URI::Query provides simple URI query string manipulation, allowing you to create
and manipulate URI query strings from GET and POST requests in web applications.
This is primarily useful for creating links where you wish to preserve some
subset of the parameters to the current request, and potentially add or replace
others. Given a query string this is doable with regexes, of course, but making
sure you get the anchoring and escaping right is tedious and error-prone - this
module is simpler.
Panoptis is a project started some time ago,
with the aim to stop the Denial of Service
and Distributed Denial of Service attacks that
have been torturing the Internet for the last
few years.
It is based on real-time processing of Cisco (R)
NetFlow (TM) data, since this seems to be the
most efficient approach as it is router-centric,
allowing for automated central response without
intervention from the affected organizations'
network administrators.
The Net_UserAgent object does a number of tests on an HTTP user
agent string. The results of these tests are available via methods of
the object.
This module is based upon the JavaScript browser detection code available
at http://www.mozilla.org/docs/web-developer/sniffer/browser_type.html.
This module had many influences from the lib/Browser.php code in
version 1.3 of Horde.
This code was originally forked from Leah Culver and Andy Smith's
oauth.py code (see net/py-oauth).
A number of notable differences exist between this code and its
forefathers:
* 100% unit test coverage.
* The DataStore object has been completely ripped out.
* Classes are no longer prefixed with OAuth.
* The Request class now extends from dict.
* The library is likely no longer compatible with Python 2.3.
* The Client class works and extends from httplib2.
hostapd is a user space daemon for access point and authentication
servers. It implements IEEE 802.11 access point management, IEEE
802.1X/WPA/WPA2/EAP Authenticators, RADIUS client, EAP server, and
RADIUS authentication server. The current version supports Linux
(Host AP, madwifi, mac80211-based drivers) and FreeBSD (net80211).
To use the ports version instead of the base, add:
hostapd_program="/usr/local/sbin/hostapd"
to /etc/rc.conf
Kamailio is an open source SIP proxy server that is capable of
handling thousands of up calls in a second. Among the features
it provides, are support for TCP, UDP and SCTP, secure communication
via TLS for VoIP (voice, video), accounting, the most popular open
source databases and much more.
Originally starting out as the SIP Express Router (SER) project by
the Fraunhofer Society in 2001, the design team got together in
2008, merged old and new source code and rebranded SER to Kamailio.
Tofu is a practical high-level network game engine, written
in Python and based on Twisted. Tofu is designed for games
where players play one or several characters accross several
levels.
This includes jump'n run games, RPG or RTS, but not Tetris-like
games or board game.
It currently support client-server and single player mode;
peer-to-peer mode may be added later.
Tofu is Free Software, under the GNU LGPL license.
So scr_ipfm is a script written in php, used to graphically show amount of data
downloaded by users in local network. To do that, it uses logs generated by
ipfm program (ipfm is available at the address: http://robert.cheramy.net/ipfm/)
scr_ipfm features:
- sorting by field in, out, host and total
- aggregated data of downloaded amount of data
- daily, monthly, annually and global statistics
Sniffit is a network sniffer for TCP/UDP/ICMP packets.
Sniffit produces very detailed technical details about the packets flowing
through your network (SEQ, ACK, TTL, Window, ...) and also packet contents
in different formats (hex or plain text, ...)
WWW-404: http://reptile.rug.ac.be/~coder/sniffit/sniffit.html
FAQ-404: http://reptile.rug.ac.be/~coder/sniffit/sniffit-FAQ.html
or http://reptile.rug.ac.be/~wvdputte/sniffit_addicts_anonymous/
sngrep - SIP Messages flow viewer
sngrep is a terminal tool that groups SIP (Session Initiation Protocol)
Messages by Call-Id, and displays them in arrow flows similar to the used in
SIP RFCs. The aim of this tool is to make easier the process of learnig or
debugging SIP. It recognizes UDP, TCP and partially TLS SIP packets and
understands bpf filter logic in the same way ngrep and tcpdump does.