Net::IP::Match::Regexp allows you to check an IP address against one or
more IP ranges. It employs Perl's highly optimized regular expression
engine to do the hard work, so it is very fast. It is optimized for
speed by doing the match against a regexp which implicitly checks the
broadest IP ranges first. An advantage is that the regexp can be
computed and stored in advance (in source code, in a database table,
etc) and reused, saving much time if the IP ranges don't change too
often. The match can optionally report a value (e.g. a network name)
instead of just a boolean, which makes module useful for mapping IP
ranges to names or codes or anything else.
The Net::Amazon::AWIS module allows you to use the Amazon Alexa Web
Information Service.
The Alexa Web Information Service (AWIS) provides developers with
programmatic access to the information Alexa Internet (www.alexa.com)
collects from its Web Crawl, which currently encompasses more than 100
terabytes of data from over 4 billion Web pages. Developers and Web
site owners can use AWIS as a platform for finding answers to
difficult and interesting problems on the Web, and incorporating them
into their Web applications.
In order to access the Alexa Web Information Service, you will need an
Amazon Web Services Subscription ID. See
http://www.amazon.com/gp/aws/landing.html
Registered developers have free access to the Alexa Web Information
Service during its beta period, but it is limited to 10,000 requests
per subscription ID per day.
There are some limitations, so be sure to read The Amazon Alexa
Web Information Service FAQ.
SSH connection multiplexing: execute commands simultaneously on multiple hosts
via SSH.
datapipe.c is a simple program that allows a listening TCP/IP port to be
constructed on the machine it is running on. Any connections to that port
will then be forwarded to the specified remote host and remote port. This
program can be useful for allowing your Distributed.net clients
communicate to the outside world by running it on a gateway machine that
has access to both the inside firewall and the outside realworld.
Additionally, if you live behind a SOCKS firewall, you can compile this
code with SOCKS support for your system and use it to act as a
"SOCKS translator" for your Distributed.net clients. In this case,
datapipe doesn't even need to be run on a gateway machine.
Arping is a util to find out if a specific IP address on the LAN is 'taken'
and what MAC address owns it. Sure, you *could* just use 'ping' to find out if
it's taken and even if the computer blocks ping (and everything else) you still
get an entry in your arp cache. But what if you aren't on a routable net? Then
you're screwed. Or you use arping.
Roman Shterenzon <roman@xpert.com>
This code was originally forked from Leah Culver and Andy Smith's
oauth.py code (see net/py-oauth).
A number of notable differences exist between this code and its
forefathers:
* 100% unit test coverage.
* The DataStore object has been completely ripped out.
* Classes are no longer prefixed with OAuth.
* The Request class now extends from dict.
* The library is likely no longer compatible with Python 2.3.
* The Client class works and extends from httplib2.
hostapd is a user space daemon for access point and authentication
servers. It implements IEEE 802.11 access point management, IEEE
802.1X/WPA/WPA2/EAP Authenticators, RADIUS client, EAP server, and
RADIUS authentication server. The current version supports Linux
(Host AP, madwifi, mac80211-based drivers) and FreeBSD (net80211).
To use the ports version instead of the base, add:
hostapd_program="/usr/local/sbin/hostapd"
to /etc/rc.conf
ASLOOKUP is the tool which searches the sequence of AS number specified
with the parameter from IRR and indicates the first line of Description
of AS Object.
Advantages:
You can search many AS Numbers at one time.
You can use result of "show ip bgp" command with CISCO router.
You can search to ARIN, JPNIC and APNIC whois dabase.
You can srarch AS Number from IP Addresses.
libtrace is a library for capturing and processing network traffic, similar to
libpcap. Libtrace supports multiple trace formats for both input and output
including live device capture, DAG hardware capture and off-line trace files
(both compressed and uncompressed).
More information about libtrace can be found on the libtrace webpage.
Original port created by Matt Peterson <matt at peterson.org>
Updated for FreeBSD 9.0 by Shane Alcock <salcock at waikato.ac.nz>
The idea is that IPFilter in its current state can already do a simple L4
round-robin in its NAT rules. However, it does not detect or sense when a
service and/or host is down. It will continue to send requests to a downed
service/host.
However, IPFilter lets us add and remove rules on-the-fly so it should be
possible to build a daemon that lets you specify "clusters". In each cluster
you would specify its members/hosts and services. As well as a health-check
for the service to determine its current state.
Once a service was deemed "up" we would add a Round-Robin rule to the NAT
table, and naturally, the reverse once we detect a service as being "down".
In addition to this, this program can optionally add ipf rules to log for RST
(reset) packets coming from the members of your clusters. In the situations
where the software/port goes down, but the host itself is still working, we
would detect failure instantly. (Since the forwarded connections to the service
would trigger a RST packet back). If this option is enabled, l4ip spawns the
"ipmon" command to monitor for the "log" entries given when such a packet is
detected. l4ip will then mark the service down. This is an add-on feature and
is strictly not necessary for functional usage. It is currently only supported
for TCP.