Typos, whitespace and capitalization fixes (S-X).

This commit is contained in:
Jimmy Olgeni 2015-09-20 21:12:20 +00:00
parent 11982cf73b
commit feb651a670
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=397463
63 changed files with 84 additions and 84 deletions

View File

@ -1,16 +1,16 @@
ccrypt is a utility for encrypting and decrypting files and streams. It was
designed to replace the standard unix crypt utility, which is notorious for
designed to replace the standard Unix crypt utility, which is notorious for
using a very weak encryption algorithm. ccrypt is based on the Rijndael
cipher, which is the U.S. government's chosen candidate for the Advanced
Encryption Standard (AES, see http://www.nist.gov/aes/). This cipher is
believed to provide very strong security.
Unlike unix crypt, the algorithm provided by ccrypt is not symmetric, i.e.,
Unlike Unix crypt, the algorithm provided by ccrypt is not symmetric, i.e.,
one must specify whether to encrypt or decrypt. The most common way to invoke
ccrypt is via the commands ccencrypt and ccdecrypt. There is also a ccat
command for decrypting a file directly to the terminal, thus reducing the
likelihood of leaving temporary plaintext files around. In addition, there
is a compatibility mode for decrypting legacy unix crypt files.
is a compatibility mode for decrypting legacy Unix crypt files.
Encryption and decryption depends on a keyword (or key phrase) supplied by
the user. By default, the user is prompted to enter a keyword from the

View File

@ -1,5 +1,5 @@
ccsrch is a tool that searches for and identifies unencrypted and
contiguous credit card numbers (PAN) and track data on windows and
contiguous credit card numbers (PAN) and track data on Windows and
UNIX operating systems. It will also identify the location of the
PAN data in the files and record MAC times.

View File

@ -2,7 +2,7 @@ cfv is a utility to both test and create .sfv, .csv and md5sum files. These
files are commonly used to ensure the correct retrieval or storage of data.
Features:
- supports .sfv, .csv(2, 3, and 4 field variants), md5sum, bsd md5
- supports .sfv, .csv(2, 3, and 4 field variants), md5sum, BSD md5
sha1sum, .torrent and (test-only) .par, .par2 file formats
- automatic checksum file naming ability in create mode
- recursive operation

View File

@ -2,6 +2,6 @@ FakeBO emulates a BackOrifice client (a trojan which can be used to
covertly monitor and alter Windows machines remotely), and can log
attempted commands and packets, as well as providing configurable
responses. Useful for catching script kiddies trying to find a hackable
windows box, for providing evidence to their sysadmin, etc.
Windows box, for providing evidence to their sysadmin, etc.
WWW: http://sourceforge.net/projects/fakebo/

View File

@ -1,3 +1,3 @@
fwknop,"FireWall KNock OPerator", implements Single Packet Authorization (SPA).
fwknop, "FireWall KNock OPerator", implements Single Packet Authorization (SPA).
WWW: http://www.cipherdyne.org/fwknop/

View File

@ -5,6 +5,6 @@ It comes as driver in ifdhandler format for PC/SC-Lite,
as CT-API driver, or as a small and lean middleware, so
applications can use it with minimal overhead.
OpenCT also has a primitive mechanism to export smart card
readers to remote machines via tcp/ip.
readers to remote machines via TCP/IP.
WWW: https://github.com/OpenSC/openct

View File

@ -1,4 +1,4 @@
Crypt::xDBM_File encrypts/decrypts the data in a gdbm,ndbm,sdbm (and
Crypt::xDBM_File encrypts/decrypts the data in a gdbm, ndbm, sdbm (and
maybe even berkeleyDB, but I didn't test that) file. It gets tied to a
hash and you just access the hash like normal. The crypt function can
be any of the CPAN modules that use encrypt, decrypt, keysize, blocksize

View File

@ -1,5 +1,5 @@
This package provides an interface to the cracklib (libcrack) libraries that
come standard on most unix-like distributions. This allows you to check
come standard on most Unix-like distributions. This allows you to check
passwords against dictionaries of words to ensure some minimal level of
password security.

View File

@ -1,7 +1,7 @@
Please aims to be little sudo without bells and whistles. Only pam
authentication and executing command.
Name please fits into unix naming conventions. Where we have daemon instead of
Name please fits into Unix naming conventions. Where we have daemon instead of
background process. We are killing processes, not closing processes. Now we can
please to run privileged process.

View File

@ -2,8 +2,8 @@ Welcome to the Proactive Abuse Reporting System.
In an effort to be proactive in doing my part to stop the massive
quantities of internet traffic probing for open ports or more
specifically the probing for known ports that ms/windows spy ware,
Trojans, and what ever other ms/windows ports are commonly probed
specifically the probing for known ports that Windows spy ware,
Trojans, and what ever other Windows ports are commonly probed
which result in increasing my bandwidth usage changes, I wrote this
perl application for reporting that abuse to the senders ISP, with
the hopes they will monitor the abuser and terminate the abuser's

View File

@ -1,4 +1,4 @@
QtKeychain is a Qt API to store passwords and other secret data securely.How
QtKeychain is a Qt API to store passwords and other secret data securely. How
the data is stored depends on the platform.
For Linux/Unix, KWallet (via D-Bus) is used. Support for the GNOME Keyring
via freedesktop.org's Secret Storage D-Bus specification is planned

View File

@ -1,7 +1,7 @@
slush SSL remote shell
slush - SSL remote shell
slush is a simple telnet-like application which communicates over a
secure SSL channel. It uses X509 certificates for authentication and
can be compiled with tcp wrappers support (service name "slushd").
can be compiled with TCP wrappers support (service name "slushd").
slush is *alpha* software. Use it at your own risk.

View File

@ -1,5 +1,6 @@
This program is designed to log smurf attacks and the broadcasts used.
Essentially it is just an icmp echo reply logger with the following twists:
Essentially it is just an ICMP echo reply logger with the following twists:
- Logging only begins after passing a certain threshold rate of packets/sec
and kilobytes/sec. This prevents the logging of innocent ping replies.
- Only the /24 is logged, and it is only logged once per attack.

View File

@ -1,3 +1,3 @@
This program filters the tcpump raw packet data looking for logins and
passwords on the most commonly used tcp ports (ftp telnet pop3 ...).
It dumps sniffed data to a file named sniff.log
passwords on the most commonly used TCP ports (FTP, telnet, POP3 ...).
It dumps sniffed data to a file named sniff.log.

View File

@ -1,5 +1,5 @@
ssss is an implementation of Shamir's secret sharing scheme for
UNIX/linux machines. It is free software, the code is licensed under
UNIX/Linux machines. It is free software, the code is licensed under
the GNU GPL. ssss does both: the generation of shares for a known
secret and the reconstruction of a secret using user provided shares.
The software was written in 2006 by B. Poettering, it links against

View File

@ -4,7 +4,7 @@ steganographic methods to embed hidden information in JPEG images.
Currently, the detectable schemes are:
* jsteg
* jphide (unix and windows)
* jphide (Unix and Windows)
* invisible secrets
* outguess 01.3b
* F5

View File

@ -1,5 +1,5 @@
strobe is a network/security tool that locates and
describes all listening tcp ports on a (remote) host or on
describes all listening TCP ports on a (remote) host or on
many hosts in a bandwidth utilisation maximising, and pro-
cess resource minimizing manner.

View File

@ -1,7 +1,7 @@
SASH (Stand-Alone SHell)
It is a nice combination of bare-bones shell and a dozen
or so most useful unix commands.
or so most useful Unix commands.
Shell includes: echo pwd cd mkdir mknod rmdir sync rm chmod
chown chgrp touch mv ln cp cmp more exit

View File

@ -1,4 +1,4 @@
adtool is a unix command line utility for Active Directory administration.
adtool is a Unix command line utility for Active Directory administration.
Features include user and group creation, deletion, modification, password
setting and directory query and search capabilities.

View File

@ -1,4 +1,4 @@
CDargs heavily enhances the navigation of the common unix file-system
CDargs heavily enhances the navigation of the common Unix file-system
inside the shell. It plugs into the shell built-in cd-command (via a shell
function or an alias) and thus adds bookmarks and a browser to it. It
enables you to move to a very distant place in the file-system with just

View File

@ -1,8 +1,8 @@
Tool for copy partitions to another HDD. FreeBSD stores its data on
partitions, which encapsulated in slices. Soft, such as Partition
Magic, Acronis, etc. detect only slice, not real partitions on that
slice. CloneHDD correctly understand size difference between two HDD
and change size of each partition proportionally for filling entire
Tool for copy partitions to another HDD. FreeBSD stores its data on
partitions, which are encapsulated in slices. Soft, such as Partition
Magic, Acronis, etc. detect only slice, not real partitions on that
slice. CloneHDD correctly understand size difference between two HDD
and change size of each partition proportionally for filling entire
HDD.
WWW: http://sourceforge.net/projects/clonehdd/

View File

@ -1,4 +1,4 @@
cw is a non-intrusive real-time ANSI color wrapper for common unix-based
cw is a non-intrusive real-time ANSI color wrapper for common Unix-based
command.
cw is designed to simulate the environment of the commands being

View File

@ -2,7 +2,7 @@
simultaneously and alert you when a particular filesystem is low on
space. disktool is set-up to "un-iconify" when a filesystem it is
monitoring has reached its' user-definable "critical threshold". A
unix command can also be initiated when this threshold is reached.
Unix command can also be initiated when this threshold is reached.
The command and un-iconifying can be repeated every so many polls,
configurable from the cmdline or from the Properties pop-up.
The properties pop-up is obtained by selecting any gauge with the

View File

@ -1,5 +1,5 @@
fnteditfs is a small, simple font editor, designed for editing FreeBSD's
syscons and linux fonts (but may also work for other OSes). It's written
syscons and Linux fonts (but may also work for other OSes). It's written
in C, using the ncurses library for its display library.
WWW: http://fonteditfs.sourceforge.net/

View File

@ -2,9 +2,9 @@ SMBNetFS is a filesystem that allow you to use samba/microsoft network
in the same manner as the network neighborhood in Microsoft Windows.
Featuries:
* you can use Samba/Microsoft network as a regular unix filesystem
* you can use Samba/Microsoft network as a regular Unix filesystem
* workgroup/computer/share entries are dynamically created
* windows domain supported
* Windows domain supported
* kerberos support (New)
* user defined workgroup/link/hosts are supported
* national character supported

View File

@ -1,10 +1,10 @@
HATop is an interactive ncurses client and real-time monitoring
statistics displaying tool for the HAProxy unix socket.
statistics displaying tool for the HAProxy Unix socket.
HATop's appearance is similar to top. It supports various modes for
detailed statistics of all configured proxies and services in near
realtime. In addition, it features an interactive CLI for the haproxy
unix socket. This allows administrators to control the given haproxy
Unix socket. This allows administrators to control the given haproxy
instance (change server weight, put servers into maintenance mode,
etc.) directly out of hatop (using keybinds or the CLI) and monitor the
results immediately.

View File

@ -1,11 +1,11 @@
This is a deamon the uses the LM78/79, WINBond 83781/83782/83783/83626
This is a daemon the uses the LM78/79, WINBond 83781/83782/83783/83626
or the ASUS 99127 hardware monitor chips to warn the operator when
something is out of range. The software is capable of monitoring up
to 3 tempuratures, 3 fan speeds and 7 voltages. The configuration file
to 3 temperatures, 3 fan speeds and 7 voltages. The configuration file
specifies which functions are active and their acceptable ranges.
With the healthdc companion program the status can be read from any
networked computer. The healthd deamon's network connection is protected
networked computer. The healthd daemon's network connection is protected
by libwrap and /etc/hosts.allow.
WWW: http://healthd.thehousleys.net/

View File

@ -8,7 +8,7 @@ Features so far:
* Creating Video CDs (VCD 1.1, 2.0, SVCD, CD-i support (Version 4))
* Creating mixed-mode CDs (CD-Extra (CD-Plus, Enhanced Audio CD))
* Creating eMovix CDs
* CD Copy (single + multi session, audio, enghanced audio, cloning)
* CD Copy (single + multi session, audio, enhanced audio, cloning)
* DVD burning (DVD-R(W), DVD+R(W), eMovix, Formatting DVD-RWs and DVD+RWs)
* CD Ripping (CDDB support, CD-TEXT reading, several formats)
* DVD Ripping and DivX/XviD encoding
@ -17,7 +17,7 @@ Features so far:
* Writing existing iso images to CD and DVD.
* Writing cue/bin files created for CDRWIN
* DVD copy (no video transcoding yet)
* Enhanced cd decive handling (burnfree and justlink support)
* Enhanced cd device handling (burnfree and justlink support)
* KParts plugin
WWW: http://www.k3b.org/

View File

@ -1,6 +1,6 @@
The LogAnalyzer project provides an easy to use but powerful frontend for
searching, reviewing and analyzing network event data, including syslog,
windows event log and many other event sources. It focuses on the
Windows event log and many other event sources. It focuses on the
user-interface side of this project, so the data itself needs to be
gathered by another program, for example the stock syslogd, rsyslog (often
the distro's default syslogd), WinSyslog or MonitorWare Agent. LogAnalyzer

View File

@ -1,5 +1,5 @@
mcelog processes machine checks (in particular memory and CPU
hardware errors) on modern x86-based unix systems and
hardware errors) on modern x86-based Unix systems and
produces human-readable output.
This software is heavily patched to work on FreeBSD systems,

View File

@ -9,7 +9,7 @@ monit supports:
* Logging - syslog or own logfile
* Alert, start, stop and restart of services based on it's characteristics
* MD5 and SHA1 checksums
* Runtime Unix socket and TCP/IP port checking (tcp and udp)
* Runtime Unix socket and TCP/IP port checking (TCP and UDP)
* Process status, timeout, memory and cpu usage, etc.
* Device usage monitoring (inodes and space)
* File monitoring (timestamp, checksum, permission, owner, etc.)

View File

@ -1,5 +1,5 @@
This is a collection of the unix tools that nobody thought to write long ago,
when unix was young.
This is a collection of the Unix tools that nobody thought to write long ago,
when Unix was young.
Currently it consists of these tools:
- chronic: runs a command quietly unless it fails

View File

@ -8,5 +8,4 @@ ntfsmount: fast, reliable, read/write, userspace.
ntfsprogs: various tools for managing ntfs, namely mkntfs, ntfsresize,
ntfsclone, ntfsfix, ntfsundelete, ntfswipe and ntfsdecrypt.
WWW: https://sourceforge.net/projects/linux-ntfs/

View File

@ -1,2 +1,2 @@
Filesys::DiskFree does about what the unix command df(1) does, listing
Filesys::DiskFree does about what the Unix command df(1) does, listing
the mounted disks, and the amount of free space used & available.

View File

@ -1,5 +1,5 @@
How to get the host full name in perl on multiple operating systems
(mac, windows, unix* etc)
(OS X, Windows, Unix* etc)
Attempt via many methods to get the systems full name. The Sys::Hostname
class is the best and standard way to get the system hostname.

View File

@ -11,7 +11,7 @@ adding, editing, generating, and retrieving passwords. It is a very short and
simple shell script. It's capable of temporarily putting passwords on your
clipboard and tracking password changes using git.
You can edit the password store using ordinary unix shell commands alongside the
You can edit the password store using ordinary Unix shell commands alongside the
pass command. There are no funky file formats or new paradigms to learn. There
is bash completion so that you can simply hit tab to fill in names.

View File

@ -1,9 +1,9 @@
Pwsafe is a unix commandline program that manages encrypted password databases.
Pwsafe is a Unix commandline program that manages encrypted password databases.
* Pure command-line operation if desired (good for remote access over ssh)
* Can interact with X11 selection & clipboard.
* Portable, endianess-clean, misaligned-access-free C++. Compiles cleanly
on linux, *bsd, macos x, solaris.
on Linux, *BSD, OS X, Solaris.
* Compatible with CounterPane's PasswordSafe Win32 program versions 1.9.x.
WWW: http://nsd.dyndns.org/pwsafe/

View File

@ -1,4 +1,4 @@
QPxTool is the linux way to get full control over your CD/DVD drives.
QPxTool is the Linux way to get full control over your CD/DVD drives.
It is the Open Source Solution which intends to give you access to
all available Quality Checks (Q-Checks) on written and blank media,
that are available for your drive. This will help you to find the

View File

@ -1,8 +1,8 @@
The sg3_utils package contains utilities that send SCSI commands to devices.
As well as devices on transports traditionally associated with SCSI (e.g.
Fibre Channel (FCP), Serial Attached SCSI (SAS) and the SCSI Parallel
Interface(SPI)) many other devices use SCSI command sets. It's
functions similar to camcontrol(8), but more powerful. For example,
Interface(SPI)) many other devices use SCSI command sets. Its
functions are similar to camcontrol(8), but more powerful. For example,
it can use SCSI Environmental Services not using FreeBSD ses(4),
read SCSI device logs, and much more.

View File

@ -1,10 +1,10 @@
socklog in cooperation with the runit package is a small and secure replacement
for syslogd. There are three main features, syslogd provides:
- receiving syslog messages from an unix domain socket (/dev/log) or UDP socket
- receiving syslog messages from an Unix domain socket (/dev/log) or UDP socket
(0.0.0.0:514) and writing them to various files on disk depending on facility
and priority.
- writing received syslog messages to an udp socket (a.b.c.d:514)
- writing received syslog messages to an UDP socket (a.b.c.d:514)
socklog provides these features with the help of runit's runsvdir,
runsv, and svlogd, provides a different network logging concept, and

View File

@ -10,7 +10,7 @@ inactivity. Many firewalls, and some ISPs drop connections when they are
perceived as idle. By having spinner running the server is constantly
sending a tiny amount of data over the link, preserving the connection.
Thus (for search engines) Spinner is an anti-dle, timeout preventing,
background daemon process for unix variants including linux.
background daemon process for Unix variants including Linux.
WWW: http://www.laffeycomputer.com/spinner.html

View File

@ -1,4 +1,4 @@
The syslinux program installs a linux bootloader on a FAT-formatted
The syslinux program installs a Linux bootloader on a FAT-formatted
filesystem or disk image.
This FreeBSD port can additionally operate on plain files containing

View File

@ -1,4 +1,4 @@
Tcplist makes a list of tcp connections to and from the local machine,
Tcplist makes a list of TCP connections to and from the local machine,
displaying the user name associated with the local end, and making use of
Ident services if available to determine the "user" at the other end.

View File

@ -1,6 +1,6 @@
Virtual Memory Toucher
vmtouch is a tool for learning about and controlling the file system
cache of unix and unix-like systems.
cache of Unix and Unix-like systems.
WWW: http://hoytech.com/vmtouch/

View File

@ -7,7 +7,7 @@ function.
A list of preferred parsers may be specified in the import list - SVG::Parser
will use the first parser that successfully loads. Some basic measures are taken
to provide cross-compatability. Applications requiring more advanced parser
to provide cross-compatibility. Applications requiring more advanced parser
features should use the relevant parser module directly; see SVG::Parser::Expat
and SVG::Parser::SAX.

View File

@ -1,6 +1,6 @@
The TDH utilities are a set of programs and filters useful in working
with ordinary tabular ascii data from the command line or in shell
scripts. They were developed to supplement standard unix utilities
scripts. They were developed to supplement standard Unix utilities
such as sort and uniq. Two of the utilities are designed to work
specifically with tab-delimited exports from Excel/spreadsheets.
A full-featured date and time package (libchron) is also included.

View File

@ -1,3 +1,3 @@
tkdiff is a fronted for unix's diff based on Tcl/Tk.
tkdiff is a fronted for Unix's diff based on Tcl/Tk.
WWW: http://sourceforge.net/projects/tkdiff/

View File

@ -1,10 +1,10 @@
Mod_Authz_Unixgroup 1.0.x is a unix group access control modules for Apache
Mod_Authz_Unixgroup 1.0.x is a Unix group access control modules for Apache
version 2.2. If you have Apache 2.3 or Apache 2.4, you should be using
version 1.1.x of this module instead.
If you are having users authenticate with real Unix login ID over the net,
using something like my mod_authnz_external / pwauth combination, and you
want to do access control based on unix group membership, then
want to do access control based on Unix group membership, then
mod_authz_unixgroup is exactly what you need.
WWW: http://www.unixpapa.com/mod_authz_unixgroup/

View File

@ -1,10 +1,10 @@
Mod_Authz_Unixgroup 1.1.x is a unix group access control modules for Apache
Mod_Authz_Unixgroup 1.1.x is a Unix group access control modules for Apache
version 2.4. If you have Apache 2.2 you should be using version 1.0.x of
this module instead.
If you are having users authenticate with real Unix login ID over the net,
using something like my mod_authnz_external / pwauth combination, and you
want to do access control based on unix group membership, then
want to do access control based on Unix group membership, then
mod_authz_unixgroup is exactly what you need.
WWW: http://www.unixpapa.com/mod_authz_unixgroup/

View File

@ -1,8 +1,8 @@
encode and decode strings into and from application/x-www-form-urlencoded
The application/x-www-form-urlencoded format encodes a ordered data sets of
pairs consisting of a name and a value, with pairs seperated by ampersand or
semicolon and names and values seperated by the equal sign. Space characters
pairs consisting of a name and a value, with pairs separated by ampersand or
semicolon and names and values separated by the equal sign. Space characters
are replaced with plus sign and any characters not in the unreserved character
set is encoded using the percent-encoding scheme also used for resource
identifiers.

View File

@ -11,7 +11,7 @@ Features:
o streaming POST (POST with File/IO)
o Digest auth
o Negotiate/NTLM auth for WWW-Authenticate (requires net/htlm module)
o NTLM auth for Proxy-Authenticate (requires win32/sspi module)
o NTLM auth for Proxy-Authenticate (requires Win32/sspi module)
o extensible with filter interface
o you dont have to care HTTP/1.1 persistent connection (httpclient cares instead of you)
* Not supported now

View File

@ -1,4 +1,4 @@
Surfraw provides a fast unix command line interface to a variety of
Surfraw provides a fast Unix command line interface to a variety of
popular WWW search engines. It supports google, altavista, dejanews,
amazon.com, research index, slashdot and many others. Output is
directed to a browser.

View File

@ -5,7 +5,7 @@ sendfile, epoll and OpenSSL), OS level functionality (random number
generation, system status, etc), and native process handling (shared memory,
NT pipes and Unix sockets).
These features allows making Tomcat a general purposewebserver, will
These features allows making Tomcat a general purpose webserver, will
enable much better integration with other native web technologies, and
overall make Java much more viable as a full fledged webserver platform
rather than simply a backend focused technology.

View File

@ -1,4 +1,4 @@
WebCopy is a perl program that retrieves the URL specified in a unix-like
WebCopy is a perl program that retrieves the URL specified in a Unix-like
command line. It can also retrieve recursively any file that a HTML file
references, i.e. inlined images and/or anchors, if specified with an option.

View File

@ -1,4 +1,4 @@
An X.Org driver for Wacom tablets. It communicates with a character
device provided by linux kernel driver in webcamd.
device provided by Linux kernel driver in webcamd.
WWW: http://linuxwacom.sourceforge.net/

View File

@ -1,7 +1,7 @@
Google has created a set of fonts for its ChromeOS Operating system.
The three standard ones closely mimic the most popular ones for the Windows
platform and the linux so-called Liberation fonts but are available under an
platform and Linux's so-called Liberation fonts but are available under an
OpenFont license.
Tinos, Arimo and Cousine, appear to be variations of the old standard Times,

View File

@ -1,6 +1,6 @@
The freedesktop.org project provides a shared high-color desktop
icon theme shell for use under both KDE and GNOME desktops. This
is a glue port providing a symlink so that linux apps find their
is a glue port providing a symlink so that Linux apps find their
way around.
WWW: http://www.freedesktop.org/Standards/icon-theme-spec

View File

@ -1,6 +1,6 @@
The freedesktop.org project provides a shared high-color desktop
icon theme shell for use under both KDE and GNOME desktops. This
is a glue port providing a symlink so that linux apps find their
is a glue port providing a symlink so that Linux apps find their
way around.
WWW: http://www.freedesktop.org/Standards/icon-theme-spec

View File

@ -1,6 +1,6 @@
The freedesktop.org project provides a shared high-color desktop
icon theme shell for use under both KDE and GNOME desktops. This
is a glue port providing a symlink so that linux apps find their
is a glue port providing a symlink so that Linux apps find their
way around.
WWW: http://www.freedesktop.org/Standards/icon-theme-spec

View File

@ -9,6 +9,6 @@ From the home page:
wxPython is a cross-platform toolkit. This means that the same program
will run on multiple platforms without modification. Currently supported
platforms are Microsoft Windows, and most Unix or unix-like systems.
platforms are Microsoft Windows, and most Unix or Unix-like systems.
WWW: http://www.wxpython.org/

View File

@ -1,7 +1,7 @@
tkdnd is an extension that adds native drag & drop capabilities to the
tk toolkit. It can be used with any tk version equal or greater to 8.4
and currently only the UNIX (X-Windows) and Microsoft Windows operating
systems are supported. Under unix the drag & drop protocol in use is the
systems are supported. Under Unix the drag & drop protocol in use is the
XDND protocol version 4 (also used by the QT toolkit, KDE & GNOME
Desktops).

View File

@ -1,4 +1,4 @@
Stjerm is a roll-down, quake-like terminal emulator that shows up on keyboard
Stjerm is a roll-down, Quake-like terminal emulator that shows up on keyboard
shortcut, and hides away when not needed.
WWW: https://github.com/stjerm/stjerm

View File

@ -1,4 +1,4 @@
xrsi is a minimalist (8kb) break enforcer for linux/unix for the
xrsi is a minimalist (8kb) break enforcer for Linux/Unix for the
prevention of Repetitive Strain Injury (RSI) otherwise known as
Occupational Overuse Syndrome (OOS).