AIDE (Advanced Intrusion Detection Environment) is a file and directory integrity checker. It creates a database from the regular expression rules that it finds from the config file. Once this database is initialized it can be used to verify the integrity of the files. Several message digest algorithms are used. All of the usual file attributes can also be checked for inconsistencies.
EtherApe is a GNOME/pcap-based etherman, interman, and "tcpman" clone. It displays network activity graphically. Active hosts are shown as circles of varying size, and traffic among them is shown as lines of varying width. It supports Ethernet, FDDI, Token Ring, ISDN, PPP, WLAN, and SLIP transports. It knows about VLANs, IP, IPv6, TCP, UDP, FTP, and a number of other protocols. Additional statistics windows will let you concentrate on protocols or nodes.
di is a disk information utility that displays everything that df does and more. It features the ability to display your disk usage in whatever format you prefer. It also checks the user and group quotas, so that the user sees the space available for their use, not the system wide disk space. It is designed to be highly portable across many platforms and is great for heterogenous networks.
CensorNet Professional is a Web filtering and Internet management tool that is designed to protect, control, and monitor individuals accessing Internet resources on a local area network. It features the ability to control users and machines, group policies, time quotas, realtime content filters (by file extension or image/MIME type), modules, comprehensive reporting with audit trails and management reports, access schedules, and bandwidth limitations. Transparent authentication with Active Directory is available for ease of deployment. Administration can been done using a Web interface.
Snortalog is a powerful Perl script that summarizes Snort logs, making it easy to view any network attacks detected by Snort. It can generate charts in HTML, PDF, and text output. It works with all versions of Snort, and can analyze logs in three formats: syslog, fast, and full snort alerts. Moreover, it is able to summarize other logs like CheckPoint, Netfilter, IPFilter, Packet Filter, Cisco PIX/ASA, NetScreen, TippingPoint, and Lucent BRICK in a similar way.
MIB Smithy is an application for SNMP and COPS developers, MIB and PIB designers, and Internet-draft authors. It provides a GUI-based environment for designing, editing, and compiling MIB and PIB modules according to the SMIv1, SMIv2, and COPS-PR-SPPI standards. It accelerates the development process by providing an easy-to-use GUI-based environment for developing the specifications without the syntax and formatting concerns of editing the modules by hand. It includes a number of built-in basic SNMP management tools, XML support, and (with MIB Smithy Professional) support for custom compiler output formats.
MIB Smithy SDK is a dynamic extension to Tcl/Tk (8.4+) that allows development of custom scripts for controlling SNMP agents, manipulating SMI definitions, doing conversions, and more. It is based on the core of Muonics' MIB Smithy, and the SDK supports SMIv1 and SMIv2, as well as SNMPv1/v2c/v3 with HMAC-SHA-96 and HMAC-MD5-96 authentication and DES/CBC and AES128/CFB privacy. It also provides complete read-write access to all elements of SMI/MIB Module definitions, unlike similar extensions that provide only read access to a limited subset. The SDK allows multiple discrete SMI databases and SNMP sessions, and provides all of the built-in validation and error recovery capabilites of the full product, without the visual MIB development environment.
Oak monitors syslogs from a collection of servers, and notifies the operators when problems arise. In addition to providing immediate notification of critical issues, it will also batch less critical problems into summary messages, which can be sent less often, and via any medium. It is part of the 'ktools' collection of network administration utilities.