John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, lots of other hashes and ciphers are added in the community-enhanced version (-jumbo), and some are added in John the Ripper Pro.
Gammu (formerly known as MyGnokii2) is a cellular manager for various mobile phones/modems. It supports a wide variety of Nokia, Symbian, and AT devices (Siemens, Alcatel, Falcom, WaveCom, IPAQ, Samsung, SE, and others) over cables, infrared, or BlueTooth. It contains libraries with functions for ringtones, phonebook, SMS, logos, WAP, date/time, alarm, calls, and more (used by external applications like Wammu). It also includes a command line utility that can make many things (including backups) and an SMS gateway with full MySQL and PostgreSQL support from the PHP interface.
The stunnel program is designed to work as an SSL encryption wrapper between remote client and local (inetd-startable) or remote server. It can be used to add SSL functionality to commonly used inetd daemons like POP2, POP3, and IMAP servers without any changes in the programs' code. It will negotiate an SSL connection using the OpenSSL or SSLeay libraries. It calls the underlying crypto libraries, so stunnel supports whatever cryptographic algorithms you compiled into your crypto package.
gnokii is a multisystem tool suite for mobile phones. It provides a library to communicate with a phone hiding the communication protocol. The library handles SMS, phonebook, calendar, phone calls, and other mobile phone capabilities. It supports Nokia-FBUS mobiles, AT-capable phones (most of the mobiles), as well as Symbian-based phones.
ModSecurity is an intrusion detection and prevention engine for Web applications (sometimes called a Web application firewall). Operating embedded or as part of an Apache reverse proxy, it increases Web application security, protecting Web applications from known and unknown attacks. It is flexible and easy to configure. It monitors HTTP traffic (including POST payloads), detects or prevents attacks, enhances logging, performs anti-evasion, and allows administrators to create custom rules to suit their specific needs. It excels in HTTP traffic monitoring and just-in-time vulnerability patching.
Enca detects the encoding of text files, on the basis of knowledge of their language. It can also convert them to other encodings, allowing you to recode files without knowing their current encoding. It supports most of Central and East European languages, and a few Unicode variants, independently on language.
fli4l is a single-floppy Linux-based ISDN/DSL/ethernet-router. It features configuration with some simple ASCII-files, several possible connection-flavors (in/out/callback, and raw IP/PPP), channel bundling (an extra channel can be added through a Windows/Unix-client), configuration of multiple networks, least-cost routing, automatic choice of provider, display/calculation of connection times and costs, and a Windows/Unix client to control dial/hangup, monitor traffic and monitor incoming calls on ISDN (see screenshot).
chrony is a client and server for the Network Time Protocol (NTP). This program keeps your computer's clock accurate. It was specially designed to support systems with intermittent Internet connections, but it also works well in permanently connected environments. It can also use hardware reference clocks, the system real-time clock, or manual input as time references.
Ziproxy is a high-performance forwarding (non-caching) HTTP proxy that gzips text and HTML files, and reduces the size of images by converting them to lower quality JPEGs or JPEG 2000. It is intended to increase the speed for low-speed Internet connections (mobile, dial-up, other). It's suitable for both home and professional usage. Ziproxy is fully configurable and also features transparent proxy mode, HTML/JS/CSS optimization, operation in daemon mode, a detailed access log with compression statistics, basic authentication, and more.