Blur effect is an object that can apply the blur effect to HTML page elements. It takes the identifier of a given page element and starts an animation effect that progressively alters CSS properties of that element that make it appear blurred. Different CSS properties may be altered depending on the capabilities of the current browser. The object can also execute an animation that reverts the blur effect of the element. There are versions of the object either based or not in the jQuery library.
The Boehm-Demers-Weiser conservative garbage collector can be used as a garbage collecting replacement for C malloc or C++ new. It is also used by a number of programming language implementations that use C as intermediate code. Alternatively, it may be used as a leak detector for C or C++ programs. A slightly older version of the garbage collector is also included as part of the GNU compiler (gcc) distribution.
The Bright Side Framework provides ready-to-use, high-level J2EE components which will help you quickly build business J2EE applications accessed by rich Java/Swing clients on HTTP. The components are loosely coupled, which allows you to pick only the one you need. The Remoting transparently encapsulates EJB calls inside HTTP. The List Of Values provides nice features for the reference data of all business applications. The Smart Value Object tracks the client modifications and manages the optimistic concurrency during client/server communication. The Remote Iterator allows a rich client to fetch the results of a SQL statement, block by block.
Brighton Chilli is an effort to promote the BSD's in the Wifi field by providing a flash image and bootable ISO with Chillispot for easy rollout of managed Wifi hotspots. Initial releases will be based on FreeBSD, with the aim of covering Open and NetBSD later. The image contains software under various licenses.
Bruteblock allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attackers' IP addresses into the ipfw2 table, effectively blocking them. Addresses are automatically removed from the table after specified amount of time. Bruteblock uses regular expressions to parse logs, which gives it enough flexibility to be used with almost any network service. Bruteblock doesn't use any external programs and works with ipfw2 tables via the raw sockets API.
The cutils collection is composed of: cdecl and cundecl (decode and encode C type declarations), cobfusc (make a C source file unreadable but compilable), chilight (highlight C source files), cunloop (unloop C loops), yyextract (extract grammar rules from yacc grammar), and yyref (generate a cross-reference for yacc input).