Portscout is a tool which looks for new versions of software in the
FreeBSD ports tree, and potentially other software repositories. It
is also possible to provide an arbitrary list of software in a simple
XML format.
Various factors make this task a bit more difficult than it might
initially seem. In particular, the array of weird and wonderful
versioning schemes software vendors manage to come up with.
Portscout spawns several child processes and does its version checking
in parallel, while attempting to best-guess strange-looking version
numbers, navigate around unhelpful sites and web servers, and contend
with the CPU-heavy rapidly-expanding FreeBSD ports system.
In addition to all this, it is possible to generate nice HTML reports
and send reminder mails to interested parties.
bayesm covers many important models used in marketing and micro-econometrics
applications. The package includes: Bayes Regression (univariate or
multivariate dep var), Bayes Seemingly Unrelated Regression (SUR), Binary and
Ordinal Probit, Multinomial Logit (MNL) and Multinomial Probit (MNP),
Multivariate Probit, Negative Binomial (Poisson) Regression, Multivariate
Mixtures of Normals (including clustering), Dirichlet Process Prior Density
Estimation with normal base, Hierarchical Linear Models with normal prior and
covariates, Hierarchical Linear Models with a mixture of normals prior and
covariates, Hierarchical Multinomial Logits with a mixture of normals prior
and covariates, Hierarchical Multinomial Logits with a Dirichlet Process
prior and covariates, Hierarchical Negative Binomial Regression Models,
Bayesian analysis of choice-based conjoint data, Bayesian treatment of linear
instrumental variables models, and Analysis of Multivariate Ordinal survey
data with scale usage heterogeneity (as in Rossi et al, JASA (01)).
The MIT Photonic-Bands (MPB) package is a free program for computing the band
structures (dispersion relations) and electromagnetic modes of periodic
dielectric structures, on both serial and parallel computers. It was developed
by Steven G. Johnson at MIT in the Joannopoulos Ab Initio Physics group.
This program computes definite-frequency eigenstates of Maxwell's equations in
periodic dielectric structures for arbitrary wavevectors, using fully-vectorial
and three-dimensional methods. It is especially designed for the study of
photonic crystals (a.k.a. photonic band-gap materials), but is also applicable
to many other problems in optics, such as waveguides and resonator systems.
(For example, it can solve for the modes of waveguides with arbitrary cross-
sections.)
Kalzium is your digital replacement for the periodic table on paper.
It is a program that visualizes the periodic table of elements (PSE)
and includes basic information about all common elements in the PSE.
It has gained much more functions over time.
FEATURES
- Versatile overview of all important data from the elements like
melting points, electron affinity, electron negativity, electron
configuration, radii, mass, ionisation energy.
- Tool to visualize the spectral lines of each element.
- Different colored views for the PSE: separation of the different
blocks, year simulator, temperature simulator.
- Molecular weight calculator.
- An isotope table.
- 3D molecule editor, with a load and save functionality.
- An equation solver for stoichiometric problems.
- Filetype conversion for different types of chemical programs.
- Tool to produce a comprehesive list of all risk and safety
statements.
Gnome-keyring is a program that keep password and other secrets for
users. It is run as a damon in the session, similar to ssh-agent, and
other applications can locate it by an environment variable.
The program can manage several keyrings, each with its own master
password, and there is also a session keyring which is never stored to
disk, but forgotten when the session ends.
The library libgnome-keyring is used by applications to integrate with
the gnome keyring system. However, at this point the library hasn't been
tested and used enought to consider the API to be publically
exposed. Therefore use of libgnome-keyring is at the moment limited to
internal use in the gnome desktop. However, we hope that the
gnome-keyring API will turn out useful and good, so that later it
can be made public for any application to use.
-- Gnome-keyring README
Hpenc is a fast encryption command line tool with the following features:
* Authenticated encryption - your data cannot be forged or corrupted without
detection.
* Parallel processing - hpenc uses block IO and you can process multiple blocks
simultaneously, which is extremely useful if you have multi-core environment.
* Strong ciphers - hpenc uses the state-of-art aes-gcm and chacha20 ciphers
* Easy interface
* Hardware acceleration - hpenc can utilize all its
advanced cryptography functions defined for AES-NI and PCLMULQDQ instructions
(that must be supported by openssl). For those with old or embedded CPU (such
as ARM), hpenc provides portable and fast chacha20 cipher.
* Simple key management
* Secure random numbers generator - hpenc can work as pseudo-random numbers
generator. In a set of standard tests (diehard) on the generated sequences
hpenc generates secure sequences of pseudo-random numbers on a very high
speed (gigabytes per second).
NCrypt is intended to give you security in an insecure environment.
If you are wanting to encrypt files (particularly on a multi-user
system where you don't have root), wishing to hide your activites
from prying eyes, and want to "cover your tracks", then NCrypt is
for you. It is a symmetrical file encryptor/decryptor that gives
you the choice of the top three candidates for AES as the encryption
algorithm (Rijndael, Serpent, Twofish), tries to minimize exposure
of the plaintext password in memory, and can safely erase the
plaintext version from the hard drive. It compiles without any extra
crypto libraries, making it ideal for systems where you just have
a compiler and basic libraries (such as an ISP's shell server).
This module is a Perl-only implementation of the ECB mode. In
combination with a block cipher such as DES, IDEA or Blowfish, you can
encrypt and decrypt messages of arbitrarily long length. Though for
security reasons other modes than ECB such as CBC should be preferred.
See textbooks on cryptography if you want to know why.
The functionality of the module can be accessed via OO methods or via
standard function calls. Remember that some crypting module like for
example Blowfish has to be installed. The syntax follows that of
Crypt::CBC meaning you can access Crypt::ECB exactly like Crypt::CBC,
though Crypt::ECB is more flexible. For example you can change the key
or the cipher without having to create a new crypt object.
This module implements Ueli Maurer's algorithm for generating large
provable primes and secure parameters for public-key cryptosystems.
The generated primes are almost uniformly distributed over the set of
primes of the specified bitsize and expected time for generation is
less than the time required for generating a pseudo-prime of the same
size with Miller-Rabin tests. Detailed description and running time
analysis of the algorithm can be found in Maurer's paper[1].
Crypt::Primes is a pure perl implementation. It uses Math::Pari for
multiple precision integer arithmetic and number theoretic functions.
Random numbers are gathered with Crypt::Random, a perl interface to
/dev/u?random devices found on modern Unix operating systems.
arpCounterattack is a program for detecting and remedying "ARP attacks." It
monitors traffic on any number of Ethernet interfaces and examines ARP replies
and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP
request that is in conflict with its notion of "correct" Ethernet/IP address
pairs, it logs the attack if logging is enabled, and, if the Ethernet
interface that the attack was seen on is configured as being in aggressive
mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with
the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables
of hosts on the local network segment. The corrective gratuitous ARP request
and corrective gratuitous ARP reply can be sent from an Ethernet interface
other than the one that the attack was seen on.