Fontspec is a package for XeLaTeX. It provides an automatic and
unified interface to feature-rich AAT and OpenType fonts through the
NFSS in LaTeX running on XeTeX. XeTeX (the successor to TeX-GX) is a
TeX-variant (originally for Mac OS X, but now available in the major
distributions for other platforms, too) that accepts unicode input and
can access system fonts directly.
- Updating package for p5 module Cisco::Abbrev from 0.02 to 0.03
- Adjusting license according to module POD
Upstream changes:
0.03 2009-04-17
Added 'Eth' --> 'Ethernet' mapping.
Thanks to: Petya Kohts <kohts@yandex-team.ru>
* Save (but do not recompress) APNG chunks if the output file has the
".apng" extension and the color_type and bit_depth are not changed.
Changes 1.6.20:
* Changed local variable "write" to "wwrite" in inffast.c (zlib) to avoid
shadowed declaration warning.
- Updating package for p5 module MooseX::Traits::Pluggable from 0.04 to 0.06
- Adjusting dependencies according to META.yml
- Changing module type (Module::Install::Bundled required?), because
bundled Module::Install contains additional packages
Upstream changes:
0.06 2009-07-17 23:33:00
- Work correctly with positional parameters followed by a hashref
passed to new_with_traits.
0.05 2009-07-17 20:15:34
- Add support for composing MooseX::MethodAttributes roles into
anonymous classes correctly.
- Updating package for MooseX::SemiAffordanceAccessor from 0.03 to 0.05
- Adjusting license / Moose dependency according to META.yml
Upstream changes:
0.05 2009-07-15
- Now requires Moose 0.84 to prevent test failures.
0.04 2009-07-09
- This module unconditionally deleted the "is" parameter, which meant
it broke any use of "is => 'bare'". Reported by Jerome Quelin. Fixed
by Jesse Luehrs. RT #47711.
from 0.00901 to 0.00902
Upstream changes:
0.00902 July 10, 2009
- Bump required Moose version to avoid issues with is => 'bare'
when an older version of Moose is already installed.
- Updating package for p5 module MooseX::ClassAttribute from 0.08 to 0.09
- Adjusting license to ${PERL5_LICENSE} and dependency to required
Moose version according to META.yml
Upstream changes:
0.09 2009-07-09
- An attribute with a builder that wasn't also lazy caused an
exception when the attribute's accessor was called.
Fix for PR#41506
Fix missing @dirrm entries from PLIST*
Before we go into the detailed changes, here are the top 5 improvements in Nmap 5:
1. The new Ncat tool aims to be your Swiss Army Knife for data transfer, redirection, and debugging. We released a whole users' guide detailing security testing and network administration tasks made easy with Ncat.
2. The addition of the Ndiff scan comparison tool completes Nmap's growth into a whole suite of applications which work together to serve network administrators and security practitioners. Ndiff makes it easy to automatically scan your network daily and report on any changes (systems coming up or going down or changes to the software services they are running). The other two tools now packaged with Nmap itself are Ncat and the much improved Zenmap GUI and results viewer.
3. Nmap performance has improved dramatically. We spent last summer scanning much of the Internet and merging that data with internal enterprise scan logs to determine the most commonly open ports. This allows Nmap to scan fewer ports by default while finding more open ports. We also added a fixed-rate scan engine so you can bypass Nmap's congestion control algorithms and scan at exactly the rate (packets per second) you specify.
4. We released Nmap Network Scanning, the official Nmap guide to network discovery and security scanning. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. More than half the book is available in the free online edition.
5. The Nmap Scripting Engine (NSE) is one of Nmap's most powerful and flexible features. It allows users to write (and share) simple scripts to automate a wide variety of networking tasks. Those scripts are then executed in parallel with the speed and efficiency you expect from Nmap. All existing scripts have been improved, and 32 new ones added. New scripts include a whole bunch of MSRPC/NetBIOS attacks, queries, and vulnerability probes; open proxy detection; whois and AS number lookup queries; brute force attack scripts against the SNMP and POP3 protocols; and many more. All NSE scripts and modules are described in the new NSE documentation portal.
Details are here: http://nmap.org/changelog.html