Netatalk is an OpenSource software package, that can be used to turn an
inexpensive *NIX machine into an extremely high-performance and reliable
file server for Macintosh computers.
Using Netatalk's AFP 3.2 compliant file-server leads to significantly higher
transmission speeds compared with Macs accessing a server via SaMBa/NFS
while providing clients with the best possible user experience (full support
for Macintosh metadata, flawlessly supporting mixed environments of classic
MacOS and MacOS X clients)
Due to Netatalk speaking AppleTalk, the print-server task can provide
printing clients with full AppleTalk support as well as the server itself
with printing capabilities for AppleTalk-only printers. Starting with
version 2.0, Netatalk seamlessly interacts with CUPS on the server.
After all, Netatalk can be used to act as an AppleTalk router, providing
both segmentation and zone names in Macintosh networks.
The YAZ Proxy is highly configurable and can be used in a number of different
applications, ranging from debugging Z39.50-based applications and protecting
overworked servers, to improving the performance of stateless WWW/Z39.50
gateways. Among other features, it includes:
* SRW/SRU server function, to allow any Z39.50 server to also
support the ZiNG protocols
* Load balancing across multiple backend servers
* Session-sharing and pre-initialization to improve performance in
servers with expensive session initialization
* Configurable request filtering, to keep bad requests from reaching
the server
* XML support -- MARC records can be converted to MARCXML, and
XSLT-transformations allow the proxy to support arbitrary
retrieval schemas in XML
* Load governor function limits requests from aggressive batch-mode clients
* Configurable logging
* Efficient multiplexing software enables small memory footprint and
very high performance
foo2zjs is an open source printer driver for printers that use the Zenographics
ZjStream wire protocol for their print data, such as the Minolta/QMS magicolor
2300 DL or Konica Minolta magicolor 2430 DL. These printers are often
erroneously referred to as winprinters or GDI printers.
However, Microsoft GDI only mandates the API between an application and the
printer driver, not the protocol on the wire between the printer driver and the
printer. In fact, ZjStream printers are raster printers which happen to use a
very efficient wire protocol which was developed by Zenographics and licensed
by most major printer manufacturers for at least some of their product lines.
ZjStream is just one of many wire protocols that are in use today, such as
Postscript, PCL, Epson, etc.
Kst is a fast real-time large-dataset viewing and plotting tool
with basic data analysis functionality. Kst contains many powerful
built-in features and is expandable with plugins and extensions.
Features of Kst include:
- Robust plotting of live "streaming" data.
- Powerful keyboard and mouse plot manipulation.
- Large selection of built-in plotting and data manipulation functions,
such as histograms, equations, and power spectra.
- Color mapping and contour mapping capabilities for three-dimensional
data, as well as matrix and image support.
- Monitoring of events and notifications support.
- Built-in filtering and curve fitting capabilities.
- Convenient command-line interface.
- Powerful graphical user interface.
- Support for several popular data formats.
- Extended annotation objects similar to vector graphics applications.
This port provide Kst 2, which is based on Qt4. It still lacks scripting
support and backward compatibility with Kst 1.x series (you can't open
kst-1 files in Kst 2).
MPQC is the Massively Parallel Quantum Chemistry Program. It computes
properties of atoms and molecules from first principles using the time
independent Schrodinger equation. It runs on a wide range of architectures
ranging from individual workstations to symmetric multiprocessors to
massively parallel computers. Its design is object oriented, using C++.
Capabilities
o Closed shell and general restricted open shell Hartree-Fock energies and
gradients
o Second order open shell perturbation theory (OPT2[2]) and Z-averaged
perturbation theory (ZAPT2) energies.
o Second order closed shell Moller-Plesset perturbation theory energies and
gradients.
o Robust internal coordinate geometry optimizer that efficiently optimizes
molecules with many degrees of freedom.
You can also validate your mpqc binaries when you employ other settings by:
% make validate >& validate.log &
(it may take few days, though)
For details, please see file:///usr/local/share/doc/mpqc/hierarchy.html
or http://www.mpqc.org/mpqc-html/mpqcval.html
BUFR = Binary Universal Form for the Representation of meteorological data.
BUFR is approved by WMO (World Meteorological Organization) as the standard
universal exchange format for meteorological observations, gradually
replacing a lot of older alphanumeric data formats.
This module provides methods for decoding and encoding BUFR messages, and
for displaying information in BUFR B and D tables and in BUFR flag and code
tables.
Installing this module also installs some programs: bufrread.pl,
bufrresolve.pl, bufrencode.pl, bufr_reencode.pl and bufralter.pl. See
https://wiki.met.no/bufr.pm/start for examples of use. For the majority of
potential users of Geo::BUFR I would expect these programs to be all that
you will need Geo::BUFR for.
This perl script is an official DShield client who's purpose is to
read your FreeBSD ipfilter firewall ipmon log file and convert the
log records to the standard DShield reporting record format, and
imbed the converted log records into the body of an email that gets
sent to DShield for automatic addition to their database and abuse
reporting to the offenders ISP if you are an subscribed DShield member.
Script contains user customable defaults which can be overridden with
command line flags. (visit http://www.dshield.org for details).
Script is installed into /usr/local/sbin where you can edit the
defaults to meet your requirements. Issue rehash command to enable.
Joe Barbish
fbsd_user@a1poweruser.com
L0phtCrack 1.5 is a tool for turning Microsoft LANMAN and NT password hashes
back into the original clear text passwords. The program does this using
dictionary cracking and also brute force. L0phtCrack returns not just the
LANMAN password but the NT password up to 14 characters in length.
L0phtCrack includes the ability to dictionary attack or brute force the
network NT server challenge that is used to prevent the OWF (one-way format)
from going across the wire in its plain-text format. Sample network sniffed
challenges are in files sniff.txt and sniff2.txt. This means you can obtain
NT passwords without administrator privileges when you have network access
between the client and the server.
Nikto is an Open Source (GPL) web server scanner which performs
comprehensive tests against web servers for multiple items, including
over 6100 potentially dangerous files/CGIs, checks for outdated
versions of over 950 servers, and version specific problems on over
260 servers. It also checks for server configuration items such as
the presence of multiple index files, HTTP server options, and will
attempt to identify installed web servers and software. Scan items
and plugins are frequently updated and can be automatically updated.
It uses Rain Forest Puppy's LibWhisker (wiretrip.net) for HTTP
functionality, and can perform checks in HTTP or HTTPS. It also
supports basic port scanning and will determine if a web server is
running on any open ports.
Nikto is written by Chris Sullo and David Lodge.
Crypt::Passwd::XS - Full XS implementation of common crypt() algorithms
This module provides several common crypt() schemes as full XS
implementations. It allows you to validate crypted passwords that were
hashed using a scheme that the system's native crypt() implementation
does not support.
The following files are adapted from other sources (primarily DragonFly BSD.)
See the copyright notices in these files for full details:
crypt_to64.c - copyright 1991 University of California
crypt_to64.h - copyright 1991 University of California
des.c - copyright 1994 David Burren, Geoffrey M. Rehmet, Mark R V Murray
md5.c - copyright 1999, 2000, 2002 Aladdin Enterprises
md5.h - copyright 1999, 2000, 2002 Aladdin Enterprises
md5crypt.c - copyright Poul-Henning Kamp
md5crypt.h - copyright Poul-Henning Kamp
sha256crypt.c - public domain reference implementation by Ulrich Drepper
sha512crypt.c - public domain reference implementation by Ulrich Drepper