The WiKID Strong Authentication System is a highly scalable, secure two-factor authentication system. It is simple to implement and maintain, allows users to be validated automatically, requires no hardware tokens, has a simple API for application support (via Ruby, PHP, Java, COM, Python, etc.), supports multiple domains, and supports replication for fault tolerance and scalability. It also supports mutual /host and transaction authentication, wireless tokens only domains, locked tokens (to your PC), anti-keystroke logger keypad PIN entry, etc.
The Open-Transactions project is a collaborative effort to develop a robust, commercial-grade, fully-featured, free-software toolkit implementing a full-strength financial cryptography library, API, CLI, and prototype server. Open-Transactions democratizes financial and monetary actions. You can use it for issuing currencies/stock, paying dividends, creating asset accounts, sending/receiving digital cash, writing/depositing cheques, cashier's cheques, creating basket currencies, trading on markets, scripting custom agreements, recurring payments, escrow, etc. Strong crypto is used. Balances are unchangeable (even by a malicious server). Receipts are destructible and redundant. The transactions are unforgeable. The cash is untraceable. The cheques are non-repudiable.
Alexandria is a GNOME application to help manage a book collection. It retrieves book information (including cover pictures) from several online libraries, allows you to search for a book (either by EAN/ISBN, title, authors, or keyword), can import and export data into ONIX, Tellico, and EAN/ISBN-list formats, generates Web pages from your libraries, allows marking your books as loaned, saves data using the YAML format, features an HIG-compliant user interface, shows books in different views that can be filtered or sorted, and handles book rating and notes.
RedWolf is a security threat simulator that tests security system effectiveness. Its threat generation capabilities include email, IM, malware, P2P, social networking, VoIP, DDoS, and many more. The guiding philosophy is that by generating realistic scenarios in a wide variety of categories, an auditor or organization can assess the effectiveness of network defenses. The scenario suite allows one to verify compliance with PCI-DSS, Sarbanes-Oxley, or HIPAA controls. RedWolf helps identify data loss risks and provides expert recommendations concerning risk mitigation. It reports present findings, recommendations, best practices, and blocking guidance in a straightforward, easily readable format. RedWolf also acts as a 'Red Team' agent, running drills to measure the readiness of your operations staff.
Foodsoft is online software for a non-profit food coop. It features a product catalog, order cycle management, accounting, and tasks. A food cooperative is a group of people that buy food from suppliers of their own choosing; a collective do-it-yourself supermarket. Members order their products online and collect them on a specified day, and all put in a bit of work to make that possible. foodsoft facilitates the ordering and administration.
Umple can be used for pure UML modeling. Or it can be used to add UML constructs, such as associations and state machines to code written in Java, PHP, or Ruby. It generates code in these languages that can save a large amount of programming effort and result in higher quality. The UmpleOnline tool allows you to edit UML diagrams graphically, and watch the Umple textual code being written in real time. This works the other way too: you can write textual Umple and watch the corresponding UML diagram appear. Umple is being extended to support patterns, tracing, and a variety of other features. Umple is written in itself, which is central to maintaining its quality. Umple can be used today by any programmer or modeler.
LBackup is a simple backup system aimed at systems administrators who require reliable backups with minimum fuss. It is configured with configuration files, and the backup is started from the command line. It has been tested for over 10 years. Backups can be to local media, or to remote media via one or more networks. The networks may be private LANs, WANs, or sets of untrusted public networks such as the Internet.