JSTUN is a STUN (Simple Traversal of UDP (User Datagram Protocol) through NAT (Network Address Translation)) implementation. STUN provides a means for applications to discover the presence and type of firewalls or NATs between them and the public Internet. In the presence of a NAT, STUN can also be used by applications to learn the public Internet Protocol (IP) address assigned to the NAT.
AnomicFTPD is an RFC959-compliant FTP server with OS- independent user and group management. Active and passive modes, non-root mode, and anonymous and/or read-only modes are supported. A built-in client IP filter acts as a firewall and provides additional access limitation. The server has no online interface; attributes, groups, and user accounts are configured through text files. The protocol/ format-unspecified LIST command produces output that is compatible with most FTP clients, including common Web browsers in FTP mode.
SOHT (Socket over HTTP Tunneling) allows you to tunnel socket connections through an HTTP proxy. Restrictive firewalls often prohibit all outgoing trafic except for HTTP. This application allows you to tunnel socket connections over the HTTP protocol. This application consists of a server that serves as a proxy and a client which tunnels a socket connection over an HTTP connection to the server. The current server is written in Java, and there are clients in Java and .NET.
NoNox is intended to help automate the defense of Internet servers against attacks such as dictionary login attacks. NoNox monitors log files for user-specified trigger patterns. When a pattern is seen enough times in a given file within a given period of time, NoNox will execute a command. The patterns, time limits, files to watch, and commands are all user-specified. For example, if NoNox sees too many failed login attempts from one IP address, it could execute a command that tells a firewall to drop packets from that host, instantly cutting off the attacker.
AlmostVPN is an SSH tunnel manager with a twist. It is packaged as a Preference Panel, so you do not have to use yet another application to configure your tunnels. Instead, it uses creative network configuration techniques to provide almost VPN-like access to remote services, so you can keep using real IP addresses and port numbers while accessing service on the other side of your tunnels. It provides a simple way to mount remote volumes, use remote printers and faxes, access iTunes, iPhoto, and almost any other Bonjour-based application, transfer and execute files, and more.