The Extensible Messaging and Presence Protocol (XMPP) is an IETF standard
that provides a complete cross protocol messaging solution. The problem
with current IM solutions is that they are all proprietary and cannot
talk to each other. XMPP seeks to get rid of those barriers.
Net::XMPP is a collection of Perl modules that provide a Perl Developer
access to the XMPP protocol. Using OOP modules we provide a clean
interface to writing anything from a full client to a simple protocol
tester.
py-flowtools extension module gives you a simple python interface
to NetFlow data as stored by Mark Fullmer's flow-tools package.
It contains a class FlowSet which reads the data from a given file
(or from standard input). A FlowSet provides an iterator interface
to access the individual flow records as instances of a second
class called Flow. A Flow provides access to its data through
attribute references.
This is inspired by Julien Schmidt's httprouter, in that it uses a patricia
tree, but the implementation is rather different. Specifically, the routing
rules are relaxed so that a single path segment may be a wildcard in one route
and a static token in another. This gives a nice combination of high
performance with a lot of convenience in designing the routing patterns. In
benchmarks, httptreemux is close to, but slightly slower than, httprouter.
iPXE is the leading open source network boot firmware. It provides a
full PXE implementation enhanced with additional features such as:
* boot from a web server via HTTP
* boot from an iSCSI SAN
* boot from a Fibre Channel SAN via FCoE
* boot from an AoE SAN
* boot from a wireless network
* boot from a wide-area network
* boot from an Infiniband network
* control the boot process with a script
XML_RPC2 is a pear package providing XML_RPC client and server
services.XML-RPC is a simple remote procedure call protocol built
using HTTP as transport and XML as encoding.
As a client library, XML_RPC2 is capable of creating a proxy
class which exposes the methods exported by the server. As a
server library, XML_RPC2 is capable of exposing methods from
a class or object instance, seamlessly exporting local methods
as remotely callable procedures.
The Cyrus SASL (Simple Authentication and Security Layer)
SASL is the Simple Authentication and Security Layer, a method
for adding authentication support to connection-based protocols.
To use SASL, a protocol includes a command for identifying and
authenticating a user to a server and for optionally negotiating
protection of subsequent protocol interactions. If its use is
negotiated, a security layer is inserted between the protocol
and the connection.
Crypt::Random::Seed is a simple mechanism to get strong randomness. The main
purpose of this module is to provide a simple way to generate a seed for a PRNG
such as Math::Random::ISAAC, for use in cryptographic key generation, or as the
seed for an upstream module such as Bytes::Random::Secure. Flags for requiring
non-blocking sources are allowed, as well as a very simple method for plugging
in a source.
TEA is a 64-bit symmetric block cipher with a 128-bit key and a variable number
of rounds (32 is recommended). It has a low setup time, and depends on a
large number of rounds for security, rather than a complex algorithm. It was
developed by David J. Wheeler and Roger M. Needham, and is described at
http://www.ftp.cl.cam.ac.uk/ftp/papers/djw-rmn/djw-rmn-tea.html .
Preference Manager is a class to handle user preferences in a web application,
looking them up in a table using a combination of their userid, and the
preference name to get a value, and (optionally) returning a default value for
the preference if no value could be found for that user.
It is designed to be used alongside the PEAR Auth class, but can be used with
anything that allows you to obtain the user's id - including your own code.
Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities on
a web application that uses Microsoft SQL Server as its back-end.
Its main goal is to provide a remote shell on the vulnerable DB server,
even in a very hostile environment. It should be used by penetration
testers to help and automate the process of taking over a DB Server when
a SQL Injection vulnerability has been discovered.