Browse Source

- Fix trailing whitespace in pkg-descrs, categories [p-x]*

Approved by:	portmgr blanket
main
Dmitry Marakasov 5 years ago
parent
commit
1f8b48b772
  1. 2
      palm/jpilot/pkg-descr
  2. 2
      polish/fortunepl/pkg-descr
  3. 2
      polish/gnugadu2/pkg-descr
  4. 2
      ports-mgmt/distilator/pkg-descr
  5. 2
      ports-mgmt/freebsd-bugzilla-cli/pkg-descr
  6. 2
      ports-mgmt/managepkg/pkg-descr
  7. 2
      ports-mgmt/pkg-plist/pkg-descr
  8. 2
      ports-mgmt/pkg_rmleaves/pkg-descr
  9. 2
      ports-mgmt/pkgcompare/pkg-descr
  10. 2
      ports-mgmt/porttree/pkg-descr
  11. 2
      print/ansiprint/pkg-descr
  12. 2
      print/asprint/pkg-descr
  13. 8
      print/bibview/pkg-descr
  14. 2
      print/easylatex/pkg-descr
  15. 10
      print/fontforge/pkg-descr
  16. 2
      print/foomatic-db-hpijs/pkg-descr
  17. 4
      print/ghostscript8-base/pkg-descr
  18. 4
      print/ghostscript9-agpl-base/pkg-descr
  19. 4
      print/ghostscript9-agpl-x11/pkg-descr
  20. 4
      print/ghostscript9-base/pkg-descr
  21. 12
      print/html2ps/pkg-descr
  22. 2
      print/jabref/pkg-descr
  23. 4
      print/lprps/pkg-descr
  24. 14
      print/magicfilter/pkg-descr
  25. 2
      print/nenscript/pkg-descr
  26. 2
      print/p910nd/pkg-descr
  27. 2
      print/pdfcube/pkg-descr
  28. 2
      print/pkfonts300/pkg-descr
  29. 2
      print/pkipplib/pkg-descr
  30. 2
      print/py-trml2pdf/pkg-descr
  31. 2
      print/rubygem-pdf-core/pkg-descr
  32. 2
      print/rubygem-prawn-flexible-table/pkg-descr
  33. 6
      print/rubygem-prawn-graph/pkg-descr
  34. 6
      print/rubygem-prawn-svg/pkg-descr
  35. 2
      print/tex-dvipdfmx/pkg-descr
  36. 2
      print/transfig/pkg-descr
  37. 2
      russian/artwiz-ru/pkg-descr
  38. 2
      russian/bugzilla44/pkg-descr
  39. 2
      russian/p5-Lingua-RU-Charset/pkg-descr
  40. 4
      science/2d-rewriter/pkg-descr
  41. 2
      science/colt/pkg-descr
  42. 10
      science/crf++/pkg-descr
  43. 2
      science/ghemical/pkg-descr
  44. 8
      science/ghmm/pkg-descr
  45. 2
      science/gsmc/pkg-descr
  46. 8
      science/h5utils/pkg-descr
  47. 6
      science/harminv/pkg-descr
  48. 2
      science/jstrack/pkg-descr
  49. 2
      science/liblinear/pkg-descr
  50. 2
      science/mcstas-comps/pkg-descr
  51. 2
      science/mcstas/pkg-descr
  52. 6
      science/meep/pkg-descr
  53. 4
      science/minc2/pkg-descr
  54. 2
      science/orthanc/pkg-descr
  55. 2
      science/p5-Mcstas-Tools/pkg-descr
  56. 2
      science/py-hcluster/pkg-descr
  57. 2
      science/pybrain/pkg-descr
  58. 2
      science/pynn/pkg-descr
  59. 2
      science/qcl/pkg-descr
  60. 6
      science/sigrok-cli/pkg-descr
  61. 2
      science/veusz/pkg-descr
  62. 22
      science/xmakemol/pkg-descr
  63. 4
      security/amavisd-new/pkg-descr
  64. 4
      security/apache-xml-security-c/pkg-descr
  65. 6
      security/base/pkg-descr
  66. 26
      security/beecrypt/pkg-descr
  67. 2
      security/bsdsfv/pkg-descr
  68. 2
      security/certificate-transparency/pkg-descr
  69. 2
      security/checkpassword/pkg-descr
  70. 12
      security/cisco-torch/pkg-descr
  71. 4
      security/clamd-stream-client/pkg-descr
  72. 2
      security/clamtk/pkg-descr
  73. 8
      security/cmd5checkpw/pkg-descr
  74. 16
      security/cryptlib/pkg-descr
  75. 8
      security/cryptopp/pkg-descr
  76. 2
      security/cyrus-sasl2-saslauthd/pkg-descr
  77. 2
      security/d0_blind_id/pkg-descr
  78. 10
      security/denyhosts/pkg-descr
  79. 2
      security/digest/pkg-descr
  80. 24
      security/doscan/pkg-descr
  81. 4
      security/fakeident/pkg-descr
  82. 4
      security/fragroute/pkg-descr
  83. 2
      security/fswatch/pkg-descr
  84. 4
      security/fwbuilder/pkg-descr
  85. 4
      security/gcr/pkg-descr
  86. 2
      security/gorilla/pkg-descr
  87. 2
      security/gpass/pkg-descr
  88. 4
      security/gpgdir/pkg-descr
  89. 4
      security/gsfv/pkg-descr
  90. 2
      security/hackbot/pkg-descr
  91. 2
      security/honggfuzz/pkg-descr
  92. 4
      security/hotssh/pkg-descr
  93. 6
      security/hpenc/pkg-descr
  94. 2
      security/i2p/pkg-descr
  95. 2
      security/idea/pkg-descr
  96. 8
      security/ipfilter2dshield/pkg-descr
  97. 4
      security/isnprober/pkg-descr
  98. 26
      security/krb5-112/pkg-descr
  99. 26
      security/krb5-113/pkg-descr
  100. 26
      security/krb5-114/pkg-descr

2
palm/jpilot/pkg-descr

@ -1,5 +1,5 @@
J-Pilot is a desktop organizer application for PalmOS devices. It is meant to
be an alternative to the Palm Desktop for those who run the most popular
Operating Systems in the World, Linux and Unix.
Operating Systems in the World, Linux and Unix.
WWW: http://jpilot.org/

2
polish/fortunepl/pkg-descr

@ -1,4 +1,4 @@
Package contains plenty of funny Polish fortunes.
Package contains plenty of funny Polish fortunes.
Collected from many sources, versatile and facetious.
Based on PLD fortunes.

2
polish/gnugadu2/pkg-descr

@ -2,7 +2,7 @@ Gnugadu2 is a modular instant messenger written with GTK+ targeted
mainly at Polish users of propietary Gadu-Gadu network.
GnuGadu2 sports a plugin extensible architecture. Beside Gadu-Gadu
it also supports Jabber, Tlen.pl, sending smses to Polish mobile
it also supports Jabber, Tlen.pl, sending smses to Polish mobile
phones, spell checking, works with several sound servers.
WWW: http://www.gnugadu.org

2
ports-mgmt/distilator/pkg-descr

@ -1,4 +1,4 @@
A command-line script to check the availability of a ports distfiles. This
A command-line script to check the availability of a ports distfiles. This
script can take advantage of perl threads if available.
WWW: http://people.freebsd.org/~ehaupt/distilator/

2
ports-mgmt/freebsd-bugzilla-cli/pkg-descr

@ -1,4 +1,4 @@
CLI utilities and wrappers for FreeBSD's bugzilla instance with emphasis on
CLI utilities and wrappers for FreeBSD's bugzilla instance with emphasis on
ports. Provides a consistent API which can have pluggable backends.
# Supported Commands

2
ports-mgmt/managepkg/pkg-descr

@ -2,7 +2,7 @@ This script runs though the complete ports tree without stopping after a make
error occurred.
If you call make with any parameter in one of the directories of the ports tree
in FreeBSD the run will stop if make returns with a code bigger than zero. That
means, that it is (in opposite to NetBSD or OpenBSD impossible to run a echo
means, that it is (in opposite to NetBSD or OpenBSD impossible to run a echo
complete build with \"make\" in FreeBSD.
Warning: The run of the script may last days (but you may stop it any time).

2
ports-mgmt/pkg-plist/pkg-descr

@ -1,4 +1,4 @@
Make a pkg-plist for a FreeBSD port. Try to be as "automatic" as possible.
Make a pkg-plist for a FreeBSD port. Try to be as "automatic" as possible.
That's all it does ;-)

2
ports-mgmt/pkg_rmleaves/pkg-descr

@ -1,3 +1,3 @@
pkg_rmleaves finds packages that are not required (depended on) by any
pkg_rmleaves finds packages that are not required (depended on) by any
other installed package and lets you decide (in a beautiful dialog interface)
for each one if you want to keep it or deinstall it.

2
ports-mgmt/pkgcompare/pkg-descr

@ -1,4 +1,4 @@
This program provides for an alternate pkg upgrade procedure.
This program provides for an alternate pkg upgrade procedure.
Move /usr/local to /usr/old-local and /var/db/pkg to /var/db/old-pkg,
then use pkg-compare to generate a list of packages to install.

2
ports-mgmt/porttree/pkg-descr

@ -4,7 +4,7 @@ For a given port determine its dependencies using any combination of the
- PATCH_DEPENDS
- LIB_DEPENDS
- BUILD_DEPENDS
- RUN_DEPENDS
- RUN_DEPENDS
and show them as a pseudo graphical tree.
Use back references for cross-connections.

2
print/ansiprint/pkg-descr

@ -1,4 +1,4 @@
A utility for printing text files (or stdin) through a terminal/terminal
A utility for printing text files (or stdin) through a terminal/terminal
emulator using ANSI escape sequences.
WWW: http://ansiprint.sourceforge.net

2
print/asprint/pkg-descr

@ -1,2 +1,2 @@
A simple browser to allow a user to print. It uses Athena widgets.
A simple browser to allow a user to print. It uses Athena widgets.
The filter doesn't apply correctly however.

8
print/bibview/pkg-descr

@ -1,13 +1,13 @@
BIBVIEW
BIBVIEW
(graphical interface for BibTeX program)
by Holger Martin, Peter Urban, Armin Liebl
by Holger Martin, Peter Urban, Armin Liebl
liebla@informatik.tu-muenchen.de
The program "bibview" is a graphical interface for manipulating
BibTeX databases. It supports the user in making new entries,
searching for entries and moving entries from one BiB to another.
It is possible to work with more than one BiB simultaneously.
It is possible to work with more than one BiB simultaneously.
bibview is implemented with Xt and Athena Widgets.
There are six types of windows in bibview:
The main window contains menus for customizing bibview and
@ -16,7 +16,7 @@
for manipulating the BiB.
The list window (at most one for every open BiB) shows a list of
entries. It displays the fields author, title, type and year.
The card window (at most one for every entry) helps editing an entry.
The card window (at most one for every entry) helps editing an entry.
It contains boxes for each field of the entry (according to the type).
The fields can be edited by putting the mouse cursor into the field.
Macros in fields and the symbol for concatenation ('#') are marked

2
print/easylatex/pkg-descr

@ -1,4 +1,4 @@
EasyLatex is a preprocessor which takes an input file in "pseudo-latex",
and transforms it into proper LaTeX syntax.
and transforms it into proper LaTeX syntax.
WWW: http://easylatex.sourceforge.net/

10
print/fontforge/pkg-descr

@ -1,15 +1,15 @@
FontForge (formerly called PfaEdit) is a PostScript font editor which can
create and modify outline fonts in Type 1, CID-Keyed, TrueType, OpenType
FontForge (formerly called PfaEdit) is a PostScript font editor which can
create and modify outline fonts in Type 1, CID-Keyed, TrueType, OpenType
format. It can generate bitmaps and save in BDF format or embedded bitmaps
in TrueType/OpenType fonts.
in TrueType/OpenType fonts.
It can generate Type3 and SVG fonts if built with multilayer feature.
If you feel the shortage of memory, rebuilding multilayer-disabled
FontForge with FONTFORGE_NO_MULTILAYER defined will save some memory.
If you have installed AutoTrace or Potrace, you can generate outlines
from imported bitmap images.
from imported bitmap images.
For more information, see
For more information, see
WWW: http://fontforge.sourceforge.net/

2
print/foomatic-db-hpijs/pkg-descr

@ -1,4 +1,4 @@
Foomatic data for HP's HPIJS (http://hpinkjet.sourceforge.net)
printer drivers.
printer drivers.
WWW: http://www.linuxprinting.org

4
print/ghostscript8-base/pkg-descr

@ -7,8 +7,8 @@ free use, and free copying and redistribution under certain conditions
(including, in some cases, commercial distribution).
This port includes add-on packages (not part of the official gs release)
o HP8XX driver for HP DeskJet 880C/882C/895C
- http://www.gelhaus.net/hp880c/
o HP8XX driver for HP DeskJet 880C/882C/895C
- http://www.gelhaus.net/hp880c/
o PCL3 driver for HP DeskJet series
- http://home.vrweb.de/martin.lottermoser/pcl3.html
o DJ970 driver for HP DeskJet 970CXi

4
print/ghostscript9-agpl-base/pkg-descr

@ -7,8 +7,8 @@ free use, and free copying and redistribution under certain conditions
(including, in some cases, commercial distribution).
This port includes add-on packages (not part of the official gs release)
o HP8XX driver for HP DeskJet 880C/882C/895C
- http://www.gelhaus.net/hp880c/
o HP8XX driver for HP DeskJet 880C/882C/895C
- http://www.gelhaus.net/hp880c/
o PCL3 driver for HP DeskJet series
- http://home.vrweb.de/martin.lottermoser/pcl3.html
o DJ970 driver for HP DeskJet 970CXi

4
print/ghostscript9-agpl-x11/pkg-descr

@ -7,8 +7,8 @@ free use, and free copying and redistribution under certain conditions
(including, in some cases, commercial distribution).
This port includes add-on packages (not part of the official gs release)
o HP8XX driver for HP DeskJet 880C/882C/895C
- http://www.gelhaus.net/hp880c/
o HP8XX driver for HP DeskJet 880C/882C/895C
- http://www.gelhaus.net/hp880c/
o PCL3 driver for HP DeskJet series
- http://home.vrweb.de/martin.lottermoser/pcl3.html
o DJ970 driver for HP DeskJet 970CXi

4
print/ghostscript9-base/pkg-descr

@ -7,8 +7,8 @@ free use, and free copying and redistribution under certain conditions
(including, in some cases, commercial distribution).
This port includes add-on packages (not part of the official gs release)
o HP8XX driver for HP DeskJet 880C/882C/895C
- http://www.gelhaus.net/hp880c/
o HP8XX driver for HP DeskJet 880C/882C/895C
- http://www.gelhaus.net/hp880c/
o PCL3 driver for HP DeskJet series
- http://home.vrweb.de/martin.lottermoser/pcl3.html
o DJ970 driver for HP DeskJet 970CXi

12
print/html2ps/pkg-descr

@ -8,12 +8,12 @@
recursively following links.
- A table of contents can be generated, either from the links in a document,
or automatically from document headings.
- Configurable page headers/footers, that for example can contain
document title, URL, page number, current heading, and date.
- When converting the PostScript document to PDF - using some other
- Configurable page headers/footers, that for example can contain
document title, URL, page number, current heading, and date.
- When converting the PostScript document to PDF - using some other
program such as version 5.0 or later of Aladdin Ghostscript, or
Adobe Acrobat Distiller - the original hyperlinks in the HTML
documents will be retained in the PDF document.
- Automatic hyphenation and text justification can be selected.
Adobe Acrobat Distiller - the original hyperlinks in the HTML
documents will be retained in the PDF document.
- Automatic hyphenation and text justification can be selected.
WWW: http://www.tdb.uu.se/~jan/html2ps.html

2
print/jabref/pkg-descr

@ -9,7 +9,7 @@ Some of its features:
o Search and fetch references from Medline/PubMed and CiteSeer
o Search, classify and sort entries in your BibTeX files
o import and export of references in various formats
o launch external viewers and insert citations into LyX and Kile
o launch external viewers and insert citations into LyX and Kile
o automatically generate BibTeX keys
o customize (add your own) BibTeX fields

4
print/lprps/pkg-descr

@ -8,9 +8,9 @@ It contains the following programs:
textps simple text to PostScript filter
psrev PostScript page reversal filter
psof banner filter
Some features are:
* Deals intelligently with output generated by the printer: printer
errors (such as ``out of paper'') are logged using syslog.
* Updates status file (displayed by lpq) with printer's current status.

14
print/magicfilter/pkg-descr

@ -1,13 +1,13 @@
MagicFilter
magicfilter is an extensible and customizable automatic printer filter.
It selects an appropriate conversion technique for the input data by
seeking for magic numbers, and then utilizing the appropriate conversion
magicfilter is an extensible and customizable automatic printer filter.
It selects an appropriate conversion technique for the input data by
seeking for magic numbers, and then utilizing the appropriate conversion
utility.
magicfilter is primarily intended for use as the `input filter' by the
lpd print spooler. The options accepted by magicfilter are exactly the
ones passed to the input filter by lpd (unless you build it on a LPRng
system -- in that case, magicfilter accepts no options.)
magicfilter is primarily intended for use as the `input filter' by the
lpd print spooler. The options accepted by magicfilter are exactly the
ones passed to the input filter by lpd (unless you build it on a LPRng
system -- in that case, magicfilter accepts no options.)
WWW: http://www.pell.portland.or.us/~orc/Code/magicfilter/

2
print/nenscript/pkg-descr

@ -12,7 +12,7 @@ The main features of nenscript are:
Features additional to nenscript are:
. automatic wrapping of long lines
. availability under MSDOS
. availability under MSDOS
. executable is self contained - no additional files required
WWW: http://www.ai.mit.edu/projects/im/magnus/nenscript/

2
print/p910nd/pkg-descr

@ -1,4 +1,4 @@
p910nd is a small printer daemon intended for diskless workstations that does
p910nd is a small printer daemon intended for diskless workstations that does
not spool to disk but passes the job directly to the printer.
WWW: http://p910nd.sourceforge.net/

2
print/pdfcube/pkg-descr

@ -4,6 +4,6 @@ documents.
PDF Cube is an OpenGL API-based 3D PDF viewer that adds a compiz/Keynote-like
spinning cube trasition effect to your PDF presentations (including
LaTeX-Beamer and Prosper). You can also zoom on 5 predefined areas of any
presentation page with a smooth zooming effect.
presentation page with a smooth zooming effect.
WWW: http://code.100allora.it/pdfcube

2
print/pkfonts300/pkg-descr

@ -1,3 +1,3 @@
This is English PK fonts package.
This is English PK fonts package.
This package can install 118, 240, 300(default) or 400 dpi fonts.

2
print/pkipplib/pkg-descr

@ -1,6 +1,6 @@
pkipplib is a Python library which can prepare IPP requests with the
help of a somewhat high level API. These requests can then be sent to
an IPP printer or print server (e.g. CUPS). This library can also parse
IPP answers received, and create high level Python objects from them.
IPP answers received, and create high level Python objects from them.
WWW: http://www.pykota.com/software/pkipplib/

2
print/py-trml2pdf/pkg-descr

@ -1,5 +1,5 @@
Tiny RML2PDF is a component of the Open Report project. It can be used with the
Tiny Reporting Server to have a complete solution to render PDF file on the
fly.
fly.
WWW: http://tiny.be

2
print/rubygem-pdf-core/pkg-descr

@ -10,7 +10,7 @@ It supports several PDF features, such as among others:
* page geometries
It is used internally by Prawn (provided in the rubygems-prawn package),
a Ruby PDF generation library.
a Ruby PDF generation library.
WWW: http://prawnpdf.org/
WWW: https://github.com/prawnpdf/pdf-core

2
print/rubygem-prawn-flexible-table/pkg-descr

@ -1,4 +1,4 @@
An extension to Prawn that provides flexible table support, that means be able
to create tables with rowspan and colspan attributes for each cell
to create tables with rowspan and colspan attributes for each cell
WWW: https://github.com/blaxter/prawn-flexible-table

6
print/rubygem-prawn-graph/pkg-descr

@ -1,9 +1,9 @@
Prawn::Graph aims to add this functionality to Prawn by using the
native PDF drawing tools Prawn exposes and a friendly single-method
Prawn::Graph aims to add this functionality to Prawn by using the
native PDF drawing tools Prawn exposes and a friendly single-method
call to draw the graph.
The graphs and the values plotted and drawn are all relatively sized
within the bounds of the width and height you have set and should
within the bounds of the width and height you have set and should
scale pretty well to any size of value. Of course, if things do end
up looking too squashed, you can always just make your graph bigger.

6
print/rubygem-prawn-svg/pkg-descr

@ -1,5 +1,5 @@
An SVG renderer for the Prawn PDF library. This will take an SVG file as
input and render it into your PDF. prawn-svg is in its infancy and does not
support the full SVG specifications.
An SVG renderer for the Prawn PDF library. This will take an SVG file as
input and render it into your PDF. prawn-svg is in its infancy and does not
support the full SVG specifications.
WWW: https://github.com/mogest/prawn-svg

2
print/tex-dvipdfmx/pkg-descr

@ -4,6 +4,6 @@ goal of this project is to support multi-byte character encodings and large
character sets for East Asian languages by CID-keyed font technology. The
secondary goal is to support as many features as pdfTeX developed by Han The
Thanh. This project is a combined work of the dvipdfm-jpn project by
Shunsaku Hirata and its modified one, dvipdfm-kor, by Jin-Hwan Cho.
Shunsaku Hirata and its modified one, dvipdfm-kor, by Jin-Hwan Cho.
WWW: http://project.ktug.or.kr/dvipdfmx/

2
print/transfig/pkg-descr

@ -1,6 +1,6 @@
TransFig is a set of tools for creating TeX documents with graphics
which are portable, in the sense that they can be printed in a wide
variety of environments.
variety of environments.
Drivers currently exist for the following graphics langauges:
AutoCad slide, BOX, (E)EPIC macros, LaTeX picture environment,

2
russian/artwiz-ru/pkg-descr

@ -1,4 +1,4 @@
Russian version of the artwiz fonts.
Russian version of the artwiz fonts.
Supported encodings: ISO10646-1, KOI8-R and CP1251

2
russian/bugzilla44/pkg-descr

@ -1,3 +1,3 @@
Russian localization for Bugzilla bug tracking system.
Russian localization for Bugzilla bug tracking system.
WWW: http://sourceforge.net/projects/bugzilla-ru/

2
russian/p5-Lingua-RU-Charset/pkg-descr

@ -6,7 +6,7 @@ russian part of Unicode and UTF-8. This module can be especially
useful for computers with broken cyrillic locales (like foreign
web hosts).
This module does not use locale or unicode and is written in pure Perl,
This module does not use locale or unicode and is written in pure Perl,
so it will probably work at any computer.
WWW: http://search.cpan.org/dist/Lingua-RU-Charset/

4
science/2d-rewriter/pkg-descr

@ -1,4 +1,4 @@
2d-rewriter is a cellular automata simulator.
2d-rewriter is a cellular automata simulator.
Key features
@ -8,7 +8,7 @@ Ability to emulate Conway's "Life Game" via proper rules specification.
Ability to demonstrate self replicating loops.
Patterns are tried in 4 orientations.
Patterns are tried in 4 orientations.
Cell directions are defined against the pattern orientation.

2
science/colt/pkg-descr

@ -6,6 +6,6 @@ library, and the Concurrent library.
The Colt library provides fundamental general-purpose data structures optimized
for numerical data, such as resizable arrays, dense and sparse matrices
(multi-dimensional arrays), linear algebra, associative containers and buffer
management.
management.
WWW: http://acs.lbl.gov/~hoschek/colt/

10
science/crf++/pkg-descr

@ -1,8 +1,8 @@
CRF++ is a simple, customizable, and open source
implementation of Conditional Random Fields (CRFs)
for segmenting/labeling sequential data. CRF++ is
designed for generic purpose and will be applied to
a variety of NLP tasks, such as Named Entity Recognition,
CRF++ is a simple, customizable, and open source
implementation of Conditional Random Fields (CRFs)
for segmenting/labeling sequential data. CRF++ is
designed for generic purpose and will be applied to
a variety of NLP tasks, such as Named Entity Recognition,
Information Extraction and Text Chunking.
WWW: http://chasen.org/~taku/software/CRF++/

2
science/ghemical/pkg-descr

@ -1,4 +1,4 @@
Ghemical is a computational chemistry software package,
Ghemical is a computational chemistry software package,
Ghemical relies on external code to provide the quantum-mechanical
calculations. Semi-empirical methods MNDO, MINDO/3, AM1 and PM3 come

8
science/ghmm/pkg-descr

@ -1,7 +1,7 @@
The General Hidden Markov Model Library (GHMM) is a C library
with additional Python bindings implementing a wide range of
types of Hidden Markov Models and algorithms:
discrete, continous emissions, basic training,
The General Hidden Markov Model Library (GHMM) is a C library
with additional Python bindings implementing a wide range of
types of Hidden Markov Models and algorithms:
discrete, continous emissions, basic training,
HMM clustering, HMM mixtures.
WWW: http://ghmm.sourceforge.net/

2
science/gsmc/pkg-descr

@ -1,5 +1,5 @@
A program for doing calculation on Smith Chart, similar in functionality to
xsmc but with a simpler user interface; written with GNU/GTK library and
released under GNU/GPL. Written by Lapo Pieri IK5NAX
released under GNU/GPL. Written by Lapo Pieri IK5NAX
WWW: http://www.qsl.net/ik5nax

8
science/h5utils/pkg-descr

@ -1,9 +1,9 @@
h5utils is a set of utilities for visualization and conversion of
h5utils is a set of utilities for visualization and conversion of
scientific data in the free, portable HDF5 format.
Besides providing a simple tool for batch visualization as PNG images,
h5utils also includes programs to convert HDF5 datasets into the formats
required by other free visualization software (e.g. plain text, Vis5d,
Besides providing a simple tool for batch visualization as PNG images,
h5utils also includes programs to convert HDF5 datasets into the formats
required by other free visualization software (e.g. plain text, Vis5d,
and VTK).
WWW: http://ab-initio.mit.edu/wiki/index.php/H5utils

6
science/harminv/pkg-descr

@ -1,7 +1,7 @@
Harminv is a free program (and accompanying library) to solve the problem
of harmonic inversion - given a discrete-time, finite-length signal
that consists of a sum of finitely-many sinusoids (possibly exponentially
decaying) in a given bandwidth, it determines the frequencies, decay
constants, amplitudes, and phases of those sinusoids.
that consists of a sum of finitely-many sinusoids (possibly exponentially
decaying) in a given bandwidth, it determines the frequencies, decay
constants, amplitudes, and phases of those sinusoids.
WWW: http://ab-initio.mit.edu/wiki/index.php/Harminv

2
science/jstrack/pkg-descr

@ -3,6 +3,6 @@ prone to hits from tropical systems (currently only in the Tropical
Atlantic). It's intended to display the NHC/TPC data and give you
what you need to make decisions, etc.. It does NOT, nor will it ever,
attempt to do any forecasting on its own---I leave that to the gurus
at the NHC/TPC.
at the NHC/TPC.
WWW: http://www.jstrack.org/jstrack/

2
science/liblinear/pkg-descr

@ -3,7 +3,7 @@ features. It supports L2-regularized classifiers (L2-loss linear SVM,
L1-loss linear SVM, and logistic regression), L1-regularized classifiers
(L2-loss linear SVM and logistic regression).
Main features of LIBLINEAR include
Main features of LIBLINEAR include
- Same data format as LIBSVM and similar usage
- One-vs-the rest and Crammer & Singer multi-class classification

2
science/mcstas-comps/pkg-descr

@ -2,7 +2,7 @@ McStas - Monte Carlo ray tracing simulations of neutron experiments.
McStas is a tool for simulating neutron instrumentation and experiments
using a ray-tracing formalism. Currently the main use of McStas is in the
field of instrument design.
field of instrument design.
This port contains the McStas component library.

2
science/mcstas/pkg-descr

@ -2,6 +2,6 @@ McStas - Monte Carlo ray tracing simulations of neutron experiments.
McStas is a tool for simulating neutron instrumentation and experiments
using a ray-tracing formalism. Currently the main use of McStas is in the
field of instrument design.
field of instrument design.
WWW: http://www.mcstas.org

6
science/meep/pkg-descr

@ -1,5 +1,5 @@
Meep (or MEEP) is a free finite-difference time-domain (FDTD) simulation
software package developed at MIT to model electromagnetic systems,
along with our MPB eigenmode package.
Meep (or MEEP) is a free finite-difference time-domain (FDTD) simulation
software package developed at MIT to model electromagnetic systems,
along with our MPB eigenmode package.
WWW: http://ab-initio.mit.edu/wiki/index.php/Meep

4
science/minc2/pkg-descr

@ -1,4 +1,4 @@
MINC (Medical Imaging NetCDF) is a medical imaging data format and an
MINC (Medical Imaging NetCDF) is a medical imaging data format and an
associated set of tools and libraries.
WWW: http://www.bic.mni.mcgill.ca/ServicesSoftware/MINC
WWW: http://www.bic.mni.mcgill.ca/ServicesSoftware/MINC

2
science/orthanc/pkg-descr

@ -15,6 +15,6 @@ downloaded in the JSON file format. Furthermore, standard PNG images can
be generated on-the-fly from the DICOM instances by Orthanc.
Orthanc lets its users focus on the content of the DICOM files, hiding
the complexity of the DICOM format and of the DICOM protocol.
the complexity of the DICOM format and of the DICOM protocol.
WWW: http://www.orthanc-server.com/

2
science/p5-Mcstas-Tools/pkg-descr

@ -1,6 +1,6 @@
McStas perl tools to aid in running neutron ray tracing simulations.
McStas is a tool for simulating neutron instrumentation and experiments using
McStas is a tool for simulating neutron instrumentation and experiments using
a ray-tracing formalism. Currently the main use of McStas is in the field of
instrumentation design.

2
science/py-hcluster/pkg-descr

@ -9,6 +9,6 @@ agglomerative clustering. Its features include
The interface is very similar to MATLAB's Statistics
Toolbox API to make code easier to port from MATLAB to
Python/Numpy. The core implementation of this library
is in C for efficiency.
is in C for efficiency.
WWW: http://code.google.com/p/scipy-cluster/

2
science/pybrain/pkg-descr

@ -7,5 +7,5 @@ PyBrain is short for Python-Based Reinforcement Learning,
Artificial Intelligence and Neural Network Library. In fact,
we came up with the name first and later reverse-engineerer
this quite descriptive "Backronym".
WWW: http://pybrain.org/

2
science/pynn/pkg-descr

@ -1,4 +1,4 @@
PyNN (pronounced 'pine') is a simulator-independent language for
building neuronal network models.
building neuronal network models.
WWW: http://neuralensemble.org/PyNN

2
science/qcl/pkg-descr

@ -2,6 +2,6 @@ QCL is a high level, architecture independent programming language for
quantum computers, with a syntax derived from classical procedural
languages like C or Pascal. This allows for the complete implementation
and simulation of quantum algorithms (including classical components)
in one consistent formalism.
in one consistent formalism.
WWW: http://tph.tuwien.ac.at/~oemer/qcl.html

6
science/sigrok-cli/pkg-descr

@ -1,10 +1,10 @@
The sigrok project aims at creating a portable, cross-platform,
Free/Libre/Open-Source signal analysis software suite that supports
various device types, such as logic analyzers, MSOs, oscilloscopes,
multimeters, LCR meters, sound level meters, thermometers,
hygrometers, anemometers, light meters, DAQs, dataloggers,
multimeters, LCR meters, sound level meters, thermometers,
hygrometers, anemometers, light meters, DAQs, dataloggers,
function generators, spectrum analyzers, power supplies,
GPIB interfaces, and more.
GPIB interfaces, and more.
sigrok-cli is a command-line tool written in C, which uses both libsigrok
and libsigrokdecode to provide the basic sigrok functionality from the

2
science/veusz/pkg-descr

@ -4,6 +4,6 @@ output. SVG, EMF and bitmap formats export are also supported.
The program runs under Unix/Linux, Windows or Mac OS X, and
binaries are provided. Data can be read from text, CSV or FITS
files, and data can be manipulated or examined from within the
application.
application.
WWW: http://home.gna.org/veusz/

22
science/xmakemol/pkg-descr

@ -1,21 +1,21 @@
XMakemol is a program written for UN*X operating systems in ANSI C using the X,
Xt and Motif libraries. It can be used to view and manipulate atomic and
molecular data given in xyz format.
Xt and Motif libraries. It can be used to view and manipulate atomic and
molecular data given in xyz format.
XMakemol is a mouse-based application and many features can be accessed by
clicking or dragging the mouse on the main window. Additional popup dialogs
offer a number of additional features.
XMakemol is a mouse-based application and many features can be accessed by
clicking or dragging the mouse on the main window. Additional popup dialogs
offer a number of additional features.
Here is what an XMakemol session might look like. The system is a bucky ball
and the Measure dialog is showing the measurement of bond-lengths, angles and
a torsion angle.
Here is what an XMakemol session might look like. The system is a bucky ball
and the Measure dialog is showing the measurement of bond-lengths, angles and
a torsion angle.
XMakemol can produce output in PostScript (black and white or colour)and in xpm
format (which can be translated to gif format using xpmtoppm and ppmtogif).
format (which can be translated to gif format using xpmtoppm and ppmtogif).
XMakemol can also produce a series of xpm files which can be translated into an
animated gif file using the bundled utility xmake_anim.pl (formerly
gmake_anim.pl). The one above is an animation of the "viagra" molecule
animated gif file using the bundled utility xmake_anim.pl (formerly
gmake_anim.pl). The one above is an animation of the "viagra" molecule
(sidenafil).
WWW: http://www.nongnu.org/xmakemol/

4
security/amavisd-new/pkg-descr

@ -1,8 +1,8 @@
amavisd-new is a performance-enhanced daemonized version of amavis-perl
amavisd-new is a performance-enhanced daemonized version of amavis-perl
Note that the installation is different than the original package, and the
integration into your MTA can be different, so please read the README and
INSTALL files very carefully.
INSTALL files very carefully.
amavisd-new also supports SpamAssassin integration.

4
security/apache-xml-security-c/pkg-descr

@ -1,7 +1,7 @@
Apache XML Security for C++
The Apache XML Security for C++ library is an implementation of the XML
Digital Signature and Encryption specifications, along with some
The Apache XML Security for C++ library is an implementation of the XML
Digital Signature and Encryption specifications, along with some
additional XKMS code.
WWW: http://santuario.apache.org/cindex.html

6
security/base/pkg-descr

@ -1,11 +1,11 @@
BASE is the Basic Analysis and Security Engine. It is based on the code
from the ACID project. This application provides a PHP-based web front-end
to query and analyze the alerts coming from a Snort IDS system.
from the ACID project. This application provides a PHP-based web front-end
to query and analyze the alerts coming from a Snort IDS system.
BASE is a web interface to perform analysis of intrusions that Snort has
detected on your network. It uses a user authentication and role-base
system, so that you as the security admin can decide what and how much
information each user can see. It also has a simple to use, web-based
setup program for people not comfortable with editing files directly.
setup program for people not comfortable with editing files directly.
WWW: http://secureideas.sourceforge.net/

26
security/beecrypt/pkg-descr

@ -5,19 +5,19 @@ some other crypto libraries, BeeCrypt is not designed to solve one
specific problem, like file encryption, but to be a general purpose
toolkit which can be used in a variety of applications.
The BeeCrypt library currently includes:
- Entropy sources for initializing pseudo-random generators
- Pseudo-random generators: FIPS-186, Mersenne Twister
- Block ciphers: Blowfish
- Hash functions: MD5, SHA-1, SHA-256
- Keyed hash functions: MD5/HMAC, SHA-1/HMAC, SHA-256/HMAC
- Multi-precision integer library, with assembler-optimized routines
The BeeCrypt library currently includes:
- Entropy sources for initializing pseudo-random generators
- Pseudo-random generators: FIPS-186, Mersenne Twister
- Block ciphers: Blowfish
- Hash functions: MD5, SHA-1, SHA-256
- Keyed hash functions: MD5/HMAC, SHA-1/HMAC, SHA-256/HMAC
- Multi-precision integer library, with assembler-optimized routines
- Probabilistic primality testing, with optimized small prime trial
division
- Discrete logarithm parameter generation over a prime field
- Diffie-Hellman key agreement
- DHAES encryption scheme
- ElGamal signature scheme (two variants)
- Basic RSA primitives and key pair generation
division
- Discrete logarithm parameter generation over a prime field
- Diffie-Hellman key agreement
- DHAES encryption scheme
- ElGamal signature scheme (two variants)
- Basic RSA primitives and key pair generation
WWW: http://sourceforge.net/projects/beecrypt

2
security/bsdsfv/pkg-descr

@ -1,4 +1,4 @@
BSDsfv is a flexible and highly compatible SFV checksum utility.
BSDsfv is a flexible and highly compatible SFV checksum utility.
Features:

2
security/certificate-transparency/pkg-descr

@ -3,6 +3,6 @@ and auditing SSL certificates in nearly real time. It makes it possible
to detect SSL certificates that have been mistakenly issued by a certificate
authority or maliciously acquired from an otherwise unimpeachable certificate
authority. It also makes it possible to identify certificate authorities
that have gone rogue and are maliciously issuing certificates.
that have gone rogue and are maliciously issuing certificates.
WWW: https://www.certificate-transparency.org/

2
security/checkpassword/pkg-descr

@ -1,5 +1,5 @@
Checkpassword provides a simple, uniform password-checking interface
to all root applications. It is suitable for use by applications such as
login, ftpd, and pop3d.
login, ftpd, and pop3d.
WWW: http://cr.yp.to/checkpwd.html

12
security/cisco-torch/pkg-descr

@ -1,11 +1,11 @@
Cisco-torch is a mass Cisco Vulnerability Scanner.
The main feature that makes Cisco-torch different from similar
tools is the extensive use of forking to launch multiple scanning
processes on the background for maximum scanning efficiency. Also,
it uses several methods of application layer fingerprinting simultaneously,
if needed. We wanted something fast to discover remote Cisco hosts running
Telnet, SSH, Web, NTP and SNMP services and launch dictionary attacks
The main feature that makes Cisco-torch different from similar
tools is the extensive use of forking to launch multiple scanning
processes on the background for maximum scanning efficiency. Also,
it uses several methods of application layer fingerprinting simultaneously,
if needed. We wanted something fast to discover remote Cisco hosts running
Telnet, SSH, Web, NTP and SNMP services and launch dictionary attacks
against the services discovered.
WWW: http://www.hackingciscoexposed.com/?link=tools

4
security/clamd-stream-client/pkg-descr

@ -1,6 +1,6 @@
Small client to ask a clamav antivirus server
if a file containt a virus. May be used with
procmail or maildrop rules. Clamav library
if a file containt a virus. May be used with
procmail or maildrop rules. Clamav library
is not required to be installed on the running
host.

2
security/clamtk/pkg-descr

@ -1,4 +1,4 @@
ClamTk is a GUI front-end for ClamAV using gtk2-perl. It is designed to
be an easy-to-use frontend for Unix systems.
be an easy-to-use frontend for Unix systems.
WWW: http://clamtk.sourceforge.net/

8
security/cmd5checkpw/pkg-descr

@ -1,6 +1,6 @@
cmd5checkpw is a checkpassword compatible authentication program that uses
CRAM-MD5 authentication mode. It was designed primary to work with qmail
but it can be used by any other program that knows how to use checkpassword
compatible authentication.
cmd5checkpw is a checkpassword compatible authentication program that uses
CRAM-MD5 authentication mode. It was designed primary to work with qmail
but it can be used by any other program that knows how to use checkpassword
compatible authentication.
WWW: http://members.elysium.pl/brush/cmd5checkpw/

16
security/cryptlib/pkg-descr

@ -1,14 +1,14 @@
cryptlib is a powerful security toolkit which allows even inexperienced
crypto programmers to easily add encryption and authentication services to
their software. The high-level interface provides anyone with the ability to
add strong security capabilities to an application in as little as half an
hour, without needing to know any of the low-level details which make the
encryption or authentication work. Because of this, cryptlib dramatically
cryptlib is a powerful security toolkit which allows even inexperienced
crypto programmers to easily add encryption and authentication services to
their software. The high-level interface provides anyone with the ability to
add strong security capabilities to an application in as little as half an
hour, without needing to know any of the low-level details which make the
encryption or authentication work. Because of this, cryptlib dramatically
reduces the cost involved in adding security to new or existing applications.
cryptlib provides a standardised interface to a number of popular encryption
algorithms, as well as providing a high-level interface which hides most of
the implementation details and provides an operating-system-independent
algorithms, as well as providing a high-level interface which hides most of
the implementation details and provides an operating-system-independent
encoding method which makes it easy to transfer secured data from one operating
environment to another.

8
security/cryptopp/pkg-descr

@ -1,7 +1,7 @@
Crypto++ Library is a free C++ class library of cryptographic schemes.
One purpose of Crypto++ is to act as a repository of public domain (not
copyrighted) source code. Although the library is copyrighted as a
compilation, the individual files in it (except for a few exceptions listed
in the license) are in the public domain.
One purpose of Crypto++ is to act as a repository of public domain (not
copyrighted) source code. Although the library is copyrighted as a
compilation, the individual files in it (except for a few exceptions listed
in the license) are in the public domain.
WWW: http://www.cryptopp.com/

2
security/cyrus-sasl2-saslauthd/pkg-descr

@ -1,6 +1,6 @@
saslauthd is a daemon process that handles plaintext authentication
requests on behalf of the SASL library.
The server fulfills two roles: it isolates all code requiring
superuser privileges into a single process, and it can be used to
provide proxy authentication services to clients that do not

2
security/d0_blind_id/pkg-descr

@ -1,4 +1,4 @@
Cryptographic library to perform identification using Schnorr
Cryptographic library to perform identification using Schnorr
Identification scheme and Blind RSA Signatures.
WWW: https://github.com/divVerent/d0_blind_id

10
security/denyhosts/pkg-descr

@ -1,8 +1,8 @@
DenyHosts is a script intended to be run by *ix system administrators to
DenyHosts is a script intended to be run by *ix system administrators to
help thwart ssh server attacks.
If you've ever looked at your ssh log (/var/log/auth.log ) you may be alarmed
to see how many hackers attempted to gain access to your server.
If you've ever looked at your ssh log (/var/log/auth.log ) you may be alarmed
to see how many hackers attempted to gain access to your server.
Denyhosts helps you:
- Parses /var/log/auth.log to find all login attempts
- Can be run from the command line, cron or as a daemon (new in 0.9)
@ -11,9 +11,9 @@ Denyhosts helps you:
- Keeps track of each non-existent user (eg. sdada) when a login attempt failed.
- Keeps track of each existing user (eg. root) when a login attempt failed.
- Keeps track of each offending host (hosts can be purged )
- Keeps track of suspicious logins
- Keeps track of suspicious logins
- Keeps track of the file offset, so that you can reparse the same file
- When the log file is rotated, the script will detect it
- When the log file is rotated, the script will detect it
- Appends /etc/hosts.allow
- Optionally sends an email of newly banned hosts and suspicious logins.
- Resolves IP addresses to hostnames, if you want

2
security/digest/pkg-descr

@ -1,5 +1,5 @@
The digest utility is a wrapper for the md5, sha1, sha256, sha384,
sha512, rmd160, tiger and whirlpool message digest algorithms (also
sha512, rmd160, tiger and whirlpool message digest algorithms (also
known as hashes, checksums or "fingerprints").
WWW: http://cvsweb.NetBSD.org/bsdweb.cgi/pkgsrc/pkgtools/digest/

24
security/doscan/pkg-descr

@ -1,21 +1,21 @@
Doscan is a tool to quickly scan your network for machines listening on a
Doscan is a tool to quickly scan your network for machines listening on a
TCP port, opening thousands of TCP connections in parallel.
Features
High scanning rate: five to ten minutes per 100,000 addresses (which
High scanning rate: five to ten minutes per 100,000 addresses (which
are sparsely populated with hosts), with rather conservative timeouts.
Load distribution: doscan scans the addresses in a seemingly random
order. If your scan host is connected to a central router, this ensures
that the load is distributed across your network, and you are
Load distribution: doscan scans the addresses in a seemingly random
order. If your scan host is connected to a central router, this ensures
that the load is distributed across your network, and you are
stress-testing just a single router, and not your edge devices.
Low memory consumption: memory usage is proportional to the number
of hosts which have responded so far, and to the number of parallel
connections. The total number of addresses does not influence memory usage
Low memory consumption: memory usage is proportional to the number
of hosts which have responded so far, and to the number of parallel
connections. The total number of addresses does not influence memory usage
in any way.
Can collect responses: doscan optionally records data which is sent
by the hosts which are being scanned. You can even specify a regular
expression to extract part of a server banner, and a message to send to
Can collect responses: doscan optionally records data which is sent
by the hosts which are being scanned. You can even specify a regular
expression to extract part of a server banner, and a message to send to
trigger a response (great for determining HTTP server versions).
Extensibility: It is possible to add special handlers for TCP-based
Extensibility: It is possible to add special handlers for TCP-based
protocols, using a straightforward interface.
It supports scanning the vulnerable Microsoft DCOM implementation.

4
security/fakeident/pkg-descr

@ -1,5 +1,5 @@
Fake Identd is a tool that replies with a standard answer to all incoming
identd requests on a host, making it nearly perfect for a masquerading
Fake Identd is a tool that replies with a standard answer to all incoming
identd requests on a host, making it nearly perfect for a masquerading
router.
WWW: http://hangout.de/fakeidentd/index.html

4
security/fragroute/pkg-descr

@ -1,12 +1,12 @@
"Fragroute intercepts, modifies, and rewrites egress traffic destined
for a specified host, implementing most of the attacks described in the
Secure Networks "Insertion, Evasion, and Denial of Service: Eluding
Network Intrusion Detection" paper of January 1998.
Network Intrusion Detection" paper of January 1998.
It features a simple ruleset language to delay, duplicate, drop,
fragment, overlap, print, reorder, segment, source-route, or otherwise
monkey with all outbound packets destined for a target host, with
minimal support for randomized or probabilistic behaviour.
minimal support for randomized or probabilistic behaviour.
This tool was written in good faith to aid in the testing of network
intrusion detection systems, firewalls, and basic TCP/IP stack

2
security/fswatch/pkg-descr

@ -13,6 +13,6 @@ fswatch:
- is one of many similar utilities. the main difference is the configuration.
you can define different settings for every directory in a directory tree.
moreover, it is very small and fast.
moreover, it is very small and fast.
WWW: http://fswatch.sourceforge.net

4
security/fwbuilder/pkg-descr

@ -5,7 +5,7 @@ objects and services (hosts, routers, firewalls, networks, protocols).
Firewall Builder helps user maintain database of objects and allows policy
editing using simple drag-and-drop operations.
Preferences and objects databases are stored in XML format.
Preferences and objects databases are stored in XML format.
GUI and policy compilers are completely independent. Support for a new firewall
platform can be added to GUI without any changes done to the program, although
new policy compiler must be written. This provides for consistent abstract
@ -13,6 +13,6 @@ model and the same GUI for different firewall platforms. Currently three most
popular free firewalls are supported: ipchains, iptables and ipfilter.
Because of this, Firewall Builder can be used to manage firewalls built on
variety of platforms including, but not limited to, Linux running ipchains or
iptables and FreeBSD or Solaris running ipfilter.
iptables and FreeBSD or Solaris running ipfilter.
WWW: http://www.fwbuilder.org/

4
security/gcr/pkg-descr

@ -1,5 +1,5 @@
Gcr is a library for bits of crypto and security UI, parsing etc. It used
Gcr is a library for bits of crypto and security UI, parsing etc. It used
to be part of gnome-keyring. It also provides a viewer and importer for
certificates and private keys.
certificates and private keys.
WWW: https://live.gnome.org/GnomeKeyring

2
security/gorilla/pkg-descr

@ -1,4 +1,4 @@
Password Gorilla is cross-platform Password Manager. It is
Password Gorilla is cross-platform Password Manager. It is
compatible with "Password Safe" from Windows.
It uses TCL/Tk and runs on most platforms supported by Tcl/Tk.

2
security/gpass/pkg-descr

@ -11,7 +11,7 @@ Features:
* Quick-search facility.
* Username and password may easily be copied to the clipboard.
* Encryption is done using the OpenSSL cryptographics library.
* The built-in password generator helps you generate secure passwords.
* The built-in password generator helps you generate secure passwords.
* You can launch a website and the associated username/passwords
direct from GPass

4
security/gpgdir/pkg-descr

@ -1,4 +1,4 @@
gpgdir is a perl script that uses the CPAN GnuPG::Interface module
to encrypt and decrypt directories using a gpg key specified in ~/.gpgdirrc.
gpgdir is a perl script that uses the CPAN GnuPG::Interface module
to encrypt and decrypt directories using a gpg key specified in ~/.gpgdirrc.
WWW: http://www.cipherdyne.org/gpgdir/

4
security/gsfv/pkg-descr

@ -1,5 +1,5 @@
GSFV is a graphical interface written in GTK+ for manipulating .sfv
(Simple File Verification) files.
GSFV is a graphical interface written in GTK+ for manipulating .sfv
(Simple File Verification) files.
The Simple File Verification (SFV) system is a file integrity verification
system which is popular on some platforms. A software package may be

2
security/hackbot/pkg-descr

@ -1,4 +1,4 @@
Hackbot is a host exploration tool and bannergrabber. It scans numerous
Hackbot is a host exploration tool and bannergrabber. It scans numerous
services and vulnerabilities.
WWW: http://hackbot.stream-portal.org/

2
security/honggfuzz/pkg-descr

@ -1,5 +1,5 @@
Honggfuzz is a general-purpose fuzzing tool. Given a starting corpus of test
files, Hongfuzz supplies and modifies input to a test program and utilize the
ptrace() API/POSIX signal interface to detect and log crashes.
ptrace() API/POSIX signal interface to detect and log crashes.
WWW: http://code.google.com/p/honggfuzz/

4
security/hotssh/pkg-descr

@ -6,10 +6,10 @@ existing terminal window.
* Also display and search of local (Avahi) SSH servers
* Tabbed display with automatic session saving (Firefox style)
* Status bar with information like latency to server and output of
remote uptime
remote uptime
* Close integration with OpenSSH features like connection sharing
(near-instant new tabs)
* NetworkManager integration to easily reconnect after a network
change, great for laptops
change, great for laptops
WWW: http://projects.gnome.org/hotssh/

6
security/hpenc/pkg-descr

@ -4,8 +4,8 @@ Hpenc is a fast encryption command line tool with the following features:
detection.
* Parallel processing - hpenc uses block IO and you can process multiple blocks
simultaneously, which is extremely useful if you have multi-core environment.
* Strong ciphers - hpenc uses the state-of-art aes-gcm and chacha20 ciphers
* Easy interface
* Strong ciphers - hpenc uses the state-of-art aes-gcm and chacha20 ciphers
* Easy interface
* Hardware acceleration - hpenc can utilize all its
advanced cryptography functions defined for AES-NI and PCLMULQDQ instructions
(that must be supported by openssl). For those with old or embedded CPU (such
@ -14,6 +14,6 @@ as ARM), hpenc provides portable and fast chacha20 cipher.
* Secure random numbers generator - hpenc can work as pseudo-random numbers
generator. In a set of standard tests (diehard) on the generated sequences
hpenc generates secure sequences of pseudo-random numbers on a very high
speed (gigabytes per second).
speed (gigabytes per second).
WWW: https://github.com/vstakhov/hpenc/

2
security/i2p/pkg-descr

@ -11,6 +11,6 @@ average person.
No network can be "perfectly anonymous". The continued goal of I2P
is to make attacks more and more difficult to mount. Its anonymity
will get stronger as the size of the network increases and with
ongoing academic review.
ongoing academic review.
WWW: http://geti2p.net/

2
security/idea/pkg-descr

@ -1,4 +1,4 @@
A command line idea encryption and decryption utility written by
A command line idea encryption and decryption utility written by
Dr. Richard De Moliner.
IDEA (International Data Encryption Algorithm) is a block cipher devel-

8
security/ipfilter2dshield/pkg-descr

@ -1,8 +1,8 @@
This perl script is an official DShield client who's purpose is to
This perl script is an official DShield client who's purpose is to
read your FreeBSD ipfilter firewall ipmon log file and convert the
log records to the standard DShield reporting record format, and
imbed the converted log records into the body of an email that gets
sent to DShield for automatic addition to their database and abuse
log records to the standard DShield reporting record format, and
imbed the converted log records into the body of an email that gets
sent to DShield for automatic addition to their database and abuse
reporting to the offenders ISP if you are an subscribed DShield member.
Script contains user customable defaults which can be overridden with

4
security/isnprober/pkg-descr

@ -1,5 +1,5 @@
-- ISNprober / Tom Vandepoel (Tom.Vandepoel@ubizen.com) --
ISNprober is a tool that samples TCP Initial Sequence Numbers or IP ID's
and can use that information to determine if a set of IP addresses belong
ISNprober is a tool that samples TCP Initial Sequence Numbers or IP ID's
and can use that information to determine if a set of IP addresses belong
to the same TCP/IP stack (machine) or not.

26
security/krb5-112/pkg-descr

@ -1,24 +1,24 @@
Kerberos V5 is an authentication system developed at MIT.
Kerberos V5 is an authentication system developed at MIT.
WWW: http://web.mit.edu/kerberos/
Abridged from the User Guide:
Under Kerberos, a client sends a request for a ticket to the
Key Distribution Center (KDC). The KDC creates a ticket-granting
ticket (TGT) for the client, encrypts it using the client's
password as the key, and sends the encrypted TGT back to the
Under Kerberos, a client sends a request for a ticket to the
Key Distribution Center (KDC). The KDC creates a ticket-granting
ticket (TGT) for the client, encrypts it using the client's
password as the key, and sends the encrypted TGT back to the
client. The client then attempts to decrypt the TGT, using
its password. If the client successfully decrypts the TGT, it
keeps the decrypted TGT, which indicates proof of the client's
identity. The TGT permits the client to obtain additional tickets,
its password. If the client successfully decrypts the TGT, it
keeps the decrypted TGT, which indicates proof of the client's
identity. The TGT permits the client to obtain additional tickets,
which give permission for specific services.
Since Kerberos negotiates authenticated, and optionally encrypted,
Since Kerberos negotiates authenticated, and optionally encrypted,
communications between two points anywhere on the internet, it
provides a layer of security that is not dependent on which side of a
firewall either client is on.
The Kerberos V5 package is designed to be easy to use. Most of the
The Kerberos V5 package is designed to be easy to use. Most of the
commands are nearly identical to UNIX network programs you are already
used to. Kerberos V5 is a single-sign-on system, which means that you
have to type your password only once per session, and Kerberos does
the authenticating and encrypting transparently.
used to. Kerberos V5 is a single-sign-on system, which means that you
have to type your password only once per session, and Kerberos does
the authenticating and encrypting transparently.
Jacques Vidrine <n@nectar.com>

26
security/krb5-113/pkg-descr

@ -1,24 +1,24 @@
Kerberos V5 is an authentication system developed at MIT.
Kerberos V5 is an authentication system developed at MIT.
WWW: http://web.mit.edu/kerberos/
Abridged from the User Guide:
Under Kerberos, a client sends a request for a ticket to the
Key Distribution Center (KDC). The KDC creates a ticket-granting
ticket (TGT) for the client, encrypts it using the client's
password as the key, and sends the encrypted TGT back to the
Under Kerberos, a client sends a request for a ticket to the
Key Distribution Center (KDC). The KDC creates a ticket-granting
ticket (TGT) for the client, encrypts it using the client's
password as the key, and sends the encrypted TGT back to the
client. The client then attempts to decrypt the TGT, using
its password. If the client successfully decrypts the TGT, it
keeps the decrypted TGT, which indicates proof of the client's
identity. The TGT permits the client to obtain additional tickets,
its password. If the client successfully decrypts the TGT, it
keeps the decrypted TGT, which indicates proof of the client's
identity. The TGT permits the client to obtain additional tickets,
which give permission for specific services.
Since Kerberos negotiates authenticated, and optionally encrypted,
Since Kerberos negotiates authenticated, and optionally encrypted,
communications between two points anywhere on the internet, it
provides a layer of security that is not dependent on which side of a
firewall either client is on.
The Kerberos V5 package is designed to be easy to use. Most of the
The Kerberos V5 package is designed to be easy to use. Most of the
commands are nearly identical to UNIX network programs you are already
used to. Kerberos V5 is a single-sign-on system, which means that you
have to type your password only once per session, and Kerberos does
the authenticating and encrypting transparently.
used to. Kerberos V5 is a single-sign-on system, which means that you
have to type your password only once per session, and Kerberos does
the authenticating and encrypting transparently.
Jacques Vidrine <n@nectar.com>

26
security/krb5-114/pkg-descr

@ -1,24 +1,24 @@
Kerberos V5 is an authentication system developed at MIT.
Kerberos V5 is an authentication system developed at MIT.
WWW: http://web.mit.edu/kerberos/
Abridged from the User Guide:
Under Kerberos, a client sends a request for a ticket to the
Key Distribution Center (KDC). The KDC creates a ticket-granting
ticket (TGT) for the client, encrypts it using the client's
password as the key, and sends the encrypted TGT back to the
Under Kerberos, a client sends a request for a ticket to the
Key Distribution Center (KDC). The KDC creates a ticket-granting
ticket (TGT) for the client, encrypts it using the client's
password as the key, and sends the encrypted TGT back to the
client. The client then attempts to decrypt the TGT, using
its password. If the client successfully decrypts the TGT, it
keeps the decrypted TGT, which indicates proof of the client's
identity. The TGT permits the client to obtain additional tickets,
its password. If the client successfully decrypts the TGT, it
keeps the decrypted TGT, which indicates proof of the client's
identity. The TGT permits the client to obtain additional tickets,
which give permission for specific services.
Since Kerberos negotiates authenticated, and optionally encrypted,
Since Kerberos negotiates authenticated, and optionally encrypted,
communications between two points anywhere on the internet, it
provides a layer of security that is not dependent on which side of a
firewall either client is on.
The Kerberos V5 package is designed to be easy to use. Most of the
The Kerberos V5 package is designed to be easy to use. Most of the
commands are nearly identical to UNIX network programs you are already
used to. Kerberos V5 is a single-sign-on system, which means that you
have to type your password only once per session, and Kerberos does
the authenticating and encrypting transparently.
used to. Kerberos V5 is a single-sign-on system, which means that you
have to type your password only once per session, and Kerberos does
the authenticating and encrypting transparently.
Jacques Vidrine <n@nectar.com>

Some files were not shown because too many files changed in this diff

Loading…
Cancel
Save