Raptor is a C library providing a set of parsers and serializers for Resource Description Framework (RDF) triples by parsing syntaxes into RDF triples and serializing triples into a syntax. The parsers support RDF/XML, N-Triples, GRDDL, and Turtle, and via RSS tag soup: XML RSS, Atom 0.3, and Atom 1.0. The serializers support RDF/XML (3 flavours), Turtle, DOT, N-Triples, RSS 1.0, and Atom 1.0. Raptor handles RDF/XML as used by RDF applications such as RSS 1.0, FOAF, DOAP, Dublin Core, and OWL. It can use either expat or libxml2 for XML parsing, libcurl when available for URI retrieval, and is portable to many POSIX systems.
Chandler is a standards-based "Note-to-Self Organizer" designed for personal and small-group task management and calendaring. It consists of a desktop application and Chandler Hub, a free sharing service and Web application. You can also download and run your own Chandler Server.
PHP Asterisk Manager Interface ( AMI ) supports synchronous command ( action )/ responses and asynchronous events using the pattern observer-listener. It supports commands with responses with multiple events. It is very suitable for the development of operator consoles and / or asterisk / channels / peers monitoring through SOA, etc.
The mission of the Apache Portable Runtime (APR) project is to create and maintain software libraries that provide a predictable and consistent interface to underlying platform- specific implementations. The primary goal is to provide an API to which software developers may code and be assured of predictable if not identical behaviour regardless of the platform on which their software is built, relieving them of the need to code special-case conditions to work around or take advantage of platform-specific deficiencies or features.
Trojan scan is a simple shell script that allows for simple but relatively effective checking for trojans, rootkits and other malware that may be using your server and network for unwanted (and possibly illegal) purposes. It works by listing all processes that use the Internet with the lsof command (using -Pni flags). This list is then transformed into signatures in the form of process_name:port_number:user. These signatures then are matched against the allowed process defined in the configuration. If any signatures of running processes are found that do not match the allowed signatures, an email report is sent including ps, ls, and optional lsof output.