[PC-BSD Commits] r15538 - pbi/update

svn at pcbsd.org svn at pcbsd.org
Wed Feb 22 13:15:36 PST 2012


Author: pbiapprove
Date: 2012-02-22 21:15:35 +0000 (Wed, 22 Feb 2012)
New Revision: 15538

Modified:
   pbi/update/pbi-meta-9
Log:
PBI-9 Meta-Update: Remmina

Modified: pbi/update/pbi-meta-9
===================================================================
--- pbi/update/pbi-meta-9	2012-02-22 20:27:21 UTC (rev 15537)
+++ pbi/update/pbi-meta-9	2012-02-22 21:15:35 UTC (rev 15538)
@@ -501,6 +501,7 @@
 App=Red5;Web;http://images.pbidir.com/progicons/red5.png;Red5 Team;http://www.red5.org/;LGPL;Server;media,server,flash;Red5 is an Open Source Flash Server written in Java that supports: - Streaming Audio/Video: FLV, MP3, F4V, MP4, AAC, M4A  - Recording Client Streams (FLV only) - Shared Objects - Live Stream Publishing: Sorenson, VP6, h.264, Nelly Moser,    MP3, Speex, AAC, NSV  - Remoting ;;
 App=RedNotebook;Desktop Utilities;http://images.pbidir.com/progicons/rednotebook.png;Jendrik Seipp;http://rednotebook.sourceforge.net/;GPL;Graphical;diary,entry,journal;RedNotebook is a modern journal written by python. It includes a calendar navigation, customizable templates, export functionality and word clouds. You can also format, tag and search your entries. RedNotebook is Free Software under the GPL.;;
 App=Redshift;Accessibility;http://images.pbidir.com/progicons/redshift.png;Jon Lund Steffensen;http://jonls.dk/redshift/;GPL;Text;color,monitor,brightness;Redshift adjusts the color temperature of your screen according  to your surroundings. This may help your eyes hurt less if you  are working in front of the screen at night.;;
+App=Remmina;Network;http://images.pbidir.com/progicons/remmina.png;Remmina Team;http://remmina.sourceforge.net/;GPL;Graphical;remote,desktop;Remmina is a remote desktop client written in GTK+, aiming to be useful for system administrators and travellers, who need to work with lots of remote computers in front of either large monitors or tiny netbooks. Remmina supports multiple network protocols in an integrated and consistant user interface.  The Remmina main program:   * A pure GTK+ 2.0 application!  * Maintain a list of remote desktop files, organized by groups  * Make quick connections by directly putting in the server name  * Remote desktops with higher resolutions are scrollable/scalable in both    window and fullscreen mode  * Viewport fullscreen mode: remote desktop automatically scrolls when the    mouse moves over the screen edge.  * Floating toolbar in fullscreen mode, allows you to switch between modes,    toggle keyboard grabbing, minimize, etc.  * Tabbed interf!
 ace, optionally managed by groups  * Supported network protocols: RDP, NX, Telepathy, VNC, XDMCP, SSH, Avahi;;
 App=Return to Castle Wolfenstein;Games;http://images.pbidir.com/progicons/rtcw.png;id Software;http://www.castlewolfenstein.com;Commercial;Graphical;game,fps,wolfenstein;Return to Castle Wolfenstein is a remake of sorts of the early, seminal first-person shooter, Wolfenstein 3D. However, with the advances in graphics technology and gameplay design since the original game, without the name and the occasional in-game references, it would be unrecognisable as a remake. Unlike the original Wolfenstein 3D, only a handful of the single player missions in Return to Castle Wolfenstein takes place in the infamous castle/prison.;;
 App=Rhythmbox;Audio;http://images.pbidir.com/progicons/rhythmbox.png;Rhythmbox project;http://projects.gnome.org/rhythmbox/;GPL;Graphical;audio,player;Rhythmbox is an integrated music management application, originally inspired by Apple\'s iTunes.  It is free software, designed to work well under the GNOME Desktop, and based on the powerful GStreamer media framework.;;
 App=RootkitHunter;Security;http://images.pbidir.com/progicons/rootkithunter.png;Rootkit Hunter Team;http://rkhunter.sourceforge.net/;Other;Text;scan,anti-malware;Rootkit Hunter is scanning tool to ensure you for about 99.9% you\'re clean of nasty tools.  This tool scans for rootkits, backdoors and local exploits by running tests like:  - MD5/SHA1 hash compare - Look for default files used by rootkits - Wrong file permissions for binaries - Look for suspected strings in LKM and KLD modules - Look for hidden files - Optional scan within plaintext and binary files;;



More information about the Commits mailing list