You are in the presence of a System Administrator. Kneel.
"On Usenet, we vent in a group called alt.sysadmin.recovery. The
group has a FAQ. If you read the FAQ, you will find that you (the
users) subscribe to this group at your own peril. If you want to
be useful, why don't you run over to the supply cabinet and get a
new box of pixels for the monitor. As part of our venting, some
of us have written a series of man pages that we'd like to see."
Manpages you ever needed:
bosskill.8 c.1 chastise.3 ctluser.8 guru.8 knife.8 lart.1m luser.8
normality.5 nuke.8 people.2 pmsd.8 rtfm.1 slave.1 sysadmin.1 think.1
whack.1
Sort files or its standard input using the bogo-sort algorithm
described in the Jargon File <http://www.catb.org/~esr/jargon/>.
A quote from the Jargon File 'bogo-sort' entry:
...The archetypical perversely awful algorithm (as opposed to
_bubble sort_, which is merely the generic bad algorithm).
_Bogo-sort_ is equivalent to repeatedly throwing a deck of cards
in the air, picking them up at random, and then testing whether
they are in order. It serves as a sort of canonical example of
awfulness. Looking at a program and seeing a dumb algorithm, one
might say "Oh, I see, this program uses _bogo-sort_." Esp.
appropriate for algorithms with factorial or super-exponential
running time in the average case and probabilistically infinite
worst-case running time. Compare _bogus_, _brute force_,
_lasherism_...
Pexpect makes Python a better glue for controlling child applications.
Pexpect is a pure Python module for spawning child applications; controlling
them; and responding to expected patterns in their output. Pexpect works like
Don Libes' Expect. Pexpect allows your script to spawn a child application
and control it as if a human were typing commands.
Pexpect can be used for automating interactive applications such as ssh, ftp,
passwd, telnet, etc. It can be used to a automate setup scripts for duplicating
software package installations on different servers. It can be used for
automated software testing. Pexpect is in the spirit of Don Libes' Expect, but
Pexpect is pure Python. The Pexpect interface was designed to be easy to use.
[ excerpt (with adaptations) from developer's README ]
ffmpeg is a hyper fast realtime audio/video encoder, a streaming
server and a generic audio and video file converter.
It can convert a standard video source into several file formats
based on DCT/motion compensation encoding. Sound is compressed in
MPEG audio layer 2 or using an AC3 compatible stream.
What makes ffmpeg interesting ?
- Simple and efficient video encoder: outputs MPEG1, H263, Real
Video(tm), MPEG4, DIVX and MJPEG compatible bitstreams using the
same encoder core.
- Hyper fast MPEG audio layer 2 compression (50 times faster than
realtime on a K6 500).
[snip -> rest on website below]
ffmpeg is made of two programs:
* ffmpeg: soft VCR which encodes in real time to several formats.
It can also encode from any supported input file format to any
input supported format.
* ffserver: high performance live broadcast streaming server based
on the ffmpeg core encoders.
check_multi is kind of a wrapper plugin which takes benefit of the
Nagios 3.x capability to display multiple lines of plugin output.
It calls multiple child plugins and displays their output in the
long_plugin_output. A summary is given in the standard plugin output.
The child return code with the highest severity becomes the parent
(check_multi) plugin return code.
The configuration is very simple: a NRPE-stylish config file contains
a tag for each child plugin and then the check command line.
check_multi can cover complex Business Process Views - using a builtin
state evaluation mechanism. The second benefit is cluster monitoring
with no need for extra services. All you need is provided by check_multi.
LICENSE: GPL2 or later
Hawk is a web based utility for monitoring and comparing hosts on your
network with what is in DNS. Hosts that are answering pings but are not
in DNS may be unauthorized, and addresses in DNS which are not answering
may be able to be reclaimed. Hawk monitors all hosts on the networks
you specify and lets you view them via a web page.
Hawk consists of a backend written in Perl that monitors hosts by ICMP
pings and writes the status to a mysql database. The frontend is in
PHP and lets you select which network to view, and how to view it.
This version has several enhancements to the original; including cleaner
Perl code, a user-definable string to designate unused addresses that
are in DNS, testing that the forward and reverse hostnames match, and
the daemon forks one process pre subnet.
Would you like to summarize and/or log network activity down to the ip address
and port level of detail, but not record every packet?
Ipaudit provides that ability.
Ipaudit listens to a network device in promiscuous mode, and records of every
'connection', each conversation between two ip addresses. A unique connection
is determined by the ip addresses of the two machines, the protocol used
between them and the port numbers (if they are communicating via UDP or TCP).
It uses a hash table to keep track of the number of bytes and packets in both
directions. When ipaudit receives a signal SIGTERM (kill) or SIGINT (kill -2,
usually the same as a Control-C), it stops collecting data and writes the
tabulated results.
Ipaudit is built using the pcap packet capture library to read the network port
from LBNL Network Research Group.
This is an SNMP message encoding and decoding library, providing very
low-level facilities; you pretty much need to read the SNMP RFCs to use
it. It is, however, very fast (it's more than an order of magnitude
faster than Net::SNMP, and it can send a request and parse a response in
only slightly more time than the snmpd from net-snmp takes to parse the
request and send a response), and it's relatively complete --- the
interface is flexible enough that you can use it to write SNMP
management applications, SNMP agents, and test suites for SNMP
implementations.
The package also includes NSNMP::Simple, which lets you get or set a
single OID via SNMP with a single line of code. It's easier to use, and
roughly an order of magnitude faster, than Net::SNMP.
Net::IP::Match::Regexp allows you to check an IP address against one or
more IP ranges. It employs Perl's highly optimized regular expression
engine to do the hard work, so it is very fast. It is optimized for
speed by doing the match against a regexp which implicitly checks the
broadest IP ranges first. An advantage is that the regexp can be
computed and stored in advance (in source code, in a database table,
etc) and reused, saving much time if the IP ranges don't change too
often. The match can optionally report a value (e.g. a network name)
instead of just a boolean, which makes module useful for mapping IP
ranges to names or codes or anything else.
OpenConnect server (ocserv) is an SSL VPN server. Its purpose is
to be a secure, small, fast and configurable VPN server. It implements
the OpenConnect SSL VPN protocol, and has also (currently experimental)
compatibility with clients using the AnyConnect SSL VPN protocol.
The OpenConnect protocol provides a dual TCP/UDP VPN channel, and
uses the standard IETF security protocols to secure it. Both IPv4
and IPv6 are supported.
Ocserv's main features are security through provilege separation
and sandboxing, accounting, and resilience due to a combined use
of TCP and UDP. Authentication occurs in an isolated security
module process, and each user is assigned an unprivileged worker
process, and a networking (tun) device. That not only eases the
control of the resources of each user or group of users, but also
prevents data leak (e.g., heartbleed-style attacks), and privilege
escalation due to any bug on the VPN handling (worker) process. A
management interface allows for viewing and querying logged-in
users.