Hello, Please review & comments.
Thanks. Best regards, Jul $ cat security/log2timeline/pkg/DESCR The main purpose is to provide a single tool to parse various log files and artifacts found on suspect systems (and supporting systems, such as network equipment) and produce a timeline that can be analysed by forensic investigators/analysts. $ cat devel/p5-Data-Hexify/pkg/DESCR This module exports one subroutine: Hexify. Hexify formats arbitrary (possible binary) data into a format suitable for hex dumps in the style of xd or hexl. The first, or only, argument to Hexify contains the data, or a reference to the data, to be hexified. Hexify will return a string that prints as follows: 0000: 70 61 63 6b 61 67 65 20 44 61 74 61 3a 3a 48 65 package Data::He 0010: 78 69 66 79 3b 0a 0a 75 73 65 20 35 2e 30 30 36 xify;..use 5.006 and so on. At the left is the (hexadecimal) index of the data, then a number of hex bytes, followed by the chunk of data with unprintables replaced by periods. An optional second argument can be used to tailor the Hexify output to your specific needs. $ cat devel/p5-Date-Manip/pkg/DESCR Date::Manip is a series of modules which can do pretty much any date/time operation you could ever want. [...] $ cat devel/p5-Test-Inter/pkg/DESCR This is another framework for writing test scripts. It is loosely inspired by Test::More, and has most of it's functionality, but it is not a drop-in replacement. $ cat security/p5-Digest-CRC/pkg/DESCR The Digest::CRC module calculates CRC sums of all sorts. It contains wrapper functions with the correct parameters for CRC-CCITT, CRC-16 and CRC-32. $ cat sysutils/p5-File-Mork/pkg/DESCR This is a module that can read the Mozilla URL history file -- normally $HOME/.mozilla/default/*.slt/history.dat -- and extract the id, url, name, hostname, first visted dat, last visited date and visit count. To find your history file it might be worth using Mozilla::Backup which has some platform-independent code for finding the profiles of various Mozilla-isms (including Firefox, Camino, K-Meleon, etc.). $ cat sysutils/p5-Parse-Win32Registry/pkg/DESCR This perl module and the few scripts which are packaged with it allow you to parse Windows Registry Files.