Ports Search

Results 15,91115,920 of 17,754 for %E6%8E%A7%E5%88%B6%E5%8F%B0.(0.012 seconds)
security/crypto-api-0.13.2 (Score: 5.180394E-5)
Generic interface for cryptographic operations
A generic interface for cryptographic operations (hashes, ciphers, randomness). Maintainers of hash and cipher implementations are encouraged to add instances for the classes defined in Crypto.Classes. Crypto users are similarly encouraged to use the interfaces defined in the Classes module. Any concepts or functions of general use to more than one cryptographic algorithm (ex: padding) is within scope of this package.
security/afterglow-1.6.2 (Score: 5.180394E-5)
Collection of graph-generating scripts
AfterGlow is a collection of scripts which facilitate the process of generating event graphs and treemaps. AfterGlow 1.x is written in Perl and generates output that can be read by GraphViz or LGL. All the scripts and other files for afterglow are installed in %%DATADIR%%
security/amavisd-milter-1.6.0 (Score: 5.180394E-5)
Milter for amavisd-new
amavisd-milter is a sendmail milter for amavisd-new version 2.2.0 and above which use the new AM.PDP protocol. Full amavisd-new functionality is available, including adding spam and virus information header fields, modifying Subject, adding address extensions and removing certain recipients from delivery while delivering the same message to the rest.
security/amavisd-new-2.10.1 (Score: 5.180394E-5)
Mail scanner interface between mailer and content checkers
amavisd-new is a performance-enhanced daemonized version of amavis-perl Note that the installation is different than the original package, and the integration into your MTA can be different, so please read the README and INSTALL files very carefully. amavisd-new also supports SpamAssassin integration.
security/kqoauth-0.98 (Score: 5.180394E-5)
Implementation of OAuth 1.0 in C++ for Qt
kQOAuth is a library written in C++ for Qt that implements the OAuth 1.0 authentication specification RFC 5849 (http://tools.ietf.org/html/rfc5849). Greetings go to Dominik Kapusta for writing the original OAuth library using Qt, QOAuth (http://blog.ayoy.net/2009/6/24/oauth).
security/libscrypt-1.20 (Score: 5.180394E-5)
C library for the scrypt key derivation function
Although the creator of scrypt has written an "example implementation", it doesn't satisfy the "simple library" requirement that prompts developers to implement it. Therefore, I've written my adaptation, which quite simply pulls the relevant parts from the original implementation, then adds a number of harnesses and simplified interfaces. The hope is that through this, any developer can utilise scrypt.
security/md5deep-4.4 (Score: 5.180394E-5)
Program to compute various message digests recursively
md5deep is a cross-platform set of programs to compute various types of message digests on an arbitrary number of files. The programs run on Windows, Linux, *BSD, OS X, Solaris, and should run on most other platforms. md5deep is similar to the md5sum program found in the GNU Coreutils package, but has many additional features.
security/tthsum-1.3.2 (Score: 5.180394E-5)
Command-line utility for generating and checking TTH message digests
tthsum generates and checks TTH checksums (root of the THEX hash tree). The Merkle Hash Tree is a hash construct that exhibits desirable properties for verifying the integrity of files and file subranges in an incremental or out-of-order fashion. The tool uses the Tiger hash algorithm for both the internal and the leaf nodes, and has an interface identical to md5sum.
security/dfvfs-20160918 (Score: 5.180394E-5)
Digital Forensics Virtual File System
dfVFS, or Digital Forensics Virtual File System, provides read-only access to file-system objects from various storage media types and file formats. The goal of dfVFS is to provide a generic interface for accessing file-system objects, for which it uses several back-ends that provide the actual implementation of the various storage media types, volume systems and file systems.
security/op-1.32 (Score: 5.180394E-5)
Controlled privilege escalation tool
The op tool provides a flexible means for system administrators to grant access to certain root operations without having to give them full superuser privileges. Different sets of users may access different operations, and the security-related aspects of each operation can be carefully controlled.