xmail is an X-based interface to the Berkeley mail program. This
version of xmail depends heavily upon the installation of the
application default resources file for the proper declaration of
features and enhancements documented in the man pages. If the
defaults file or the resource declarations are not installed or in
some manner made accessable to the X11 resource database manager,
xmail will operate in only a minimal fashion.
This version of xmail includes support for decompressing and
displaying the content of an X-Face mail header, if such a header
exists in the message being read. This feature is a compile time
option, and requires the existence of the compface library routines,
which are NOT supplied with the xmail sources. X-Face headers
are compressed bitmap images, typically of the face of the person
owning such a header. The compressed header contains only printable
characters, which allows it to be included in a mail message.
Clasp is an answer set solver for (extended) normal logic programs. It combines
the high-level modeling capacities of answer set programming (ASP) with
state-of-the-art techniques from the area of Boolean constraint solving. The
primary clasp algorithm relies on conflict-driven nogood learning, a technique
that proved very successful for satisfiability checking (SAT). Unlike other
learning ASP solvers, clasp does not rely on legacy software, such as a SAT
solver or any other existing ASP solver. Rather, clasp has been genuinely
developed for answer set solving based on conflict-driven nogood learning.
clasp can be applied as an ASP solver (on SMODELS format, as output by Gringo),
as a SAT solver (on a simplified version of DIMACS/CNF format), or as a PB
solver (on OPB format).
[ excerpt from developer's site ]
- What is GStreamer?
GStreamer allows the construction of graphs of media-handling
components, ranging from simple mp3 playback to complex audio
(mixing) and video (non-linear editing) processing. Applications
can take advantage of advances in codec and filter technology
transparently. Developers can add new codecs and filters by writing
a simple plugin with a clean, generic interface. GStreamer is
released under the LGPL, with many of the included plugins retaining
the license of the code they were derived from, usually GPL or BSD.
- Features:
* Comprehensive Core Library
* Intelligent Plugin Architecture
* Extensive Development Tools
- Is GStreamer a media player?
No, GStreamer is a development framework for creating applications
like media players, video editors, streaming media broadcasters and
so on. That said, very good media players can easily be built on
top of GStreamer and we even include a simple yet functional
mediaplayer with GStreamer called Gst-Player
GStreamer allows the construction of graphs of media-handling
components, ranging from simple mp3 playback to complex audio
(mixing) and video (non-linear editing) processing. Applications
can take advantage of advances in codec and filter technology
transparently. Developers can add new codecs and filters by writing
a simple plugin with a clean, generic interface. GStreamer is
released under the LGPL, with many of the included plugins retaining
the license of the code they were derived from, usually GPL or BSD.
- Features:
* Comprehensive Core Library
* Intelligent Plugin Architecture
* Extensive Development Tools
- Is GStreamer a media player?
No, GStreamer is a development framework for creating applications
like media players, video editors, streaming media broadcasters and
so on. That said, very good media players can easily be built on
top of GStreamer and we even include a simple yet functional
mediaplayer with GStreamer called Gst-Player
hping is a command-line oriented TCP/IP packet assembler/analyzer.
The interface is inspired to the ping(8) Unix command, but hping isn't
only able to send ICMP echo requests. It supports TCP, UDP, ICMP and
RAW-IP protocols, has a traceroute mode, the ability to send files
between a covered channel, and many other features.
While hping was mainly used as a security tool in the past, it can be
used in many ways by people that don't care about security to test
networks and hosts. A subset of the stuff you can do using hping:
- Test firewall rules
- [spoofed] port scanning
- Test net performance using different protocols,
packet size, TOS (type of service) and fragmentation.
- Path MTU discovery
- Files transfering even between really fascist firewall rules.
- Traceroute like under different protocols.
- Firewalk like usage.
- Remote OS fingerprint.
- TCP/IP stack auditing.
EPP is the Extensible Provisioning Protocol. EPP (defined in RFC 3730) is
an application layer client-server protocol for the provisioning and
management of objects stored in a shared central repository. Specified in
XML, the protocol defines generic object management operations and an
extensible framework that maps protocol operations to objects. As of
writing, its only well-developed application is the provisioning of
Internet domain names, hosts, and related contact details.
RFC 3734 defines a TCP based transport model for EPP, and this module
implements a proxy server for this model. You can use it to construct a
daemon that maintains a single connection to the EPP server that can be
used by many local clients, thereby reducing the overhead for each
transaction.
Net::EPP::Proxy is based on the Net::Server framework and
Net::EPP::Client, which it uses to communicate with the server.
KeyNote is a simple and flexible trust-management system designed to
work well for a variety of large- and small- scale Internet-based
applications. It provides a single, unified language for both local
policies and credentials. KeyNote policies and credentials, called
`assertions,' contain predicates that describe the trusted actions
permitted by the holders of specific public keys. KeyNote assertions
are essentially small, highly-structured programs. A signed
assertion, which can be sent over an untrusted network, is also
called a `credential assertion.' Credential assertions, which also
serve the role of certificates, have the same syntax as policy
assertions but are also signed by the principal delegating the trust.
This is an example implementation of the KeyNote Trust-Management System
as specified in IETF draft <draft-blaze-ietf-trustmgt-keynote-02.txt>.
This module implements TEA, the Tiny Encryption Algorithm, and some Modes of
Use, in Perl and JavaScript.
The $key is a sufficiently longish string; at least 17 random 8-bit bytes for
single encryption.
Crypt::Tea_JS can be used for secret-key encryption in general, or, in
particular, to communicate securely between browser and web-host. In this case,
the simplest arrangement is for the user to enter the key into a JavaScript
variable, and for the host to retrieve that user's key from a database. Or, for
extra security, the first message (or even each message) between browser and
host could contain a random challenge-string, which each end would then turn
into a signature, and use that signature as the encryption-key for the session
(or the reply).
The LibXDiff library implements basic and yet complete functionalities to
create file differences/patches to both binary and text files. The library
uses memory files as file abstraction to achieve both performance and
portability. For binary files, LibXDiff implements (with some modification)
the algorithm described in File System Support for Delta Compression by
Joshua P. MacDonald, while for text files it follows directives described in
An O(ND) Difference Algorithm and Its Variations by Eugene W. Myers. Memory
files used by the library are basically a collection of buffers that store the
file content. There are two different requirements for memory files when passed
to diff/patch functions. Text files for diff/patch functions require that a
single line do not have to spawn across two different memory file blocks.
Binary diff/patch functions require memory files to be compact. A compact
memory files is a file whose content is stored inside a single block.
jdresolve resolves IP addresses to hostnames. Any file format is
supported, including those where the line does not begin with the IP
address. One of the strongest features of the program is the support
for recursion, which can drastically reduce the number of unresolved
hosts by faking a hostname based on the network that the IP belongs
to. DNS queries are sent in parallel, which means that you can
decrease run time by increasing the number of simultaneous sockets
used (given a fast enough machine and available bandwidth). By using
the database support, performance can be increased even further, by
using cached data from previous runs.
Included is a tiny shell script called rhost to interface with
jdresolve when resolving a single IP address. Think of it as a smart
replacement for the 'host' utility that comes with bind-utils.