NetCrack is cluster software developed to distribute a hashing algorithm's cracking process work using a brute force attack. Currently, it only supports the two most commonly used hashing algorithms: MD5 and SHA-1. Support is included for MySQL, safe mode, and others. It works like a client/server application, where the server is unique for each cluster network and its job is to distribute the cracking process work, coordinate the nodes, and prevent connections and data integrity errors.
httpico is yet another lightweight HTTP server. It implements a few HTML rewriting rules delineated by '<?pico>' tags, and makes it fairly easy to add more straight into the C code. It does not have complete HTTP standards compliance. It also contains a 'genstats' log analysis tool.
VPPPN stands for virtual peer-to-peer private networking. The project provides a VPN client using a custom protocol to be able to set up a point-to-point dynamic virtual network. This differs from OpenVPN in that it does not need a central server to pass the network's traffic. A central server exists to allocate IP addresses and provide a point of contact for the clients, but once connections are established, these services are no longer needed. This means that a VPPN network is free (as in beer), since to set up a network you do not need to invest in an always-on Internet server. Once established, a VPPPN network behaves in a similar way to a normal IP network. To the end user, this means you can set up an office network and drag and drop files between computers in a secure manner over the Internet.
DIFFUSE enables FreeBSD's IPFW firewall subsystem to classify IP traffic based on statistical traffic properties. With DIFFUSE, IPFW computes statistics (such as packet lengths or inter-packet time intervals) for observed flows, and uses ML (machine learning) techniques to assign flows into classes. In addition to traditional packet inspection rules, IPFW rules may now also be expressed in terms of traffic statistics or classes identified by ML classification. This can be helpful when direct packet inspection is problematic (perhaps for administrative reasons, or because port numbers do not reliably identify classes of applications). DIFFUSE also enables one instance of IPFW to send flow information and classes to other IPFW instances, which then can act on such traffic (e.g. to prioritize, accept, or deny) according to its class. This allows for distributed architectures, where classification at one location in your network is used to control firewalling or rate-shaping actions at other locations.