Cedar Backup is a software package designed to manage system backups for a pool of local and remote machines. Cedar Backup understands how to back up filesystem data as well as MySQL and PostgreSQL databases and Subversion repositories. It can also be easily extended to support other kinds of data sources. Cedar Backup is focused around weekly backups to a single CD or DVD disc. It supports multisession discs, allowing you to add incremental data to a disc on a daily basis. Cedar Backup also provides a Python library of backup-related functionality.
Chestnut Package Manager is a utility to handle executables and resource files in a transparent, platform independent, and relocatable way. Its concept is similar to Apple bundles and Java archives. It is implemented in Python. Chestnut makes it possible to invoke programs or obtain resources without knowledge of their absolute or relative path, making them accessible even after relocation of the package to another directory.
Chiron FS is a FUSE based filesystem that implements replication at the filesystem level like RAID 1 does at the device level. The replicated filesystem may be of any kind you want; the only requisite is that you mount it. There is no need for special configuration files; the setup is as simple as one mount command (or one line in fstab).
With the Cibet framework, it is very easy to add various control mechanisms into a JPA and/or EJB-based Java application. The actual version includes control schemes like Archiving (manipulation of domain objects; data and execution of business processes are archived). From the archived state, domain objects can be reconstructed and business processes can be re-invoked with the same parameters at any time. The archive entries are secured against manipulation to make them audit-proof and revision safe. Four-eyes principle: this scheme is an example of a dual control mechanism: A user wants to perform some critical data manipulation or business process. With an applied dual control mechanism, the action is not executed in the production system directly, but stored and postponed. A second user must check the data and the action and can approve or decline. Only when the second user approves, the data manipulation or business process is executed in the production system; otherwise it is discarded. An even stricter example for a dual control mechanism is the six-eyes principle. In this case, a third user must approve a data manipulation or business process before it will become productive.
Cisco Configuration Manager is a set of tools to manage configurations for Cisco devices. At the heart of the project is a tftp daemon. Configurations are read and written to the tftp server using a file path that incorporates a password feature for security. The current version of each device configuration is stored in a MySQL database. Subsequent changes to the configurations are stored in diff format to provide revision history. A Web frontend is provided to manage devices and view configurations and history.
Cleversafe is a storage software solution that offers extremely high reliability and security. Cleversafe uses fast information dispersal algorithms to store small slices of data in multiple, disparate locations. Each slice is individually unusable, yet any majority of the slices can perfectly recreate all of the original data. A large dispersed storage grid with 11 or more storage locations can remain fully operational even if up to any 5 of the storage nodes are not operational.
The CloneIt system was created to copy and essentially clone harddisks of identical PCs through a network. This is a common task when installing server racks or farms or when updating a computer-lab setup where one deals with identical machines. The system software consists of a Linux boot floppy and a ramdisk floppy with minimal system utilities that can perform the task of copying the complete contents of disk devices through a network.
Clonezilla is a partition or disk cloning tool similar to Symantec Ghost. It saves and restores only blocks in use on the hard drive if the file system is supported. For unsupported file systems, dd is used instead. It has been used to clone a 5 GB system to 40 clients in about 10 minutes.