The program forwards all IMAP traffic between the client and the server, but
keeps the connection to the server alive after the client logs out. When the
same user attempts to log in again, the proxy will use the cached
username/password pair to authenticate the client, and tie the new client to
the old server connection (which was kept alive).
Lasse L. Johnsen
lasse@freebsdcluster.org
We can call outside defined subroutines from the Safe
compartment using share(), and call methods through the object that is
copied into the Safe compartment using varglob(). However, these
subroutines and methods are still executed in the Safe compartment, so
they cannot call other subroutines that are dynamically qualified with
the package name, such as class methods.
Through Safe::Hole, we can execute outside defined subroutines
in the original main compartment from the Safe compartment.
PDF-Table is intended for table generation using PDF::API2.
from the NetBSD maintainer:
This voice provides an American English male voice using a residual
excited LPC diphone synthesis method. It uses the CMU Lexicon
pronunciations. Prosodic phrasing is provided by a statistically
trained model using part of speech and local distribution of breaks.
Intonation is provided by a CART tree predicting ToBI accents and
an F0 contour generated from a model trained from natural speech.
The duration model is also trained from data using a CART tree.
This voice can be activated via (voice_ked_diphone) .
from the NetBSD maintainer:
This voice provides an American English male voice using a residual
excited LPC diphone synthesis method. It uses the CMU Lexicon
pronunciations. Prosodic phrasing is provided by a statistically
trained model using part of speech and local distribution of breaks.
Intonation is provided by a CART tree predicting ToBI accents and
an F0 contour generated from a model trained from natural speech.
The duration model is also trained from data using a CART tree.
This voice can be activated via (voice_ked_diphone) .
Python utilities for console mail clients like Mutt.
sigpager: Offers an interactive selection of signatures.
urlpager[*]: Searches for urls, and retrieves url selected by user.
Urls include Message-IDs.
urlbatcher[*]: Retrieve urls contained in input.
pybrowser: Can be used as general browser call. Application to
override platform default can be specified via -b option.
viewhtmlmsg[*]: Display html message in browser.
wrap: Word wrap text input. With support for messages
(recognition of quote chars etc.).
[*]needs raw message as input to work correctly.
In Mutt, set pipe_decode=no in conjunction with pipe-message.
Ree stands for ROM extension extractor. Ree will scan your system memory,
address c0000 - f0000 in 512 steps for identification of ROM extensions
(55,aa), if found it will calculate its size (byte after id, multiplied by
512byte steps) and save the output to a .rom file.
This package also comes with fontdump, a program to extract the fonts from your
video BIOS ROMs.
You might ask yourself why collect x86 ROM extensions? It's like collecting
butterflies.
A collection of various .rom files can be found on the project page. Please
submit your ROMs there.
Scapy is a powerful interactive packet manipulation program. It is
able to forge or decode packets of a wide number of protocols, send
them on the wire, capture them, match requests and replies, and much
more. It can easily handle most classical tasks like scanning,
tracerouting, probing, unit tests, attacks or network discovery (it
can replace hping, 85% of nmap, arpspoof, arp-sk, arping, tcpdump,
tethereal, p0f, etc.). It also performs very well at a lot of other
specific tasks that most other tools can't handle, like sending
invalid frames, injecting your own 802.11 frames, combining technics
(VLAN hopping+ARP cache poisoning, VOIP decoding on WEP encrypted
channel, ...), etc.
Steghide is a steganography tool which is able to hide data in "container
files" and to extract this data again. If you do not know what steganography is
take a look at Neil F. Johnson's paper about steganography at
http://www.jjtc.com/Steganography/
Steghide is designed to be portable and configurable and features hiding data
in bmp, wav and au files, blowfish encryption, MD5 hashing of passphrases to
blowfish keys and pseudo-random distribution of hidden bits ("stego bits") in
the container data.
XKeyWrap is a wrapper of key sequence between keyboard and an application
(ex.emacs).
XKeyWrap can record and play key sequence in real time. And XKeyWrap can send
key sequence to an application on other X server over the network.
If you want to read more details, type
% xkeywrap -readme
and
% man xkeywrap
If you want to see a demonstration of XKeyWrap, type
% cp /usr/local/share/examples/xkeywrap/demo.dat .
% cp /usr/local/share/examples/xkeywrap/xkeywrap_demo.c .
% xkeywrap -p -s 2 -f demo.dat -x emacs -geometry 80x25 xkeywrap_demo.c