Ports Search

Results 5,1515,160 of 5,161 for /ports-mgmt/.(0.006 seconds)
games/crafty-23.8 (Score: 0.004569729)
Chess program for playing and analyzing games
Crafty is a rapidly developing chess engine with more and more features being added regularly. It can play, analyze, and even annotate games for you. Crafty can utilize tablebases; these are available for FreeBSD in the related ports. The files bitmaps.tgz and sound.tgz are available in your doc directory, usually /usr/local/share/doc/crafty. The bitmaps are for html annotations performed by crafty - they should be unpacked into the directory you normally analyze games into, and all should be fine... The sounds are for move announcements. Unpack the archive somewhere, and have a look at the 'speak' script to customize for your use, if desired. 22.1 -> New "skill" command that can be used to "dumb down" crafty. "skill <n>" where n is a number between 1 and 100. 100 is max (default) skill. Skill 70 will drop the playing Elo by about 200 points. Skill 50 will drop it about 400 points. The curve is not linear, and the closer you get to 1, the lower the rating.
net/tcptraceroute-1.5.b7 (Score: 0.004569729)
Traceroute implementation using TCP packets
tcptraceroute is a traceroute implementation using TCP packets. The more traditional traceroute(8) sends out either UDP or ICMP ECHO packets with a TTL of one, and increments the TTL until the destination has been reached. By printing the gateways that generate ICMP time exceeded messages along the way, it is able to determine the path packets are taking to reach the destination. The problem is that with the widespread use of firewalls on the modern Internet, many of the packets that traceroute(8) sends out end up being filtered, making it impossible to completely trace the path to the destination. However, in many cases, these firewalls will permit inbound TCP packets to specific ports that hosts sitting behind the firewall are listening for connections on. By sending out TCP SYN packets instead of UDP or ICMP ECHO packets, tcptraceroute is able to bypass the most common firewall filters.
net/tcptraceroute-1.5beta7 (Score: 0.004569729)
Traceroute implementation using TCP packets
tcptraceroute is a traceroute implementation using TCP packets. The more traditional traceroute(8) sends out either UDP or ICMP ECHO packets with a TTL of one, and increments the TTL until the destination has been reached. By printing the gateways that generate ICMP time exceeded messages along the way, it is able to determine the path packets are taking to reach the destination. The problem is that with the widespread use of firewalls on the modern Internet, many of the packets that traceroute(8) sends out end up being filtered, making it impossible to completely trace the path to the destination. However, in many cases, these firewalls will permit inbound TCP packets to specific ports that hosts sitting behind the firewall are listening for connections on. By sending out TCP SYN packets instead of UDP or ICMP ECHO packets, tcptraceroute is able to bypass the most common firewall filters.
security/fwlogwatch-1.5 (Score: 0.004569729)
Packet filter and firewall log analyzer
fwlogwatch is a packet filter and firewall log analyzer General features: - Can detect and process log entries in the following formats: - Linux ipchains, Linux netfilter/iptables, Solaris/BSD/Irix/HP-UX ipfilter, BSD ipfw, Cisco IOS, Cisco PIX / FWSM, NetScreen, Windows XP firewall, Elsa Lancom router, Snort IDS - Entries can be parsed from single, multiple and combined log files, the parsers to be used can be selected. - Gzip-compressed logs are supported transparently. - Can separate recent from old entries and detects timewarps in log files. - Can recognize 'last message repeated' entries concerning the firewall. - Integrated resolver for protocols, services and host names. - Can do lookups in the whois database. - Own DNS and whois information cache for faster lookups. - Hosts, networks, ports, chains and branches (targets) can be selected or excluded as needed. - Support for internationalization (available in english, german, portuguese, simplified and traditional chinese, swedish and japanese).
security/nmap-7.25.b2 (Score: 0.004569729)
Port scanning utility for large networks
Nmap is a utility for network exploration and security auditing. It supports various types of host discovery (determine which hosts are up), many port scanning techniques for different protocols, version detection (determine service protocols and application versions listening behind ports), and TCP/IP stack fingerprinting (remote host OS or device identification). Nmap also offers flexible target and port specification, decoy/stealth scanning, sunRPC scanning, and much more. Also included is Ncat, the nc(1) work-a-like of the Nmap project. Refer to the separate port security/zenmap for those parts of the Nmap toolset which depend on python. The translated manual pages for Nmap are contained in security/nmap-i18n-man. See the web page and the Phrack Magazine article (Volume 7, Issue 51 September 01, 1997, article 11 of 17) http://nmap.org/p51-11.html
security/nikto-2.1.6 (Score: 0.004569729)
Web and CGI vulnerability scanner with SSL support
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs, checks for outdated versions of over 950 servers, and version specific problems on over 260 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated. It uses Rain Forest Puppy's LibWhisker (wiretrip.net) for HTTP functionality, and can perform checks in HTTP or HTTPS. It also supports basic port scanning and will determine if a web server is running on any open ports. Nikto is written by Chris Sullo and David Lodge.
sysutils/chyves-0.2.0 (Score: 0.004569729)
bhyve front-end manager
chyves is a bhyve front-end manager. chyves manages type-2 virtualized guests by utilizing hardware virtualization on a base FreeBSD 10.3+ installation. On a base install, only FreeBSD guests can run. However, with the installation of sysutils/grub2-bhyve and sysutils/bhyve-firmware from ports or pkg, most other OSes can run as a guest, including Windows. See DEPENDENCIES section in the man page for more information. chyves is targeted for beginners as well as power users. Beginners should find chyves relatively easy to use with lots of documentation and demonstrations. While power users should find utility with features such as true ZFS clones, PCI passthrough, rapid execution against many guests, disk images, and snapshot reverted states on boot/reboot to name a few of the advanced features. The name 'chyves' is the pluralized, big endian alphabetic increment of bhyve. 'chyves' is pronounced like 'chives', part of the Allium genus. The onion is also in the Allium genus.
textproc/ibus-kmfl-1.0.3 (Score: 0.004569729)
KMFL IMEngine for IBus framework
This is the KMFL IMEngine for IBus (Intelligent Input Bus) framework. It allows you to use layouts written in KMN keyboard language through standard IBus interface, through KMFL compiler (textproc/kmflcomp) and KMFL library (textproc/libkmfl). KMFL aims to bring Tavultesoft Keyman functionality to *nix operating systems. KMFL is being jointly developed by SIL International (http://www.sil.org) and Tavultesoft (http://www.tavultesoft.com). The powerful KMN keyboard language supports contextual deadkeys, pre- and post-processing of keystrokes, rules grouping, 'storing' of character classes for use in similar rules, custom and Unicode character constants, SIL Ethnologue language codes, etc. Official Tavultesoft repository contains keyboards that cover more than 220 languages. Significant number of them are open source. The keyboard ports are textproc/kmfl-*.
Mojolicious plugin to set unprivileged credentials
This plugin is intended to replace the setuidgid functionality of Mojo::Server. It should be loaded in application startup and it will change the user and group credentials of the process when Mojo::IOLoop is started, which occurs in each worker process of a Mojo::Server::Prefork daemon like hypnotoad. This allows an application to be started as root so it can bind to privileged ports such as port 80 or 443, but run worker processes as unprivileged users. However, if the application is not started as root, it will most likely fail to change credentials. So, you should only set the user/group when the application is started as root. https://metacpan.org/pod/Mojolicious::Plugin::SetUserGroup
www/Apache-ASP-2.62 (Score: 0.004569729)
Active Server Pages for Apache
This perl module provides an Active Server Pages port to the Apache HTTP Server with perl as the host scripting language. Active Server Pages is a web application platform that originated with the Microsoft IIS server. Under Apache for both Win32 and Unix, it allows a developer to create dynamic web applications with session management and perl code embedded in static html files. This is a portable solution, similar to ActiveState PerlScript and MKS PScript implementation of perl for IIS ASP. Work has been done and will continue to make ports to and from these other implementations as smooth as possible. This module works under the Apache HTTP Server with the mod_perl module enabled. See http://www.apache.org and http://perl.apache.org for further information. For database access, ActiveX, and scripting language issues, please read the FAQ section. http://search.cpan.org/dist/Apache-ASP/