Ports Search

Results 14,31114,320 of 17,773 for comment.zh_CN%3A%E6%8E%A7%E5%88%B6%E5%8F%B0.(0.031 seconds)
ports-mgmt/portscout-0.8.1 (Score: 1.3490242E-4)
Tool to scan for new versions of FreeBSD ports
Portscout is a tool which looks for new versions of software in the FreeBSD ports tree, and potentially other software repositories. It is also possible to provide an arbitrary list of software in a simple XML format. Various factors make this task a bit more difficult than it might initially seem. In particular, the array of weird and wonderful versioning schemes software vendors manage to come up with. Portscout spawns several child processes and does its version checking in parallel, while attempting to best-guess strange-looking version numbers, navigate around unhelpful sites and web servers, and contend with the CPU-heavy rapidly-expanding FreeBSD ports system. In addition to all this, it is possible to generate nice HTML reports and send reminder mails to interested parties.
science/bayesm-3.0.2 (Score: 1.3490242E-4)
Bayesian Inference for Marketing/Micro-econometrics
bayesm covers many important models used in marketing and micro-econometrics applications. The package includes: Bayes Regression (univariate or multivariate dep var), Bayes Seemingly Unrelated Regression (SUR), Binary and Ordinal Probit, Multinomial Logit (MNL) and Multinomial Probit (MNP), Multivariate Probit, Negative Binomial (Poisson) Regression, Multivariate Mixtures of Normals (including clustering), Dirichlet Process Prior Density Estimation with normal base, Hierarchical Linear Models with normal prior and covariates, Hierarchical Linear Models with a mixture of normals prior and covariates, Hierarchical Multinomial Logits with a mixture of normals prior and covariates, Hierarchical Multinomial Logits with a Dirichlet Process prior and covariates, Hierarchical Negative Binomial Regression Models, Bayesian analysis of choice-based conjoint data, Bayesian treatment of linear instrumental variables models, and Analysis of Multivariate Ordinal survey data with scale usage heterogeneity (as in Rossi et al, JASA (01)).
science/mpb-1.5 (Score: 1.3490242E-4)
MIT Photonic-Bands
The MIT Photonic-Bands (MPB) package is a free program for computing the band structures (dispersion relations) and electromagnetic modes of periodic dielectric structures, on both serial and parallel computers. It was developed by Steven G. Johnson at MIT in the Joannopoulos Ab Initio Physics group. This program computes definite-frequency eigenstates of Maxwell's equations in periodic dielectric structures for arbitrary wavevectors, using fully-vectorial and three-dimensional methods. It is especially designed for the study of photonic crystals (a.k.a. photonic band-gap materials), but is also applicable to many other problems in optics, such as waveguides and resonator systems. (For example, it can solve for the modes of waveguides with arbitrary cross- sections.)
science/kalzium-4.14.3 (Score: 1.3490242E-4)
Periodic table of elements for KDE 4
Kalzium is your digital replacement for the periodic table on paper. It is a program that visualizes the periodic table of elements (PSE) and includes basic information about all common elements in the PSE. It has gained much more functions over time. FEATURES - Versatile overview of all important data from the elements like melting points, electron affinity, electron negativity, electron configuration, radii, mass, ionisation energy. - Tool to visualize the spectral lines of each element. - Different colored views for the PSE: separation of the different blocks, year simulator, temperature simulator. - Molecular weight calculator. - An isotope table. - 3D molecule editor, with a load and save functionality. - An equation solver for stoichiometric problems. - Filetype conversion for different types of chemical programs. - Tool to produce a comprehesive list of all risk and safety statements.
security/gnome-keyring-3.18.3 (Score: 1.3490242E-4)
Program that keeps passwords and other secrets
Gnome-keyring is a program that keep password and other secrets for users. It is run as a damon in the session, similar to ssh-agent, and other applications can locate it by an environment variable. The program can manage several keyrings, each with its own master password, and there is also a session keyring which is never stored to disk, but forgotten when the session ends. The library libgnome-keyring is used by applications to integrate with the gnome keyring system. However, at this point the library hasn't been tested and used enought to consider the API to be publically exposed. Therefore use of libgnome-keyring is at the moment limited to internal use in the gnome desktop. However, we hope that the gnome-keyring API will turn out useful and good, so that later it can be made public for any application to use. -- Gnome-keyring README
security/hpenc-2.0 (Score: 1.3490242E-4)
Fast authenticated encryption CLI tool
Hpenc is a fast encryption command line tool with the following features: * Authenticated encryption - your data cannot be forged or corrupted without detection. * Parallel processing - hpenc uses block IO and you can process multiple blocks simultaneously, which is extremely useful if you have multi-core environment. * Strong ciphers - hpenc uses the state-of-art aes-gcm and chacha20 ciphers * Easy interface * Hardware acceleration - hpenc can utilize all its advanced cryptography functions defined for AES-NI and PCLMULQDQ instructions (that must be supported by openssl). For those with old or embedded CPU (such as ARM), hpenc provides portable and fast chacha20 cipher. * Simple key management * Secure random numbers generator - hpenc can work as pseudo-random numbers generator. In a set of standard tests (diehard) on the generated sequences hpenc generates secure sequences of pseudo-random numbers on a very high speed (gigabytes per second).
security/ncrypt-0.8.1 (Score: 1.3490242E-4)
Advanced AES file encryption tool
NCrypt is intended to give you security in an insecure environment. If you are wanting to encrypt files (particularly on a multi-user system where you don't have root), wishing to hide your activites from prying eyes, and want to "cover your tracks", then NCrypt is for you. It is a symmetrical file encryptor/decryptor that gives you the choice of the top three candidates for AES as the encryption algorithm (Rijndael, Serpent, Twofish), tries to minimize exposure of the plaintext password in memory, and can safely erase the plaintext version from the hard drive. It compiles without any extra crypto libraries, making it ideal for systems where you just have a compiler and basic libraries (such as an ISP's shell server).
security/Crypt-ECB-1.45 (Score: 1.3490242E-4)
Perl module implementing the ECB encryption algorithm
This module is a Perl-only implementation of the ECB mode. In combination with a block cipher such as DES, IDEA or Blowfish, you can encrypt and decrypt messages of arbitrarily long length. Though for security reasons other modes than ECB such as CBC should be preferred. See textbooks on cryptography if you want to know why. The functionality of the module can be accessed via OO methods or via standard function calls. Remember that some crypting module like for example Blowfish has to be installed. The syntax follows that of Crypt::CBC meaning you can access Crypt::ECB exactly like Crypt::CBC, though Crypt::ECB is more flexible. For example you can change the key or the cipher without having to create a new crypt object.
security/Crypt-Primes-0.50 (Score: 1.3490242E-4)
Provable Prime Number Generator suitable for Cryptographic Applications
This module implements Ueli Maurer's algorithm for generating large provable primes and secure parameters for public-key cryptosystems. The generated primes are almost uniformly distributed over the set of primes of the specified bitsize and expected time for generation is less than the time required for generating a pseudo-prime of the same size with Miller-Rabin tests. Detailed description and running time analysis of the algorithm can be found in Maurer's paper[1]. Crypt::Primes is a pure perl implementation. It uses Math::Pari for multiple precision integer arithmetic and number theoretic functions. Random numbers are gathered with Crypt::Random, a perl interface to /dev/u?random devices found on modern Unix operating systems.
security/arpCounterattack-1.2.0 (Score: 1.3490242E-4)
Detects and remedies ARP attacks
arpCounterattack is a program for detecting and remedying "ARP attacks." It monitors traffic on any number of Ethernet interfaces and examines ARP replies and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP request that is in conflict with its notion of "correct" Ethernet/IP address pairs, it logs the attack if logging is enabled, and, if the Ethernet interface that the attack was seen on is configured as being in aggressive mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables of hosts on the local network segment. The corrective gratuitous ARP request and corrective gratuitous ARP reply can be sent from an Ethernet interface other than the one that the attack was seen on.