HostsAllow is a client-server pair that allows users with dynamic IP addresses to register their current IP address to a server via a Web interface. The registration adds the IP address to the server's list of allowed hosts (i.e. the hosts.allow file), allowing the user to access the server through protocols such as SSH. A secure authentication method is used for the registration.
Lufft L2P Nagios Plugin enables Nagios to check L2P devices (e.g., OPUS20 devices). It's written in Bash and uses the "Lufft L2P Script Collection". L2P is the "lufft logger protocol" developed by G. Lufft Mess- und Regeltechnik GmbH in Germany, a producer of climatological precision measuring equipment.
bondctl is a utility that allows you create, configure, and destroy bonding interfaces on Linux. It duplicates all the functionality of ifenslave with additional capabilities, including the ability to configure parameters on a per-master basis. It's a simple script that works off of sysfs and is compatible with the busybox implementation of ash, making it suitable for initramfs environments.
DUST (Driver UpdateS Tool) is designed to "just work" for building kernel driver modules. The concept is similar to DKMS, though this has the benefit of being simpler, easier to test and use, and easier to integrate. DUST enables you to package up a driver pack, install it into the dust directory, and prepare for upgrading. Each driver pack has 3 components: an install file (populates a tree with stuff needed to build a working driver); the driver payload (tarball, zip file, etc.); and the update script, which will do nothing but copy the old driver kernel modules to a backup directory, build/install a new copy of the driver kernel, run depmod if needed, and mkinitramfs, mkinitrd, or dracut if needed. The install file is very trivial. It is easy to recode this as an RPM or deb. As long as it moves the driver payload and update script to the right location, you can use any mechanism to do this.
RedWolf is a security threat simulator that tests security system effectiveness. Its threat generation capabilities include email, IM, malware, P2P, social networking, VoIP, DDoS, and many more. The guiding philosophy is that by generating realistic scenarios in a wide variety of categories, an auditor or organization can assess the effectiveness of network defenses. The scenario suite allows one to verify compliance with PCI-DSS, Sarbanes-Oxley, or HIPAA controls. RedWolf helps identify data loss risks and provides expert recommendations concerning risk mitigation. It reports present findings, recommendations, best practices, and blocking guidance in a straightforward, easily readable format. RedWolf also acts as a 'Red Team' agent, running drills to measure the readiness of your operations staff.
The GUIShell project is a collection of utilities facilitating the use of the GTK+ toolkit in shell scripts through the gtkshell utility. The ACE configuration environment provides sample scripts utilizing gtkshell for desktop utilities. rootcat provides the ability to display messages to the root window using Xft, allowing one to write status display scripts.
RemiX diskless is a complete and powerful graphical client system, suitable for X server remote desktops or Windows Terminal Server clients. The aim of this project is simplicity of installation and configuration. Key features include X server autoconfiguration and other auto-detection tools, the possibility to customize a single thin client, accessibility of local resources from a desktop client, a Linux desktop client and a Windows desktop client (multi-boot), remote audio (for both systems), localization of user client messages, an automatic installation script, the option to install to a USB stick, and very speedy installation procedures (2 to 4 minutes per client). The expected time between power-on and appearance of the login screen is 15 seconds on a machine with an 800MHz processor and 128MB RAM.
Duplex is a set of shell scripts (bash) that emulate duplex printing (on both sides of the paper) for sheet-fed printers that do not support duplex printing in hardware. It can operate as a pipe so that applications can use it as a duplex printing driver. Its unique feature is its ability to print many duplex print jobs in one batch, printing the odd sides of all jobs and then the even sides in just two passes. It has a limited graphical interface.