Ports Search

Results 10,81110,820 of 18,669 for descr.zh_CN%3A%E9%81%8F%E5%88%B6%E5%9E%83%E5%9C%BE.(0.012 seconds)
security/zope.security-3.9.0 (Score: 5.3006617E-5)
Zope Security Framework
The Security framework provides a generic mechanism to implement security policies on Python objects.
security/jugyo-twitter_oauth-0.5.0.p5 (Score: 5.3006617E-5)
Fork of Twitter OAuth REST API client library for Ruby
A fork of Twitter OAuth REST API client library for Ruby
security/ssh_askpass_gtk2-0.4 (Score: 5.3006617E-5)
Tiny GTK2 ssh askpass replacement
A small SSH Askpass replacement written with GTK2. Features fullscreen dialog and translucent background.
security/net-sftp-2.1.2 (Score: 5.3006617E-5)
Implementation of the SFTP client protocol
Net::SFTP is a pure Ruby implementation of the SFTP client protocol (versions 1 through 5).
security/roauth-0.0.8 (Score: 5.3006617E-5)
Simple Ruby OAuth library
A simple OAuth library that supports OAuth header signing, and header verifying.
security/twitter_oauth-0.4.94 (Score: 5.3006617E-5)
Twitter OAuth REST API client library for Ruby
twitter_oauth is a Ruby client for the Twitter API using OAuth.
security/libgcrypt-1.7.3 (Score: 5.3006617E-5)
General purpose crypto library based on code used in GnuPG
Libgcrypt is a general purpose crypto library based on the code used in GnuPG.
security/tclsasl-1.0 (Score: 5.3006617E-5)
Tcl interface to the Cyrus SASLv2 library
Tcl SASL provides a Tcl interface to the Cyrus SASLv2 library.
security/vault-0.5.3 (Score: 5.3006617E-5)
Tool for securely accessing secrets
Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log.
security/vpnc-0.5.3 (Score: 5.3006617E-5)
Client for Cisco 3000 VPN Concentrator
VPNC - Client for Cisco 3000 VPN Concentrator, IOS and PIX Vpnc is a VPN client for the Cisco 3000 VPN Concentrator, creating a IPSec-like connection as a tunneling network device for the local system. The created connection is presented as a tunneling network device to the local system. The daemon runs entirely in userspace.