Portupgrade is a tool to upgrade installed packages via ports or
packages. You can upgrade installed packages without having to
reinstall depending or dependent packages. It can automatically trace
dependency chains up and down upgrading packages recursively.
This package also includes the following utilities:
portinstall: Helps you install new ports in a handy way.
portsvnweb: Instantly lets you browse change history via SVNweb.
portversion: Replaces pkg_version(1) and helps you upgrade packages
with portupgrade(1). (runs much faster)
portsclean: Cleans ports workdir's, unreferenced distfiles,
old and orphan shared libraries, and stale packages.
portsdb: Creates binary database from the ports INDEX.
ports_glob: Expands ports globs.
pkg_deinstall: Wraps pkg_delete(1) and provides additional features.
pkg_fetch: Fetches packages from a remote site.
pkg_glob: Expands package globs.
pkg_which: Checks which package a file came from quickly.
pkgdb: Manages and searches the package database.
pkgdu: Display a disk usage for installed packages.
Portupgrade is a tool to upgrade installed packages via ports or
packages. You can upgrade installed packages without having to
reinstall depending or dependent packages. It can automatically trace
dependency chains up and down upgrading packages recursively.
This package also includes the following utilities:
portinstall: Helps you install new ports in a handy way.
portcvsweb: Instantly lets you browse change history via CVSweb.
portversion: Replaces pkg_version(1) and helps you upgrade packages
with portupgrade(1). (runs much faster)
portsclean: Cleans ports workdir's, unreferenced distfiles,
old and orphan shared libraries, and stale packages.
portsdb: Creates binary database from the ports INDEX.
ports_glob: Expands ports globs.
pkg_deinstall: Wraps pkg_delete(1) and provides additional features.
pkg_fetch: Fetches packages from a remote site.
pkg_glob: Expands package globs.
pkg_which: Checks which package a file came from quickly.
pkgdb: Manages and searches the package database.
pkgdu: Display a disk usage for installed packages.
Common Data Format (CDF) is a conceptual data abstraction for storing
multi-dimensional data sets. The basic component of CDF is a software
programming interface that is a device independent view of the CDF data
model. The application developer is insulated from the actual physical
file format for reasons of conceptual simplicity, device independence,
and future expandability. CDF files created on any given platform can
be transported to any other platform on to which CDF is ported and used
with any CDF tools or layered applications. A more detailed introduction
to CDF can be found in the CDF User's Guide.
A comparison between CDF, netCDF, HDF and HDF5 is available at
<http://cdf.gsfc.nasa.gov/html/FAQ.html>.
Figaro's Password Manager 2 is a program that allows you to securely store the
passwords using GTK2 interface. Features include:
- Passwords are encrypted with the AES-256 algorithm.
- Copy passwords or usernames to the clipboard/primary selection.
- If the password is for a web site, FPM2 can keep track of the URLs of your
login screens and can automatically launch your browser. In this capacity,
FPM2 acts as a kind of bookmark manager.
- You can teach FPM2 to launch other applications, and optionally pass
hostnames, usernames or passwords to the command line.
- FPM2 also has a password generator that can choose passwords for you. It
allows you to determine how long the password should be, and what types of
characters (lower case, upper case, numbers and symbols) should be used.
You can even have it avoid ambiguous characters such as a capital O or the
number zero.
- Auto-minimise and/or auto-locking passwords database after configurable time
to the tray icon.
KeyNote is a simple and flexible trust-management system designed to
work well for a variety of large- and small- scale Internet-based
applications. It provides a single, unified language for both local
policies and credentials. KeyNote policies and credentials, called
`assertions,' contain predicates that describe the trusted actions
permitted by the holders of specific public keys. KeyNote assertions
are essentially small, highly-structured programs. A signed
assertion, which can be sent over an untrusted network, is also
called a `credential assertion.' Credential assertions, which also
serve the role of certificates, have the same syntax as policy
assertions but are also signed by the principal delegating the trust.
This is an example implementation of the KeyNote Trust-Management System
as specified in IETF draft <draft-blaze-ietf-trustmgt-keynote-02.txt>.
COPYRIGHT ISSUES:
This version of 'libident' is hereby released into the
Public Domain. It may be distributed for a fee or without
a fee. We only ask you not to pretend you wrote it.
If you make any changes, please send sources or a diff of it to
us (pen@lysator.liu.se or pell@lysator.liu.se), so we can keep
_one_ unified version of libident available...
COMMENTS:
This is the second stab at a small library to interface to the Ident
protocol server. Maybe this will work correctly on some machines.. :-)
The ident-tester.c file is a small daemon (to be started from Inetd)
that does an ident lookup on you if you telnet into it. Can be used
to verify that your Ident server is working correctly.
I'm currently running this "ident-tester" on port 114 at lysator.liu.se
(130.236.254.1) if you wish to test your server.
This module implements TEA, the Tiny Encryption Algorithm, and some Modes of
Use, in Perl and JavaScript.
The $key is a sufficiently longish string; at least 17 random 8-bit bytes for
single encryption.
Crypt::Tea_JS can be used for secret-key encryption in general, or, in
particular, to communicate securely between browser and web-host. In this case,
the simplest arrangement is for the user to enter the key into a JavaScript
variable, and for the host to retrieve that user's key from a database. Or, for
extra security, the first message (or even each message) between browser and
host could contain a random challenge-string, which each end would then turn
into a signature, and use that signature as the encryption-key for the session
(or the reply).
Botan is a crypto library written in C++. It provides a variety of
cryptographic algorithms, including common ones such as AES, MD5, SHA,
HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that
are more obscure or specialized. It also offers X.509v3 certificates
and CRLs, and PKCS #10 certificate requests. A message processing
system that uses a filter/pipeline metaphor allows for many common
cryptographic tasks to be completed with just a few lines of code.
Assembly optimizations for common CPUs, including x86, x86-64, and
PowerPC, offers further speedups for critical tasks such as SHA-1
hashing and multiple precision integer operations.
Botan is licensed under the same permissive terms as FreeBSD itself.
tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and
encryption to create a secure private network between hosts on the Internet.
Because the tunnel appears to the IP level network code as a normal network
device, there is no need to adapt any existing software. This tunnelling
allows VPN sites to share information with each other over the Internet
without exposing any information to others.
A single tinc daemon can accept more than one connection at a time, thus
making it possible to create larger virtual networks, because some
limitations are circumvented.
Instead of most other VPN implementations, tinc encapsulates each network
packet in its own UDP packet, instead of encapsulating all into one TCP or
even PPP over TCP stream. This results in lower latencies, less overhead,
and in general better responsiveness and throughput.
LICENSE: GPL3 or later with execption to link with OpenSSL
bksh is a simple (some would say trivial) program designed to be used
as a shell by ssh or rsh-like programs. All it does it to copy its
input to a restricted set of backup files.
It was made to allow administrators to create backup servers in
potentially hostile environments without allowing full shell access to
the server or the client.
Features:
- tape only or file & tape backups (compile-time config)
- automatic file rotation allows keeping a history of backups
- configurable number of files kept (static compile-time or dynamic)
- allows naming of backup files on command line
- works as a restricted shell to limit access to server
- very simple and short ANSI C code, easy to audit