The Parallel Virtual File System is a user-space parallel file system for use on clusters of PCs (and Beowulfs in particular). It provides transparent file striping across multiple machines and includes a loadable kernel module for use with existing binaries. TCP/IP is used for data transmission, and file data is stored on existing file systems on each machine.
BleachBit deletes junk to recover disk space and maintain privacy. It rids your system of old junk including cache, Internet history, temporary files, unused locale files (better than localepurge), logs, and cookies. Designed for Linux systems, it wipes clean 50 applications including Adobe Reader, Bash, Firefox, Flash, OpenOffice.org, Opera, Real Player, Skype, and more. It shreds files so that they cannot be recovered, and it wipes free disk space to hide insecurely deleted files. It offers both a simple PyGTK GUI and a command line interface for automation.
Parrot and Chirp are user-level tools that make it easy to rapidly deploy wide area filesystems. Parrot is the client component: it transparently attaches to unmodified applications, and redirects their system calls to various remote servers. A variety of controls can be applied to modify the namespace and resources available to the application. Chirp is the server component: it allows an ordinary user to easily export and share storage across the wide area with a single command. A rich access control system allows users to mix and match multiple authentication types. Parrot and Chirp are most useful in the context of large scale distributed systems such as clusters, clouds, and grids where one may have limited permissions to install software.
The dump package contains both dump and restore. Dump examines files in a filesystem, determines which ones need to be backed up, and copies those files to a specified disk, tape or other storage medium. The restore command performs the inverse function of dump; it can restore a full backup of a filesystem. Subsequent incremental backups can then be layered on top of the full backup. Single files and directory subtrees may also be restored from full or partial backups.
Freedup finds and eliminates duplicate files by linking them, and thus reduces the amount of used disk space within one or more file systems. By default, hardlinks are used on a single device, symbolic links when the devices differ. A set of options allows you to modify the methods of file comparison, the hash functions, the linking behavior, and the reporting style. You may use batch or interactive mode. Freedup usually only considers identical files, but when comparing audio or graphics files, you may elect to ignore the tags.
xlike is a patch collection for the Linux vanilla kernel. It includes as many stable enhancements for the Linux kernel as possible. These include code from Xen, Kernel Mode Linux, Rule Set Based Access Control, Novell AppArmor, Openswan, grsecurity, Linux VServer, Linux-PHC, web100, Nefilters, Suspend2, Speakup, SquashFS, UnionFS, Bootsplash, BadRAM, and more. It also contains many drivers and fixes.
Bonnie++ is based on the Bonnie hard drive benchmark by Tim Bray. The most notable features that have been added are support for >2G of storage and testing operations involving thousands of files in a directory. This program is used by ReiserFS developers, but can be useful for anyone who wants to know how fast their hard drive or file system is. It now includes ZCAV in the package. This program tests the performance of different zones on the hard drive. ZCAV has been released separately before but will now only be released as part of the Bonnie++ suite.
Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for bulk or emergency data destruction.
giis (gET iT i sAY) is a file recovery tool for Ext2/Ext3 filesystems. Once installed, current files and newly created files can be recovered. It allows users to recover all deleted files, recover files owned by a specific user, dump data from old file locations, and recover files of a specific type, such as text or PNG. A forensic analyzer is also provided to assist users during recovery.