DXF2papercraft converts a polygonal 3D model stored as a DXF file into a plain drawing in the form of a 2D DXF file. This requires the program to "unfold" the 3D model. The result is a flattened pattern of connected polygons. All edges of a polygon which are unconnected get a so-called glue tab in addition. This pattern is called a papercraft model, and it can be used to build a shape that resembles the original 3D model from paper or cardboard. After all pairs of tabs have been glued together, the paper model corresponds to the 3D object. The final model can be reinforced by fiber glass and resin to obtain a rigid, resilient structure.
Spampig DnsblCheck takes the IP address of a mail server and looks it up in common blacklists and whitelists. The program tests against the major block lists from Spamhaus, SORBS, Spamcop, Barracuda, UCEProtect, and others. In addition to blacklists, it also checks against IP address and domain name whitelists and even checks PTR record integrity. The program returns results quickly, typically in less than a few seconds. If you don't get results quickly, it indicates you may have DNS problems and knowing this can also be useful. This application can be useful to spam fighters and email users who are struggling to find out why their messages are being blocked.
adv-samba is a PHP class to batch audit SAMBA resources on remote hosts or large LANs. It's a very handy tool during network audits. For example, imagine a LAN with 500 workstations. You want to find any illegal MP3s on company machines. With this tool, you recursively dump the share directory structure. It works with Active Directory authentication too.
sessiond allows a cluster of SSL/TLS servers to share their session caches in order to prevent each node of the cluster from negotiating a separate session. SSL/TLS session is basically a set of secret values (symmetric encryption keys, MAC secrets) shared between a client and a server. The use of asymmetric cryptography required to establish new sessions is the main performance bottleneck of the SSL/TLS protocol.
Final Config implements the preference dialogue (typically found under Edit->Preferences) as a separate application that can be used by another application (called the client application or client) through DBus. The available preferences and how they are to be presented to the user is described in an XML file (the desc file), which can be stored in a place convenient to the client. The client does not need to bother with the desc file; it just needs to pass along the file location when invoking the FinalConfig service.
FBAC-LSM is a security mechanism for Linux which retricts applications based on the features they provide, such as "Web Browser" or "Image Editor". By restricting the actions of applications, the damage which can be caused by malware or software vulnerabilities can be significantly reduced. Reusable policy abstractions, known as functionalities, can be used to grant the authority to perform high level features (for example using the Web_Browser functionality) or lower level features (such as using the HTTP_Client functionality) or to grant privileges to access any specified resources. Functionalities are parameterized, which allows them to be adapted to the needs of specific applications. Functionalities are also hierarchical; that is, functionalities can contain other functionalities.
Livespaces is an operating system for building advanced meeting spaces. It provides a distributed software infrastructure built on the Elvin messaging service (the Livespace Bus) for coordinating software and devices across any number of computers in a meeting space, and user-facing applications for controlling a smart meeting room and collaborating with other participants. It also supports federation with remote Livespaces to facilitate collaboration between distributed teams.
The Easysoft ODBC-Access Driver is an ODBC driver that supports both the MDB (Access 2000–2003 and Office Access 2007) and ACCDB (Office Access 2007 and later) database formats. It provides read-write access to Access databases for Linux/Unix applications. You do not need to change where your database file is located, as it supports shared locations such as a Windows or Samba share. It uses Access’ locking file mechanism and prevents users from opening a database if another user has the database opened for exclusive access, again mirroring the Access front-end’s behavior for seamless integration. It supports encrypted/encoded .mdb files, which is an Access security feature that protects Access data from unauthorized viewing.