Mail2sh makes it possible to carry out shell commands by email. Email is sent to a particular user on your host and the commands will be carried out if the user and password given matches ones in /etc/passwd. Commands are executed with the user's privileges, and combined with a PGP module ensures a certain level of security for use. Note that the system is not natively encrypted, so use of an encryption mechanism is highly recommended for security reasons.
mfw allows multiple firewall configurations to be managed from the commandline on Mac OS X. Multiple firewall modes (and easy means of selecting between them) are useful on laptops, where one may want a default paranoid firewall, a mode for network scanning with nmap, modes for various networked games, or to run a software Network Address Translation (NAT) wireless base station.
mod_auth_nufw is a Single Sign On Apache module which performs secure user identification and authentication, based on the Nufw firewalling suite. Nufw marks all connections of a network with a unique UserID. This module takes advantage of that mark and uses it to transparently identify and authenticate users requiring access to an Apache server.
mxallowd is a daemon for Linux Netfilter (using libnetfilter-queue) and BSD pf (using pflog) which implements a slightly improved nolisting mechanism. It requires your name server to be configured to return two MX IP addresses, and the one with higher priority must not run a mail server on port 25. mxallowd blocks attempts to connect to the mail server unless the sender tries to connect to the first mail server before the second. Since most spammers will attempt direct connections to each mail server, they will be blocked.
myNetWatchman Perl Agent is a client for myNetWatchman.com. This program is designed to capture rejected packet information from various firewall logs and forward this attack information to central analysis servers at myNetWatchman.com, which then analyze events and escalate to the provider of the source.
myfw is firewall based on iptables snipets or modules. A configuration uses these modules, which contain Perl code, in order to facilitate the writing of rules. They can also contain raw iptables commands. Configs can be pre-defined, which is useful if you have multiple machines that need the same firewall rules. It can also generate ipac-ng rules according to the iptables chains inserted.
mysqlWisp provides a standalone or mysqlISP-controlled subsystem for managing one or hundreds of hotspots with access controlled by iptables, MAC addresses, IP addresses, and passwords. Access points are connected to a second NIC, and all traffic is initially redirected to a login page.