Trojan scan is a simple shell script that allows for simple but relatively effective checking for trojans, rootkits and other malware that may be using your server and network for unwanted (and possibly illegal) purposes. It works by listing all processes that use the Internet with the lsof command (using -Pni flags). This list is then transformed into signatures in the form of process_name:port_number:user. These signatures then are matched against the allowed process defined in the configuration. If any signatures of running processes are found that do not match the allowed signatures, an email report is sent including ps, ls, and optional lsof output.
Ametys is a powerful Web CMS used by many institutions of higher education and government, but also industries and SMEs. It is known for its ergonomic design which promotes ease of use, its social Web functionality, and the ability to manage a large number of users. It makes content publishing accessible for the non-programmer and provides an easy editorial interface very similar to Microsoft Office applications.
PirateWall is a simple Twitter Client. It displays search results for a certain keyword or hashtag in realtime in a shell-based environment. It can also be configured to act as a data provider for many different visualization tools. For example, it is possible to use the client as a text generator for many XScreensaver applications like "apple2" or "starwars". When used in a Unix shell environment, colorized output can be generated.
Spinneret is a structured storage engine that can be thought of as an extended tuple storage system. It takes the best aspects of relational, object, and hierarchical databases and throws away the dead weight associated with those technologies. The benefit of Spinneret is that its data model is incredibly flexible, allowing it to expose its underlying data in any number of ways. It operates similar to an object database, but without hard ties to an originating language, and can also behave like a relational database without the burden of complex joins.
ratproxy is a semi-automated, largely passive Web application security audit tool optimized for accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex Web 2.0 environments.
Dudders spells "Dynamically Updating DNS Duly Embracing RSA SIG(0)" (with some poetic license). It points a domain name to a given IP address using the DNS UPDATE protocol and a SIG(0) signature. It is designed with embedded systems in mind and is especially useful as a dynamic DNS solution for a home modem/router with a dynamic IP.
Weed-FS is a simple and highly scalable distributed file system. There are two objectives: to store billions of files, and to serve the files fast! Instead of supporting full POSIX file system semantics, it implements only a key-file mapping. Instead of managing all file metadata in a central master, it manages file volumes in the central master and lets volume servers manage files and the metadata. This relieves concurrency pressure from the central master and spreads file metadata into volume servers' memories, allowing faster file access with just one disk read operation. It is modelled on Facebook's Haystack design paper. Only 40 bytes of disk storage are required for each file's metadata, and disk reads are O(1).
OpenXPKI is a Web and CLI-based enterprise-grade PKI/trust center system (X509 public key infrastructure) complete with CA, Web interfaces, offline support, and support for well established infrastructure components like RDBMS and Hardware Security Modules. Flexibility and modularity are the project's key design objectives. Unlike many other PKI solutions, it offers powerful features necessary for professional environments. However, small scale installations are also targeted by providing quick-start configuration examples that allow you to get a usable PKI running quickly.
ProteomeCommons.org IO Framework is a proper Java framework for handling spectra and peak lists. The framework can read and write to a number of different spectra and peak list formats, and it provides a simple, intuitive Java object model for working with spectra or peak lists. All classes support two methods of handling peak list and spectrum data: in-memory or stream. The goal of this framework is to support all the popular MS and MSMS data formats, and to eliminate any time or effort involved in figuring out how to read and write peak list or spectrum files.