phpMyAdmin is a tool intended to handle the administration of MySQL over the Web. It can create, rename, and drop databases, create/drop/alter tables, delete/edit/add fields, execute any SQL statement, manage keys on fields, create dumps of tables and databases, export/import CSV data, and administrate one single database and multiple MySQL servers.
cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up.
GLPI (Gestion Libre de Parc Informatique) is an information resource manager with an administration interface. You can use it to build a database with an inventory for your company (computers, software, printers, etc.). It has functions to make the daily life of the administrators easier, including a job/request tracking system with mail notification and methods to build a database with basic information about your network topology. It provides a precise inventory of all the technical resources (all their characteristics are stored in a database) and management and history of the maintenance actions and the bound procedures. It is dynamic and is directly connected to the users, who can post requests to the technicians.
Stealth (SSH-based Trust Enhancement Acquired through a Locally Trusted Host) is a file integrity scanner. It differs from a program like Tripwire in that it does not require the use of read-only media or modifiable logs. It leaves (almost) no trace on the computer being checked. It is very difficult for intruders to detect or evade, and cannot be modified by intruders. It can be used to perform integrity checks on many computers without a heavy maintenance burden. It can be used without being installed on the target computer.
di is a disk information utility that displays everything that df does and more. It features the ability to display your disk usage in whatever format you prefer. It also checks the user and group quotas, so that the user sees the space available for their use, not the system wide disk space. It is designed to be highly portable across many platforms and is great for heterogenous networks.
The goal of Escape-K is to provide an all-in-one platform for IT service management. This means that using a single application (the Escape-K client console), users are able to manage any sized computer organization, from workstation and printers to servers, databases, or network devices. Escape-K follows the main guidelines recommended by ITIL. Therefore, the core of the application is the composed of the CMDB. Depending of the chosen perspective, Escape-K users can deal with incidents and problem resolution as well as server or database administration.