The Header and Envelope rewrite mini-HOWTO explains how to rewrite your from address differently in the mail header and the mail envelope. This may be necessary, for example, if your ISP requires you to send mail with one address, but you are subscribed to mailing lists with a different address, or want others to see a forwarding address instead of your ISP's address.
The Heirloom Documentation Tools provide troff, nroff, and related utilities to format manual pages and other documents for output on terminals and printers. They are portable and enhanced versions of the respective OpenSolaris utilities, which descend from ditroff and the historical Unix troff. troff provides advanced typographical features such as kerning, tracking, and hanging characters. It can access PostScript Type 1, OpenType, and TrueType fonts directly. Internationalized hyphenation, international paper sizes, and UTF-8 input are supported.
IDX-DocBook2LaTeX is a stylesheet which translates DocBook documents into LaTeX. It is written in Perl, using the XML::XPathScript package from AxKit. It features the ability to handle tables, indices, figures, footnotes, and more. The XSLT-like templating philosophy built into XPathScript makes it easy to extend.
a2ping is a Unix command line utility that converts many raster image and vector graphics formats to EPS or PDF and other page description formats. Accepted input file formats are: PS (PostScript), EPS, PDF, PNG, JPEG, TIFF, PNM, BMP, GIF, LBM, XPM, PCX, and TGA. Accepted output formats are: EPS, PCL5, PDF, PDF1, PBM, PGM, PPM, PS, markedEPS, markedPS, PNG, XWD, BMP, TIFF, JPEG, GIF, and XPM. a2ping delegates the low-level work to Ghostscript (GS), pdftops, and sam2p. Only the first page of PDF and PS files are converted.
alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.