Disk based hashes is a method to create multidimensional binary trees on disk.
This library permits the extension of database concept to a plethora of
electronic data, such as graphic information. With the multidimensional binary
tree it is possible to mathematically prove that access time to any
particular record is minimized (using the concept of critical points from
calculus), which provides the means to construct optimized databases for
particular applications.
Submitted by benedikt.meurer@unix-ag.uni-siegen.de in pkgsrc-wip
The primary purpose of whisker is to be a URL scanner, which is
used to search for known vulnerable CGIs on websites. Whisker does
this by both scanning the the CGIs directly as well as crawling the
website in order to determine what CGIs are already currently in
use.
Submitted by adrianp@stindustries.net in pkgsrc-wip
iplog is a TCP/IP traffic logger. Currently, it is capable of logging
TCP, UDP and ICMP traffic. Adding support for other protocols
should be relatively easy.
iplog's capabilities include the ability to detect TCP port
scans, TCP null scans, FIN scans, UDP and ICMP "smurf" attacks,
bogus TCP flags (used by scanners to detect the operating system in use),
TCP SYN scans, TCP "Xmas" scans, ICMP ping floods, UDP scans, and IP
fragment attacks.
iplog is able to run in promiscuous mode and monitor traffic to all hosts
on a network.
iplog uses libpcap to read data from the network and can be ported
to any system that supports pthreads and on which libpcap will function.
Submitted by Martin Mersberger <gremlin@portal-to-web.de> in PR 20887
wol implements Wake On LAN functionality in a small program. It wakes
up hardware that is Magic Packet (tm) compliant. Consider you have a
sleeping or turned-off computer and you want to remotely wake him up.
Just type wol MAC-ADDRESS and the host wakes up (OK, it will boot ;-).
This small utility was able to wake my PC that has Intel PRO/100+ NIC.
Provided by Juan RP <juan@xtraeme.dyndns.org> in PR#19575