The Advanced Bash Scripting Guide is both a reference and a tutorial on shell scripting. This comprehensive book, the equivalent of 1,000+ print pages, covers almost every aspect of shell scripting. It contains 382 profusely commented illustrative examples, a number of tables, and a cross-linked index/glossary. Not just a shell scripting tutorial, this book also provides an introduction to basic programming techniques, such as sorting and recursion. Included scripts are the Game of Life, a Perquackey variant, a Morse code trainer, and an implementation of the Gronsfeld Cipher. This book is suited for both individual study and classroom use. It covers Bash, up to and including version 4.2. Note that users of miniaturized single-board computers running Linux, such as the Raspberry Pi and the Beagle Bone, would find this Guide useful for learning and running Bash scripts to explore and expand the capabilities of these small, but powerful machines.
Email Security through Procmail (the Procmail Sanitizer) provides methods to sanitize email, removing obvious exploit attempts and disabling the channels through which exploits are delivered. Facilities for detecting and blocking Trojan Horse exploits and worms are also provided.
Nets is a flexible and extensible network inventory and asset management system that works on all Unix and Windows platforms, and works with most SQL databases. Its complete GUI allows you to maintain details of your entire network, from network links down to interfaces and routers. It assists in provisioning, costing, reporting, and maintaining network details. It includes a network browser, an extension API, and plugins for IP address map visualisation, reports, schematics.
This patch integrates SecurID authentication services directly into the OpenSSH daemon, allowing users to use SecurID tokens directly as their passwords instead of relying on the clunky sdshell. It rides on the plain password auth architecture in OpenSSH to avoid requiring ChallengeResponse or firstname.lastname@example.org style auth. It supports full privilege separation.
VK Mail has three main components: an email daemon that acts as a proxy to any standard mail server, an email parser, and a Web mailer. All these together allow users to send email by simply typing an email address in a standard graphical Web browser, and allow better anti-spam control for email recipients. The goal of this project is not to develop an anti-spam email filter that simply deletes the junk messages after they are already delivered to the user. Instead, it rejects emails from spammers.
System Configuration Collector collects and classifies most of your Unix/Linux/BSD configuration data in flat files called snapshots. This allows changes in snapshots of consecutive runs to be detected. These changes are added to a logbook, which is helpful for administrators during troubleshooting and for auditors during audits. Snapshots and logbooks are also available in HTML format. All data can be send to an SCC server, where a Web interface provides access to summaries and supports comparing snapshots of different servers and searching of all data. A WMI-based Windows client is also available.