WavPack is a completely open audio compression format providing lossless,
high-quality lossy, and a unique hybrid compression mode. Although the
technology is loosely based on previous versions of WavPack, the new version
4 format has been designed from the ground up to offer unparalleled
performance and functionality.
In the default lossless mode WavPack acts just like a WinZip compressor for
audio files. However, unlike MP3 or WMA encoding which can affect the sound
quality, not a single bit of the original information is lost, so there's no
chance of degradation. This makes lossless mode ideal for archiving audio
material or any other situation where quality is paramount. The compression
ratio depends on the source material, but generally is between 30% and 70%
(generally lower for typical popular music and somewhat better for classical
music and other sources with greater dynamic range).
The hybrid mode provides all the advantages of lossless compression with an
additional bonus. Instead of creating a single file, this mode creates both
a relatively small, high-quality lossy file that can be used all by itself,
and a "correction" file that (when combined with the lossy file) provides
full lossless restoration. For some users this means never having to choose
between lossless and lossy compression!
DJBDNS is a collection of Domain Name System tools. It includes
several components:
* The dnscache program is a local DNS cache. It accepts recursive DNS
queries from local clients such as web browsers. It collects
responses from remote DNS servers.
* The tinydns program is a fast, UDP-only DNS server. It makes local
DNS information available to the Internet.
* The pickdns program is a load-balancing DNS server. It points
clients to a dynamic selection of IP addresses.
* The walldns program is a reverse DNS wall. It provides matching
reverse and forward records while hiding local host information.
* The dns library handles outgoing and incoming DNS packets. It can be
used by clients such as web browsers to look up host addresses, host
names, MX records, etc. It supports asynchronous resolution.
* The dnsfilter program is a parallel IP-address-to-host-name
converter.
* The dnsip, dnsipq, dnsname, dnstxt, and dnsmx programs are simple
command-line interfaces to DNS.
* The dnsq and dnstrace programs are DNS debugging tools.
Documentation is at the website below,
From The README:
Xblackjack is a MOTIF/OLIT based tool constructed to get you ready for the
casino. It was inspired by a book called "Beat the Dealer" by Edward O.
Thorp, Ph.D. of UCLA. A number of important statistics are maintained for
display, and used by the program to implement Thorp's "Complete Point System"
(high-low system).
Beginners can learn a basic strategy which doesn't require counting. The
best strategy employs a simple card counting technique which can be used to
distinguish favorable situations. Avid players can learn to compute Thorp's
high-low index, which takes the number of unseen cards into account.
The index is used by the program to suggest a bet, indicate when you should
buy insurance, and whether you should stand or hit, etc. You can test the
strategy using a slider to control "autoplay mode". Pressing the message
button below the playing area provides hints; the current count, index
and strategy table are revealed.
mess822 is a library for parsing Internet mail messages. The mess822
package contains several applications that work with qmail:
* ofmipd rewrites messages from dumb clients. It supports a database
of recognized senders and From lines, using cdb for fast lookups.
* new-inject is an experimental new version of qmail-inject. It
includes a flexible user-controlled hostname rewriting mechanism.
* iftocc can be used in .qmail files. It checks whether a known
address is listed in To or Cc.
* 822header, 822field, 822date, and 822received extract various
pieces of information from a mail message.
* 822print converts a message into an easier-to-read format.
mess822 supports the full complexity of RFC 822 address lists, including
address groups, source routes, spaces around dots, etc. It also supports
common RFC 822 extensions: backslashes in atoms, dots in phrases,
addresses without host names, etc. It extracts each address as an
easy-to-use string, with a separate string for the accompanying comment.
mess822 converts RFC 822 dates into libtai's struct caltime format. It
supports numeric time zones, the standard old-fashioned time zones, and
many nonstandard time zones.
Math::Sequence defines a class for simple mathematic sequences with a
recursive definition such as x_(n+1) = 1 / (x_n + 1). Creation of a
Math::Sequence object is described below in the paragraph about the
constructor.
Math::Sequence uses Math::Symbolic to parse and modify the recursive
sequence definitions. That means you specify the sequence as a string
which is parsed by Math::Symbolic. Alternatively, you can pass the
constructor a Math::Symbolic tree directly.
Because Math::Sequence uses Math::Symbolic for its implementation, all
results will be Math::Symbolic objects which may contain other variables
than the sequence variable itself.
Each Math::Sequence object is an iterator to iterate over the elements of
the sequence starting at the first element (which was specified by the
starting element, the second argument to the new() constructor). It offers
facilities to cache all calculated elements and access any element
directly, though unless the element has been cached in a previous
calculation, this is just a shortcut for repeated use of the iterator.
Kerberos V5 is an authentication system developed at MIT.
Abridged from the User Guide:
Under Kerberos, a client sends a request for a ticket to the
Key Distribution Center (KDC). The KDC creates a ticket-granting
ticket (TGT) for the client, encrypts it using the client's
password as the key, and sends the encrypted TGT back to the
client. The client then attempts to decrypt the TGT, using
its password. If the client successfully decrypts the TGT, it
keeps the decrypted TGT, which indicates proof of the client's
identity. The TGT permits the client to obtain additional tickets,
which give permission for specific services.
Since Kerberos negotiates authenticated, and optionally encrypted,
communications between two points anywhere on the internet, it
provides a layer of security that is not dependent on which side of a
firewall either client is on.
The Kerberos V5 package is designed to be easy to use. Most of the
commands are nearly identical to UNIX network programs you are already
used to. Kerberos V5 is a single-sign-on system, which means that you
have to type your password only once per session, and Kerberos does
the authenticating and encrypting transparently.
Jacques Vidrine <n@nectar.com>
Kerberos V5 is an authentication system developed at MIT.
Abridged from the User Guide:
Under Kerberos, a client sends a request for a ticket to the
Key Distribution Center (KDC). The KDC creates a ticket-granting
ticket (TGT) for the client, encrypts it using the client's
password as the key, and sends the encrypted TGT back to the
client. The client then attempts to decrypt the TGT, using
its password. If the client successfully decrypts the TGT, it
keeps the decrypted TGT, which indicates proof of the client's
identity. The TGT permits the client to obtain additional tickets,
which give permission for specific services.
Since Kerberos negotiates authenticated, and optionally encrypted,
communications between two points anywhere on the internet, it
provides a layer of security that is not dependent on which side of a
firewall either client is on.
The Kerberos V5 package is designed to be easy to use. Most of the
commands are nearly identical to UNIX network programs you are already
used to. Kerberos V5 is a single-sign-on system, which means that you
have to type your password only once per session, and Kerberos does
the authenticating and encrypting transparently.
Jacques Vidrine <n@nectar.com>
Kerberos V5 is an authentication system developed at MIT.
Abridged from the User Guide:
Under Kerberos, a client sends a request for a ticket to the
Key Distribution Center (KDC). The KDC creates a ticket-granting
ticket (TGT) for the client, encrypts it using the client's
password as the key, and sends the encrypted TGT back to the
client. The client then attempts to decrypt the TGT, using
its password. If the client successfully decrypts the TGT, it
keeps the decrypted TGT, which indicates proof of the client's
identity. The TGT permits the client to obtain additional tickets,
which give permission for specific services.
Since Kerberos negotiates authenticated, and optionally encrypted,
communications between two points anywhere on the internet, it
provides a layer of security that is not dependent on which side of a
firewall either client is on.
The Kerberos V5 package is designed to be easy to use. Most of the
commands are nearly identical to UNIX network programs you are already
used to. Kerberos V5 is a single-sign-on system, which means that you
have to type your password only once per session, and Kerberos does
the authenticating and encrypting transparently.
Jacques Vidrine <n@nectar.com>
The Perl 5 module Devel::Gladiator iterate's Perl's internal memory
structures and can be used to enumerate all the currently live SVs.
This can be used to hunt leaks and to profile memory usage.
The Devel::Refactor module is for code refactoring.
While Devel::Refactor may be used from Perl programs, it is also
designed to be used with the EPIC plug-in for the eclipse integrated
development environment.