Ports 搜索

共有5,824项符合/net/的查询结果,以下是第661670项(搜索用时0.004秒)
net-mgmt/Net-IP-Match-Regexp-1.01 (Score: 0.08963509)
Efficiently match IP addresses against IP ranges via regexp
Net::IP::Match::Regexp allows you to check an IP address against one or more IP ranges. It employs Perl's highly optimized regular expression engine to do the hard work, so it is very fast. It is optimized for speed by doing the match against a regexp which implicitly checks the broadest IP ranges first. An advantage is that the regexp can be computed and stored in advance (in source code, in a database table, etc) and reused, saving much time if the IP ranges don't change too often. The match can optionally report a value (e.g. a network name) instead of just a boolean, which makes module useful for mapping IP ranges to names or codes or anything else.
www/Net-Amazon-AWIS-0.36 (Score: 0.08963509)
Use the Amazon Alexa Web Information Service
The Net::Amazon::AWIS module allows you to use the Amazon Alexa Web Information Service. The Alexa Web Information Service (AWIS) provides developers with programmatic access to the information Alexa Internet (www.alexa.com) collects from its Web Crawl, which currently encompasses more than 100 terabytes of data from over 4 billion Web pages. Developers and Web site owners can use AWIS as a platform for finding answers to difficult and interesting problems on the Web, and incorporating them into their Web applications. In order to access the Alexa Web Information Service, you will need an Amazon Web Services Subscription ID. See http://www.amazon.com/gp/aws/landing.html Registered developers have free access to the Alexa Web Information Service during its beta period, but it is limited to 10,000 requests per subscription ID per day. There are some limitations, so be sure to read The Amazon Alexa Web Information Service FAQ.
security/net-ssh-multi-1.2.1 (Score: 0.08939017)
SSH connection multiplexing library for Ruby
SSH connection multiplexing: execute commands simultaneously on multiple hosts via SSH.
net/datapipe-1.0 (Score: 0.0890224)
Bind a local port and connect it to a remote socket
datapipe.c is a simple program that allows a listening TCP/IP port to be constructed on the machine it is running on. Any connections to that port will then be forwarded to the specified remote host and remote port. This program can be useful for allowing your Distributed.net clients communicate to the outside world by running it on a gateway machine that has access to both the inside firewall and the outside realworld. Additionally, if you live behind a SOCKS firewall, you can compile this code with SOCKS support for your system and use it to act as a "SOCKS translator" for your Distributed.net clients. In this case, datapipe doesn't even need to be run on a gateway machine.
net/arping-2.15 (Score: 0.088895865)
ARP level "ping" utility
Arping is a util to find out if a specific IP address on the LAN is 'taken' and what MAC address owns it. Sure, you *could* just use 'ping' to find out if it's taken and even if the computer blocks ping (and everything else) you still get an entry in your arp cache. But what if you aren't on a routable net? Then you're screwed. Or you use arping. Roman Shterenzon <roman@xpert.com>
net/oauth2-1.5.211 (Score: 0.088895865)
Python library for OAuth version 1.0
This code was originally forked from Leah Culver and Andy Smith's oauth.py code (see net/py-oauth). A number of notable differences exist between this code and its forefathers: * 100% unit test coverage. * The DataStore object has been completely ripped out. * Classes are no longer prefixed with OAuth. * The Request class now extends from dict. * The library is likely no longer compatible with Python 2.3. * The Client class works and extends from httplib2.
net/hostapd-2.5 (Score: 0.088895865)
IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
hostapd is a user space daemon for access point and authentication servers. It implements IEEE 802.11 access point management, IEEE 802.1X/WPA/WPA2/EAP Authenticators, RADIUS client, EAP server, and RADIUS authentication server. The current version supports Linux (Host AP, madwifi, mac80211-based drivers) and FreeBSD (net80211). To use the ports version instead of the base, add: hostapd_program="/usr/local/sbin/hostapd" to /etc/rc.conf
net/aslookup-0.12 (Score: 0.08885257)
Tool that searches the sequence of AS numbers
ASLOOKUP is the tool which searches the sequence of AS number specified with the parameter from IRR and indicates the first line of Description of AS Object. Advantages: You can search many AS Numbers at one time. You can use result of "show ip bgp" command with CISCO router. You can search to ARIN, JPNIC and APNIC whois dabase. You can srarch AS Number from IP Addresses.
net/libtrace-3.0.19 (Score: 0.08885257)
C library for network packet capture and processing
libtrace is a library for capturing and processing network traffic, similar to libpcap. Libtrace supports multiple trace formats for both input and output including live device capture, DAG hardware capture and off-line trace files (both compressed and uncompressed). More information about libtrace can be found on the libtrace webpage. Original port created by Matt Peterson <matt at peterson.org> Updated for FreeBSD 9.0 by Shane Alcock <salcock at waikato.ac.nz>
net/l4ip-1.0.294 (Score: 0.08885257)
L4 health check daemon for IPFILTER
The idea is that IPFilter in its current state can already do a simple L4 round-robin in its NAT rules. However, it does not detect or sense when a service and/or host is down. It will continue to send requests to a downed service/host. However, IPFilter lets us add and remove rules on-the-fly so it should be possible to build a daemon that lets you specify "clusters". In each cluster you would specify its members/hosts and services. As well as a health-check for the service to determine its current state. Once a service was deemed "up" we would add a Round-Robin rule to the NAT table, and naturally, the reverse once we detect a service as being "down". In addition to this, this program can optionally add ipf rules to log for RST (reset) packets coming from the members of your clusters. In the situations where the software/port goes down, but the host itself is still working, we would detect failure instantly. (Since the forwarded connections to the service would trigger a RST packet back). If this option is enabled, l4ip spawns the "ipmon" command to monitor for the "log" entries given when such a packet is detected. l4ip will then mark the service down. This is an add-on feature and is strictly not necessary for functional usage. It is currently only supported for TCP.