ICBM3D (Inter-Continental Ballistic Missiles, 3D) is a 3D game of defense. Like the original "Missile Command" and its clones, this game places you in control of Anti-ICBM weapons which you use to destroy an onslaught of missiles (and other nasties) which are dropping onto your nation. The game ends when your cities have all been destroyed. You only gain replacement cities by acheiving certain score thresholds during each attack. The differences between Missile Command and ICBM3D is that ICBM3D, as the name suggests, provides a 3D perspective. You take advantage of X-Window's 3-button mouse to control your firing sight in 3-dimensions and change your viewpoint.
ICI is a general purpose interpretive programming language that has dynamic typing and flexible data types with the flow control constructs and operators of C. It is designed for use in many environments, including embedded systems, as an adjunct to other programs, as a text-based interface to compiled libraries, and as a cross-platform scripting language with good string-handling capabilities.
Ident2 is an alternative approach to auth/ident services. It was written from the ground up and can run either as a child handler of inetd or as a standalone daemon with no user intervention. Users can set their own replies or toggle random replies, all at the system administrator's preference, of course. Full compliance with RFC1413 is attempted.
XamimeLT is an email scanner which encapsulates your existing sendmail or Postfix server setup. It scans both incoming and outgoing email. It can scan for email viruses, unwanted file types (eg. EXE, BMP, MPEG) and file names (eg. prettypark.exe), spam, and almost anything you care to search for in an email. It can also be used to scan for text snippets within emails and to insert disclaimers into outbound emails. XamimeLT was formerly known as "Inflex".
integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. integrit's major advantages are a small memory footprint and simplicity. It works by creating a database that is a snapshot of the most essential parts of your computer system. You put the database somewhere safe, and you can then use it to make sure that no one has made any illicit modifications to the computer system. In the case of a break in, you know exactly which files have been modified, added, or removed.
The ipaudit package records and displays network activity. It is useful for identifying heavy bandwidth users, intrusive telnet sessions, denial of service attacks, and scans. It includes ipaudit, which stores counts of bytes and packets for every combination of host/port pairs and protocol. The utilities total and ipstrings can be used to investigate network traffic records from the command line. ipaudit-web can collect network traffic statistics and generate Web reports.
iplog is a TCP/IP traffic logger. Currently, it is capable of logging TCP, UDP, and ICMP traffic. iplog is able to detect TCP port scans, TCP null scans, FIN scans, UDP and ICMP "smurf" attacks, bogus TCP flags, TCP SYN scans, TCP "Xmas" scans, ICMP ping floods, UDP scans, and IP fragment attacks. iplog is able to run in promiscuous mode and monitor traffic to all hosts on a network. iplog uses libpcap to read data from the network and can be ported to any system that supports pthreads and on which libpcap will function.