a number of different sources and perform simple manipulation on the
captured image. The image can be saved as one or more PNG or JPEG
files.
Works with uvideo(4).
OK robert@
This module provide an object interface to tempdir() from File::Temp.
This allows to destroy the temporary directory as soon you don't need it
anymore using the magic DESTROY() function automatically call be perl
when the object is no longer reference.
If a value is passed to at object creation, it become only a container
allowing to keep same code in your function.
This is for an update to another port coming soon.
ok simon@ who had a similar version in his tree.
'gateway' addres/ports does not work (yet) due to the address handling
changes in pf. Other functionality should work. Also fixes two minor
bugs reported by many. Suggestions and ok naddy@
Spectrum-Tools is a set of utilities for using the Wi-Spy USB spectrum
analyzer tools from Metageek LLC (http://www.metageek.net). They include
userspace drivers for the hardware (implemented via libusb), a graphing
UI built on GTK/Cairo, network servers for remote devices, and simple
utilities for developing additional tools.
This package contains the GTK user interface, spectool_gtk.
Non-GUI tools can be found in the spectrum-tools-utils package.
thanks to matthieu@ for testing and ckuethe@ for pointing me at the
svn code (better than the previous release). it's not perfect (some
X resource leaks) but usable.
pg_top is 'top' for PostgreSQL. It is derived from Unix Top. Similar
to top, pg_top allows you to monitor PostgreSQL processes. It also
allows you to:
* View currently running SQL statement of a process.
* View query plan of a currently running SELECT statement.
* View locks held by a process.
* View user table statistics.
* View user index statistics
man page suggestion from sthen - thanks!
feedback and ok merdely
A vulnerability has been reported in Net-SNMP, which can be exploited
by malicious people to spoof authenticated SNMPv3 packets.
The authentication code reads the length to be checked from sender
input, this allows the sender to supply single byte HMAC code and
have a 1 in 256 chance of matching the correct HMAC and authenticating,
as only the first byte will be checked. The sender would need to
know a valid username.
ok rui (maintainer)