Boar provides simple version control and backup for photos, videos, and other binary files. Boar aims to be the perfect way to make sure your most important digital information, like pictures, movies, and documents, is stored safely. It makes it possible for you to restore any or all of your files from any point in time. It makes it easy to maintain verified backups of your data, including file history. It imposes no limits on file or repository sizes. Using boar is an effective way to prevent data loss due to human or machine error.
With the Cibet framework, it is very easy to add various control mechanisms into a JPA and/or EJB-based Java application. The actual version includes control schemes like Archiving (manipulation of domain objects; data and execution of business processes are archived). From the archived state, domain objects can be reconstructed and business processes can be re-invoked with the same parameters at any time. The archive entries are secured against manipulation to make them audit-proof and revision safe. Four-eyes principle: this scheme is an example of a dual control mechanism: A user wants to perform some critical data manipulation or business process. With an applied dual control mechanism, the action is not executed in the production system directly, but stored and postponed. A second user must check the data and the action and can approve or decline. Only when the second user approves, the data manipulation or business process is executed in the production system; otherwise it is discarded. An even stricter example for a dual control mechanism is the six-eyes principle. In this case, a third user must approve a data manipulation or business process before it will become productive.
VeriTAR [Veri(fy)TAR] is a command-line utility that verifies the MD5 sums of files within a tar archive. Due to the limitations of the tar ("ustar") format, the MD5 sums are retrieved from a separate file and are checked against the MD5 sums of the files within the tar archive. The process takes place without actually exctracting the files. It works even with corrupted tar archives. The program carries on to the next file within the archive, skipping the damaged parts. At the moment, this relies on internal functions of Python's tarfile module.
Conary is a distributed software management system for Linux distributions. It replaces traditional package management solutions (such as RPM and dpkg) with one designed to enable loose collaboration across the Internet. It enables sets of distributed and loosely connected repositories to define the components which are installed on a Linux system. Rather than having a full distribution come from a single vendor, it allows administrators and developers to branch a distribution, keeping the pieces which fit their environment while grabbing components from other repositories across the Internet.