Ports Search

Results 11,79111,800 of 17,773 for comment.zh_CN%3A%E6%8E%A7%E5%88%B6%E5%8F%B0.(0.014 seconds)
security/origami-2.0.0 (Score: 1.6188293E-4)
Ruby framework to parse analyze and forge PDF documents
Origami is NOT a PDF rendering library. It aims at providing a scripting tool to generate and analyze malicious PDF files. As well, it can be used to create on-the-fly customized PDFs, or to inject (evil) code into already existing documents. - Create PDF documents from scratch. - Parse existing documents, modify them and recompile them. - Explore documents at the object level, going deep into the document structure, uncompressing PDF object streams and desobfuscating names and strings. - High-level operations, such as encryption/decryption, signature, file attachments... - A GTK interface to quickly browse into the document contents.
security/nessus-plugins-2.2.9 (Score: 1.6188293E-4)
Plugins for Nessus, the security scanner
Nessus is a security scanner. That is, it's a program which will scan a given network and will seek for vulnerabilities which could be exploited by some remote intruder. The Nessus Project was originally started by Renaud Deraison (deraison@worldnet.fr). Many people contributed in many ways to the project, and the Nessus core team is now made up of Alexis de Bernis (alexisb@mygale.org), who is the Java specialist, Noam Rathaus (dolittle@isrealmail.com) who is in charge of the Nessus client for Windows, and Renaud Deraison who is still here and who is the project leader.
security/openbsm-1.2.a4 (Score: 1.6188293E-4)
Open Source Basic Security Module (BSM) Audit Implementation
OpenBSM is an open source implementation of Sun's Basic Security Module (BSM) Audit API and file format. BSM, the de facto industry standard for Audit, describes a set of system call and library interfaces for managing audit records, as well as a token stream file format that permits extensible and generalized audit trail processing. OpenBSM extends the BSM API and file format in a number of ways to support features present in the Mac OS X and FreeBSD operating systems, such as Mach task interfaces, sendfile(), and Linux system calls present in the FreeBSD Linux emulation layer.
security/pbc-0.5.14 (Score: 1.6188293E-4)
Library of pairing-based cryptosystems
Pairing-based cryptography is a relatively young area of cryptography that revolves around a certain function with special properties. The PBC (Pairing-Based Cryptography) library is a free C library (released under the GNU Public License) built on the GMP library that performs the mathematical operations underlying pairing-based cryptosystems. The PBC library is designed to be the backbone of implementations of pairing-based cryptosystems, thus speed and portability are important goals. It provides routines such as elliptic curve generation, elliptic curve arithmetic and pairing computation. Thanks to the GMP library, despite being written in C, pairings times are reasonable.
security/openbsm-1.1.p2 (Score: 1.6188293E-4)
Open Source Basic Security Module (BSM) Audit Implementation
OpenBSM is an open source implementation of Sun's Basic Security Module (BSM) Audit API and file format. BSM, the de facto industry standard for Audit, describes a set of system call and library interfaces for managing audit records, as well as a token stream file format that permits extensible and generalized audit trail processing. OpenBSM extends the BSM API and file format in a number of ways to support features present in the Mac OS X and FreeBSD operating systems, such as Mach task interfaces, sendfile(), and Linux system calls present in the FreeBSD Linux emulation layer.
security/openvpn-201623 (Score: 1.6188293E-4)
Secure IP/Ethernet tunnel daemon
OpenVPN is a robust, scalable and highly configurable VPN (Virtual Private Network) daemon which can be used to securely link two or more private networks using an encrypted tunnel over the internet. It can operate over UDP or TCP, can use SSL or a pre-shared secret to authenticate peers, and in SSL mode, one server can handle many clients. This development port is updated frequently and is likely NOT STABLE. This is an untested tar of the source tree. We attempt to omit inoperable states, but there is a good chance this program will not run. DO NOT USE IN PRODUCTION WITHOUT CAUTION
security/osiris-4.2.3 (Score: 1.6188293E-4)
Shmoo client/server host integrity checker
Osiris is a Host Integrity Management System that periodically monitors one or more hosts for change. It maintains detailed logs of changes to the file system, user and group lists, resident kernel modules, and more. Osiris can be configured to email these logs to the administrator. Hosts are periodically scanned and, if desired, the records can be maintained for forensic purposes. Osiris keeps an administrator apprised of possible attacks and/or nasty little trojans. The purpose here is to isolate changes that indicate a break-in or a compromised system. Osiris makes use of OpenSSL for encryption and authentication in all components.
security/Authen-Passphrase-0.008 (Score: 1.6188293E-4)
Perl module for handling hashed passwords/passphrases as objects
This is the base class for a system of objects that encapsulate passphrases. An object of this type is a passphrase recogniser: its job is to recognise whether an offered passphrase is the right one. For security, such passphrase recognisers usually do not themselves know the passphrase they are looking for; they can merely recognise it when they see it. There are many schemes in use to achieve this effect, and the intent of this class is to provide a consistent interface to them all, hiding the details. The CPAN package Authen::Passphrase contains implementations of several specific passphrase schemes in addition to the base class.
security/Crypt-AppleTwoFish-0.051 (Score: 1.6188293E-4)
Perl extension for Apple iTMS internal key descrambling algorithm
This code appears to have only cursory resemblance to Bruce Schneier's blowfish and twofish algorithms in that it too has a table-based decoder. Derivation from FairKeys code by Jon Lech Johanson at nanocrew.net. If you don't know what that is, don't bother looking here further. This is a Pure Perl implementation. I doubt there is any need for xs coding for what would mainly be processing 16 bytes at a time. This code is part of an ongoing effort to clone portions of the Apple iTMS in Perl for portability. See www.hymn-project.org for prior efforts by others.
security/Crypt-PBKDF2-0.161520 (Score: 1.6188293E-4)
PBKDF2 password hashing algorithm
PBKDF2 is a secure password hashing algorithm that uses the techniques of "key strengthening" to make the complexity of a brute-force attack arbitrarily high. PBKDF2 uses any other cryptographic hash or cipher (by convention, usually HMAC-SHA1, but Crypt::PBKDF2 is fully pluggable), and allows for an arbitrary number of iterations of the hashing function, and a nearly unlimited output hash size (up to 2**32 - 1 times the size of the output of the backend hash). The hash is salted, as any password hash should be, and the salt may also be of arbitrary size. See also: RFC2898, PKCS#5 version 2.0: http://tools.ietf.org/html/rfc2898