Handling messages to users can be a hassle, certainly when the same module is
used for command-line and in a graphical interfaces, and has to cope with
internationalization at the same time; this set of modules tries to simplify
this. Log::Report combines gettext features with Log::Dispatch-like features.
However, you can also use this module to do only translations or only message
dispatching.
Pod::Usage provides the function "pod2usage()" to print usage messages for a
Perl script based on its embedded pod documentation. Pod::Usage is a subclass of
Pod::PlainText. Please see the POD documentation for this module (embedded in
the file "Usage.pm") for more details. The pod2usage() function is probably the
most generally useful function in this entire distribution since it is useful to
just about any Perl5 script that is invoked from the command-line.
For Perl 6 we've been promised a "yada yada yada" operator, which makes
'...' valid syntax for "I'll fill this bit in later.", allowing the code
to compile, but issue a run-time warning.
But, like many of the other things that may or may not happen in Perl 6,
we can already make this happen in Perl 5.
All you need is to 'use Yada::Yada::Yada' and off you go ...
The ancestor of all 4x (expand/explore/exploit/exterminate) games.
VMS-Empire is a simulation of a full-scale war between two emperors,
the computer and you. Naturally, there is only room for one, so the
object of the game is to destroy the other. The computer plays by the
same rules that you do. This game is the ancestor of all the multiplayer
4X simulations out there, including Civilization and Master of Orion.
Xtic is a board game designed for the X windows environment.
The game is a two-player game, although for the moment,it
is only possible to play against the computer. The board is
composed of 4x4 squares and 16 pieces. Each piece has four
properties: black or brown, horizontal or vertical, solid or hollow,
round or square. This makes up 16 possible combinations and there
is exactly one piece for each possibility.
This is version 1.12.
Ding is a Dictionary lookup program for X windows/Unix. It comes with
a German-English Dictionary with ca. 120,000 entries. It is an
offline version of the dictionary found at:
<URL:http://dict.tu-chemnitz.de/>.
It is based on Tk version >= 8.3 and uses the agrep for searching.
It has many configuration options, such as search preferences,
interface language (English or German), colors. It has history and
help functions and comes with useful key and mouse bindings for quick
and easy lookups.
matplotlib is a python 2D plotting library which produces publication quality
figures using in a variety of hardcopy formats (PNG, JPG, PS, SVG) and
interactive GUI environments (WX, GTK, Tkinter) across platforms. matplotlib
can be used in python scripts, interactively from the python shell (ala matlab
or mathematica), in web application servers generating dynamic charts, or
embedded in GTK, Tk or WX applications; see backends.
Skylable Sx is a reliable, fully distributed cluster solution for your data
storage needs. With Sx you can aggregate the disk space available on multiple
servers and merge it into a single storage system. The cluster makes sure that
your data is always replicated over multiple nodes (the exact number of copies
is defined by the sysadmin) and synchronized. Additionally Sx has built-in
support for deduplication, client-side encryption, on-the-fly compression and
much more.
This is CFS, Matt Blaze's Cryptographic File System. It provides
transparent encryption and decryption of selected directory trees.
It is implemented as a user-level NFS server and thus does not
require any kernel modifications.
For an overview of how to use it, read "${PREFIX}/share/doc/cfs/notes.ms"
and the manual pages. There is a paper describing CFS at:
http://www.crypto.com/papers/cfs.pdf
This is a crypto library for Ada with a nice API and is written for the
i386 and x86_64 hardware architecture.
Symmetric cryptography supported:
* Blockciphers: AES, Twofish, 3DES, Serpent
* Hash functions: SHA-1, SHA-256, SHA-384, SHA-512, Whirlpool
* MACs: RMAC, HMAC, CMAC
* Modes of operation: BPS, CFB, Ctr, OFB
* Authenticated Encryption Schemes: OCB, SIV, McOE
Assymmetric cryptography supported:
* DSA signature scheme
* OEAP-RSA
* ECDSA, ECDH
Unsigned big number library features:
* Primary cyclic group arithmetic (Z_p)
* Binary Field arithmetic support
* Elliptic Curve arithmetic