Ports Search

Results 7,6417,650 of 18,669 for descr.zh_CN%3A%E9%81%8F%E5%88%B6%E5%9E%83%E5%9C%BE.(0.013 seconds)
security/httprint-301 (Score: 1.9307123E-4)
Web server fingerprinting tool
httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature database.
security/lsh-2.1 (Score: 1.9307123E-4)
Secure (encrypted) remote shell compatible with ssh 2
lsh is a client that can connect to the corresponding lshd server. It uses the SECSH protocol, which means that it is compatible with SSH 2.0, except for file transfer, which is not part of SECSH. SECSH uses compression and encryption algorithms that are unencumbered, and lsh itself is GPL. lsh is not as feature-rich as OpenSSH, as it doesn't currently support password-protected keyrings, the SSH 1.X protocols, TCP wrappers, etc. On the other hand, it doesn't require OpenSSL, and doesn't take a lot of work to avoid patented algorithms. Port author's notes on usage and common problems can be found at
security/Crypt-SKey-0.10 (Score: 1.9307123E-4)
Perl S/Key calculator
This module contains a simple S/Key calculator (as described in RFC 1760) implemented in Perl. It exports the function `key' by default, and may optionally export the function `compute'. `compute_md4', `compute_md5', `key_md4', and `key_md5' are provided as convenience functions for selecting either MD4 or MD5 hashes. The default is MD4; this may be changed with with the `$Crypt::SKey::HASH' variable, assigning it the value of `MD4' or `MD5'. You can access any of these functions by exporting them in the same manner as `compute' in the above example. Most S/Key systems use MD4 hashing, but a few (notably OPIE) use MD5.
security/gnupg-2.0.2 (Score: 1.9307123E-4)
Python wrapper for GnuPG
This module allows easy access to GnuPG's key management, encryption and signature functionality from Python programs, by interacting with GnuPG through file descriptors. Input arguments are strictly checked and sanitised, and therefore this module should be safe to use in networked applications requiring direct user input. It is intended for use with Python 2.6 or greater. This is a fork of python-gnupg-0.3.2, patched to fix a potential vulnerability which could result in remote code execution, do to unsanitised inputs being passed to subprocess.Popen([...], shell=True).
security/gag-2.9 (Score: 1.9307123E-4)
Stacheldraht (DOS attack) agent detector
"gag" is a program to scan for "stacheldraht" agents, which are part of an active "stacheldraht" network. It will not detect trinoo, the original Tribe Flood Network (TFN), or TFN2K agents. For methods of detecting trinoo and Tribe Flood Network, see: http://staff.washington.edu/dittrich/misc/trinoo.analysis http://staff.washington.edu/dittrich/misc/tfn.analysis (Why "gag"? Its supposed to be a running joke I started in the trinoo analysis. trinoo/trinot, "tribe"/civilize, gag/sicken&gesundheit!. Read the ddos trilogy to find out!)
security/i2p-0.9.16 (Score: 1.9307123E-4)
Anonymizing network
[ excerpt from developer's web site ] I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person. No network can be "perfectly anonymous". The continued goal of I2P is to make attacks more and more difficult to mount. Its anonymity will get stronger as the size of the network increases and with ongoing academic review.
sysutils/bsdstats-6.0 (Score: 1.9307123E-4)
Monthly script for reporting anonymous statistics about your machine
BSDstats is an attempt to produce reasonably accurate statistics on deployments of BSD operating systems. This is useful for marketing, project advocacy, hardware vendors and purchasers, device driver maintainers, and port maintainers. The major problem that we are trying to address is vendors who do not feel that BSD operating systems present enough of a market to bother supporting. Meant to be run monthly or during bootup, this script submits statistics anonymously to a central server (http://bsdstats.org). Potentially sensitive details like IP addresses and hostnames are not stored by or relayed through the BSDstats server.
sysutils/memtester-4.3.0 (Score: 1.9307123E-4)
Utility to test for faulty memory subsystem
A user-space utility for testing the memory subsystem for faults. It is portable and should compile and work on any 32- or 64-bit Unix-like system. (Yes, even weird, proprietary Unices, and even Mac OS X.) For hardware developers, memtester can be told to test memory starting at a particular physical address as of memtester version 4.1.0. The original source was by Simon Kirby <sim@stormix.com>. The program has been rewritten by Charles Cazabon and many additional tests were added to help catch borderline memory. He also rewrote the original tests (which catch mainly memory bits which are stuck permanently high or low) so that they run approximately an order of magnitude faster.
sysutils/skill-4.1.4 (Score: 1.9307123E-4)
SuperKILL, kill, or renice processes by pid, name, tty, or uid
`skill' is a program which sends signals to processes given any combination of user names, ttys, commands, and pids. `snice' is a program which changes the priority of processes (given the same). It's actually one program which examines argv to determine what action is to be taken on matching processes. It is similar to kill(1) and renice(8), however the command line is completely order independent. There are also verbose, search, and interactive modes of operation. The name `skill' stems from `SuperKILL', but if you use it under `csh', you may discover another reason for calling it `skill' (hint "s!!").
sysutils/tartarus-0.9.8 (Score: 1.9307123E-4)
Wrappers around common Unix tools for simplified backup solution
Tartarus provides a nice wrapper around basic Unix tools such as tar, find and curl (well, that's not that basic) to provide a seamless backup solution, aimed at automatic gathering and backup. It has the ability to do full as well as incremental backups and is published by Stefan Tomanek under the rules of the GPL. Instead of relying on single usage backup scripts or complicated command lines, tartarus reads its configuration from easily manageable configuration files. It can store gathered data in regular files, or upload the backup directly (on the fly) to an FTP server. For more specific usage scenarios, custom methods can also be defined within the config file.