ADODB is a set of advanced PHP database abstraction classes. It supports MySQL, PostgreSQL, Interbase/Firebird, Informix, Sybase SQL Anywhere, Oracle, MS SQL 7 and 2000, SAP DB, Sybase, DB2, FrontBase, Foxpro, Access, Netezza, LDAP, ODBTP, ADO, and generic ODBC. A metatype system is built in, making it possible to figure out that types such as CHAR, TEXT, and STRING are equivalent in different databases. It also features portable database creation, database-backed session support (with encryption), SQL performance monitoring, and database health checks.
Addns.pl is a self-contained DynDNS update client for DynDNS.org (and possibly others). It supports a variety of IP detection methods including external webcheck/router pages. It also supports multiple configurations and hostnames, smart abuse prevention, and custom/static/dynamic DNS, and can run as a daemon, commandline options only, or with a configuration file.
Automated Password Generator is a set of tools for random password generation including a standalone password generator, an RFC972 password generation server, and a Perl client for the password generation server. These feature a built-in X9.17 random number generator, and 35 modes of password generation, including pronounceable password generation.
BitchX is the premiere IRC (Internet Relay Chat) client. It originally was a modified version of the popular ircII client, and the features were eventually merged into the EPIC IRC client. The current development is aimed at merging the client back to a current branch of EPIC and bringing compatibility and stability back to the client, while bringing the features that are BitchX into a new client.
Brighton Chilli is an effort to promote the BSD's in the Wifi field by providing a flash image and bootable ISO with Chillispot for easy rollout of managed Wifi hotspots. Initial releases will be based on FreeBSD, with the aim of covering Open and NetBSD later. The image contains software under various licenses.
Bruteblock allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attackers' IP addresses into the ipfw2 table, effectively blocking them. Addresses are automatically removed from the table after specified amount of time. Bruteblock uses regular expressions to parse logs, which gives it enough flexibility to be used with almost any network service. Bruteblock doesn't use any external programs and works with ipfw2 tables via the raw sockets API.