then be called in one of the
compilation phases (i.e. in a BEGIN, CHECK, INIT, or END block).
ssh-askpass is a small applet intended for use in conjunction with
OpenSSH. It pops up a window and requests the user input their SSH
passphrase. It is not designed to be executed directly, but to be called
by OpenSSH's ssh-add(1) utility. If no controlling terminal is found (e.g.
ssh-add is called from the .xinitrc as part of the X login process), and
DISPLAY is set, ssh-add will spawn ssh-askpass to request the password.