Crafty is a rapidly developing chess engine with more and more features
being added regularly. It can play, analyze, and even annotate games
for you. Crafty can utilize tablebases; these are available for FreeBSD
in the related ports.
The files bitmaps.tgz and sound.tgz are available in your doc directory,
usually /usr/local/share/doc/crafty. The bitmaps are for html
annotations performed by crafty - they should be unpacked into the
directory you normally analyze games into, and all should be fine...
The sounds are for move announcements. Unpack the archive somewhere,
and have a look at the 'speak' script to customize for your use, if
desired.
22.1 -> New "skill" command that can be used to "dumb down" crafty.
"skill <n>" where n is a number between 1 and 100. 100 is max (default)
skill. Skill 70 will drop the playing Elo by about 200 points. Skill
50 will drop it about 400 points. The curve is not linear, and the
closer you get to 1, the lower the rating.
tcptraceroute is a traceroute implementation using TCP packets.
The more traditional traceroute(8) sends out either UDP or ICMP ECHO
packets with a TTL of one, and increments the TTL until the destination
has been reached. By printing the gateways that generate ICMP time
exceeded messages along the way, it is able to determine the path
packets are taking to reach the destination.
The problem is that with the widespread use of firewalls on the modern
Internet, many of the packets that traceroute(8) sends out end up being
filtered, making it impossible to completely trace the path to the
destination. However, in many cases, these firewalls will permit inbound
TCP packets to specific ports that hosts sitting behind the firewall are
listening for connections on. By sending out TCP SYN packets instead of
UDP or ICMP ECHO packets, tcptraceroute is able to bypass the most
common firewall filters.
tcptraceroute is a traceroute implementation using TCP packets.
The more traditional traceroute(8) sends out either UDP or ICMP ECHO packets
with a TTL of one, and increments the TTL until the destination has been
reached. By printing the gateways that generate ICMP time exceeded messages
along the way, it is able to determine the path packets are taking to reach the
destination.
The problem is that with the widespread use of firewalls on the modern Internet,
many of the packets that traceroute(8) sends out end up being filtered, making
it impossible to completely trace the path to the destination. However, in many
cases, these firewalls will permit inbound TCP packets to specific ports that
hosts sitting behind the firewall are listening for connections on. By sending
out TCP SYN packets instead of UDP or ICMP ECHO packets, tcptraceroute is able
to bypass the most common firewall filters.
fwlogwatch is a packet filter and firewall log analyzer
General features:
- Can detect and process log entries in the following formats:
- Linux ipchains, Linux netfilter/iptables, Solaris/BSD/Irix/HP-UX
ipfilter, BSD ipfw, Cisco IOS, Cisco PIX / FWSM, NetScreen,
Windows XP firewall, Elsa Lancom router, Snort IDS
- Entries can be parsed from single, multiple and combined log files,
the parsers to be used can be selected.
- Gzip-compressed logs are supported transparently.
- Can separate recent from old entries and detects timewarps in log files.
- Can recognize 'last message repeated' entries concerning the firewall.
- Integrated resolver for protocols, services and host names.
- Can do lookups in the whois database.
- Own DNS and whois information cache for faster lookups.
- Hosts, networks, ports, chains and branches (targets) can be selected or
excluded as needed.
- Support for internationalization (available in english, german,
portuguese, simplified and traditional chinese, swedish and japanese).
Nmap is a utility for network exploration and security auditing.
It supports various types of host discovery (determine which hosts
are up), many port scanning techniques for different protocols,
version detection (determine service protocols and application
versions listening behind ports), and TCP/IP stack fingerprinting
(remote host OS or device identification). Nmap also offers
flexible target and port specification, decoy/stealth scanning,
sunRPC scanning, and much more.
Also included is Ncat, the nc(1) work-a-like of the Nmap project.
Refer to the separate port security/zenmap for those parts of the
Nmap toolset which depend on python. The translated manual pages
for Nmap are contained in security/nmap-i18n-man.
See the web page and the Phrack Magazine article (Volume 7, Issue 51
September 01, 1997, article 11 of 17) http://nmap.org/p51-11.html
Nikto is an Open Source (GPL) web server scanner which performs
comprehensive tests against web servers for multiple items, including
over 6100 potentially dangerous files/CGIs, checks for outdated
versions of over 950 servers, and version specific problems on over
260 servers. It also checks for server configuration items such as
the presence of multiple index files, HTTP server options, and will
attempt to identify installed web servers and software. Scan items
and plugins are frequently updated and can be automatically updated.
It uses Rain Forest Puppy's LibWhisker (wiretrip.net) for HTTP
functionality, and can perform checks in HTTP or HTTPS. It also
supports basic port scanning and will determine if a web server is
running on any open ports.
Nikto is written by Chris Sullo and David Lodge.
chyves is a bhyve front-end manager. chyves manages type-2 virtualized guests by
utilizing hardware virtualization on a base FreeBSD 10.3+ installation. On a
base install, only FreeBSD guests can run. However, with the installation of
sysutils/grub2-bhyve and sysutils/bhyve-firmware from ports or pkg, most other
OSes can run as a guest, including Windows. See DEPENDENCIES section in the man
page for more information.
chyves is targeted for beginners as well as power users. Beginners should find
chyves relatively easy to use with lots of documentation and demonstrations.
While power users should find utility with features such as true ZFS clones,
PCI passthrough, rapid execution against many guests, disk images, and snapshot
reverted states on boot/reboot to name a few of the advanced features.
The name 'chyves' is the pluralized, big endian alphabetic increment of bhyve.
'chyves' is pronounced like 'chives', part of the Allium genus. The onion is
also in the Allium genus.
This is the KMFL IMEngine for IBus (Intelligent Input Bus) framework.
It allows you to use layouts written in KMN keyboard language through
standard IBus interface, through KMFL compiler (textproc/kmflcomp) and
KMFL library (textproc/libkmfl).
KMFL aims to bring Tavultesoft Keyman functionality to *nix operating
systems. KMFL is being jointly developed by SIL International
(http://www.sil.org) and Tavultesoft (http://www.tavultesoft.com).
The powerful KMN keyboard language supports contextual deadkeys, pre-
and post-processing of keystrokes, rules grouping, 'storing' of
character classes for use in similar rules, custom and Unicode character
constants, SIL Ethnologue language codes, etc.
Official Tavultesoft repository contains keyboards that cover more
than 220 languages. Significant number of them are open source.
The keyboard ports are textproc/kmfl-*.
This plugin is intended to replace the setuidgid functionality of Mojo::Server.
It should be loaded in application startup and it will change the user and
group credentials of the process when Mojo::IOLoop is started, which occurs in
each worker process of a Mojo::Server::Prefork daemon like hypnotoad.
This allows an application to be started as root so it can bind to privileged
ports such as port 80 or 443, but run worker processes as unprivileged users.
However, if the application is not started as root, it will most likely fail to
change credentials. So, you should only set the user/group when the application
is started as root.
https://metacpan.org/pod/Mojolicious::Plugin::SetUserGroup
This perl module provides an Active Server Pages port to the Apache HTTP
Server with perl as the host scripting language. Active Server Pages is
a web application platform that originated with the Microsoft IIS
server. Under Apache for both Win32 and Unix, it allows a developer to
create dynamic web applications with session management and perl code
embedded in static html files.
This is a portable solution, similar to ActiveState PerlScript and MKS
PScript implementation of perl for IIS ASP. Work has been done and will
continue to make ports to and from these other implementations as smooth
as possible.
This module works under the Apache HTTP Server with the mod_perl module
enabled. See http://www.apache.org and http://perl.apache.org for
further information.
For database access, ActiveX, and scripting language issues, please read
the FAQ section.
http://search.cpan.org/dist/Apache-ASP/