Andreas Stieger
AndreasStieger
Involved Projects and Packages
Zswap-cli is a command-line tool to control the zswap kernel module options on
the fly.
Zswap is a compressed cache for swap pages. It takes pages that are in the
process of being swapped out to disk and tries to compress them into a
RAM-based memory pool with dynamic allocation.
It trades CPU cycles for a significant performance boost since reading from a
compressed cache is much faster than reading from a swap device.
This is a collection of various packages regarding Ham-Radio (Amateur Radio).
http://en.wikipedia.org/wiki/Amateur_radio
Dies ist eine Sammlung verschiedener Pakete zum Thema Amateurfunk.
http://de.wikipedia.org/wiki/Amateurfunkdienst
CHIRP is a free, open-source tool for programming your amateur radio. It supports a large number of manufacturers and models, as well as provides a way to interface with multiple data sources and formats.
Taking a break... https://lists.opensuse.org/archives/list/factory@lists.opensuse.org/message/FBIAIKA5YDL2FS6ILWVKOTPZVFO4XGXT/
This project was created for package cairo via attribute OBS:Maintained
This project was created for package giada via attribute OBS:Maintained
This project was created for package bpfmon via attribute OBS:Maintained
This project was created for package veracrypt via attribute OBS:Maintained
Tor is a connection-based low-latency anonymous communication system.
This package provides the "tor" program, which serves as both a client and
a relay node. Scripts will automatically create a "%{toruser}" user and
a "%{torgroup}" group, and set tor up to run as a daemon when the system
is rebooted.
Applications connect to the local Tor proxy using the SOCKS
protocol. The local proxy chooses a path through a set of relays, in
which each relay knows its predecessor and successor, but no
others. Traffic flowing down the circuit is unwrapped by a symmetric
key at each relay, which reveals the downstream relay.
Warnings: Tor does no protocol cleaning. That means there is a danger
that application protocols and associated programs can be induced to
reveal information about the initiator. Tor depends on Privoxy and
similar protocol cleaners to solve this problem. This is alpha code,
and is even more likely than released code to have anonymity-spoiling
bugs. The present network is very small -- this further reduces the
strength of the anonymity provided. Tor is not presently suitable
for high-stakes anonymity.
Authors:
--------
- R. Dingledine
This package provides modules which implement Off-The-Record (OTR) Messaging
protocol for a number of popular IRC clients.
OTR allows you to have private conversations over IM by providing:
- Encryption
- No one else can read your instant messages.
- Authentication
- You are assured the correspondent is who you think it is.
- Deniability
- The messages you send do _not_ have digital signatures that are
checkable by a third party. Anyone can forge messages after a
conversation to make them look like they came from you. However,
_during_ a conversation, your correspondent is assured the messages
he sees are authentic and unmodified.
- Perfect forward secrecy
- If you lose control of your private keys, no previous conversation
is compromised.
Authors:
--------
Ulim
Leafnode is a small NNTP server for leaf sites without permanent
connections to the Internet. It supports a subset of NNTP and is able
to automatically fetch the newsgroups the user reads regularly from the
ISP's news server.
Authors:
--------
Matthias Andree (maintainer since 1.9.19)
Arnt Gulbrandsen
Cornelius Krasel
Kent Robotti
Markus Enzenberger
Randolf Skerka
Alexander Reinwarth
Alexander Stielau
Ralf Wildenhues
This package compiles the event expression library used by
the rsyslog daemon.
This package compiles the string handling essentials library
used by the rsyslog daemon.
Liblognorm is a library and a tool to normalize log data.
Liblognorm shall help to make sense out of syslog data, or, actually, any event data that is present in text form.
In short words, one will be able to throw arbitrary log message to liblognorm, one at a time, and for each message it will output well-defined name-value pairs and a set of tags describing the message.
So, for example, if you have traffic logs from three different firewalls, liblognorm will be able to "normalize" the events into generic ones. Among others, it will extract source and destination ip addresses and ports and make them available via well-defined fields. As the end result, a common log analysis application will be able to work on that common set and so this backend will be independent from the actual firewalls feeding it. Even better, once we have a well-understood interim format, it is also easy to convert that into any other vendor specific format, so that you can use that vendor's analysis tool.
Off-the-Record (OTR) Messaging allows you to have private conversations
over instant messaging by providing: Encryption No one else can read
your instant messages. Authentication You are assured the correspondent
is who you think it is. Deniability The messages you send do not have
digital signatures that are checkable by a third party. Anyone can
forge messages after a conversation to make them look like they came
from you. However, during a conversation, your correspondent is assured
the messages he sees are authentic and unmodified. Perfect forward
secrecy If you lose control of your private keys, no previous
conversation is compromised.
This is a compatibility package providing an earlier version of the
library.
Percona Toolkit is a collection of advanced command-line tools used by Percona (http://www.percona.com/) support staff to perform a variety of MySQL and system tasks that are too difficult or complex to perform manually.
These tools are ideal alternatives to private or "one-off" scripts because they are professionally developed, formally tested, and fully documented. They are also fully self-contained, so installation is quick and easy and
no libraries are installed.
Percona Toolkit is developed and supported by Percona Inc. For more information and other free, open-source software developed by Percona, visit http://www.percona.com/software/.
Tor is a connection-based low-latency anonymous communication system.
This package provides the "tor" program, which serves as both a client and
a relay node. Scripts will automatically create a "%{toruser}" user and
a "%{torgroup}" group, and set tor up to run as a daemon when the system
is rebooted.
Applications connect to the local Tor proxy using the SOCKS
protocol. The local proxy chooses a path through a set of relays, in
which each relay knows its predecessor and successor, but no
others. Traffic flowing down the circuit is unwrapped by a symmetric
key at each relay, which reveals the downstream relay.
Warnings: Tor does no protocol cleaning. That means there is a danger
that application protocols and associated programs can be induced to
reveal information about the initiator. Tor depends on Privoxy and
similar protocol cleaners to solve this problem. This is alpha code,
and is even more likely than released code to have anonymity-spoiling
bugs. The present network is very small -- this further reduces the
strength of the anonymity provided. Tor is not presently suitable
for high-stakes anonymity.
Authors:
--------
- R. Dingledine