aria2 is a lightweight multi-protocol & multi-source command-line download
utility. It supports HTTP/HTTPS, FTP, BitTorrent and Metalink. aria2 can be
manipulated via built-in JSON-RPC and XML-RPC interfaces. Its features include:
- Multi-Connection Download.
aria2 can download a file from multiple sources/protocols and tries to utilize
your maximum download bandwidth. Really speeds up your download experience.
aria2 doesn't require much memory and CPU time. The physical memory usage is
typically 4MiB (normal HTTP/FTP downloads) to 9MiB (BitTorrent downloads). CPU
usage in BitTorrent with download speed of 2.8MiB/sec is around 6%.
- Fully Featured BitTorrent Client.
All features you want in BitTorrent client are available: DHT, PEX,
Encryption, Magnet URI, Web-Seeding, Selective Downloads and Local Peer
- Metalink Enabled.
aria2 supports The Metalink Download Description Format (aka Metalink v4),
Metalink version 3 and Metalink/HTTP. Metalink offers the file verification,
HTTP/FTP/BitTorrent integration and the various configurations for language,
location, OS, etc.
- Remote Control.
aria2 supports RPC interface to control the aria2 process. The supported
interfaces are JSON-RPC (over HTTP and WebSocket) and XML-RPC.
mod_dosevasive is an evasive maneuvers module for Apache to provide evasive
action in the event of an HTTP DoS or DDoS attack or brute force attack.
It is also designed to be a detection and network management tool, and can be
easily configured to talk to ipchains, firewalls, routers, and etcetera.
mod_dosevasive presently reports abuses via email and syslog facilities.
Detection is performed by creating an internal dynamic hash table of IP
Addresses and URIs, and denying any single IP address from any of the
* Requesting the same page more than a few times per second
* Making more than 50 concurrent requests on the same child per second
* Making any requests while temporarily blacklisted (on a blocking list)
This method has worked well in both single-server script attacks as well as
distributed attacks, but just like other evasive tools, is only as useful to
the point of bandwidth and processor consumption (e.g. the amount of bandwidth
and processor required to receive/process/respond to invalid requests), which
is why it's a good idea to integrate this with your firewalls and routers for
This module instantiates for each listener individually, and therefore has a
built-in cleanup mechanism and scaling capabilities. Because of this per-child
design, legitimate requests are never compromised (even from proxies and NAT
addresses) but only scripted attacks. Even a user repeatedly clicking on
'reload' should not be affected unless they do it maliciously. mod_dosevasive
is fully tweakable through the Apache configuration file, easy to incorporate
into your web server, and easy to use.
Free Tennis is a tennis simulation. The most notable features of Free Tennis
- Real tactics are useful in the game. For example, it is best to take the net
with a slow, low shot (backspin); it is best to play diagonal when you are
decentered horizontally, in order not to give angles; you should get back to
center and behind the baseline after the shot, in order not to be caught in
No-Man's-Land when the opponent hits
- The A.I. is very advanced and reflects those tactics;
- You have total control over the parabola described by the shot;
- The graphic gestures are realistic and elegant;
- Different players have different skills;
- The game is developed by a former tennis player;
Trac uses a minimalistic approach to web-based software project management.
Our mission; to help developers write great software while staying out of
the way. Trac should impose as little as possible on a team's established
development process and policies.
All aspects of Trac have been designed with one single goal, to simplify
tracking and communication of software issues, enhancements and monitoring
What is Trac?
* An integrated system for managing software projects
* An enhanced wiki
* A flexible web-based issue tracker
* An interface to the Subversion revision control system
At the core of Trac lies an integrated wiki and issue/bug database. Using
wiki markup, all objects managed by Trac can directly link to other
issues/bug reports, code changesets, documentation and files.
httptunnel creates a bidirectional virtual data path tunnelled in HTTP
requests. The requests can be sent via an HTTP proxy if so desired.
This can be useful for users behind restrictive firewalls. If WWW
access is allowed through an HTTP proxy, it's possible to use
httptunnel and, say, telnet or PPP to connect to a computer outside
If you still don't understand what this is all about, maybe you
can find some useful information in the FAQ file.
This program is mostly intended for technically oriented users.
They should know what to do.
httptunnel is free software. See COPYING for terms and conditions.
If you like it, I would appreciate if you sent a post card to:
411 13 Goteborg
Torbutton is a 1-click way to enable or disable the use of Tor. It adds a
panel to the statusbar that says "Tor Enabled" (in green) or "Tor Disabled"
(in red). The user may click on the panel to toggle the status. If the user
(or some other extension) changes the proxy settings, the change is
automatically reflected in the statusbar.
Some users may prefer a toolbar button instead of a statusbar panel. Such a
button is included, and one adds it to the toolbar by right-clicking on the
desired toolbar, selecting "Customize...", and then dragging the Torbutton
icon onto the toolbar. There is an option in the preferences to hide the
statusbar panel (Tools->Extensions, select Torbutton, and click on
Newer Firefox versions have the ability to send DNS resolves through the
socks proxy, and Torbutton will make use of this feature if it is
This is a pure-Java implementation of Berkeley DB by SleepyCat (now
Oracle). Java-1.7 is required for building. From the
"Berkeley DB JE was designed from the ground up in Java. It takes full
advantage of the Java environment. The Berkeley DB JE API provides a
Java Collections-style interface, as well as a programmatic interface
similar to the Berkeley DB API.
Berkeley DB JE is different from all other Java databases available
today. Berkeley DB JE is not a relational engine built in Java. It
is a Berkeley DB-style embedded store, with an interface designed
for programmers, not DBAs. Berkeley DB JE's architecture employs a
log-based, no-overwrite storage system, enabling high concurrency and
speed while providing ACID transactions and record-level locking.
Berkeley DB JE efficiently caches most commonly used data in memory,
without exceeding application-specified limits. In this way Berkeley
DB JE works with an application to use available JVM resources while
providing access to very large data sets.
The Berkeley DB JE architecture provides an underlying storage layer
for any Java application requiring high performance, transactional
integrity and recoverability."