BGPHist is a tool that receives MP-BGP updates, decodes them, and writes them to a database for logging and monitoring purposes. It supports not only Internet routes, but also IPv4 VPN, IPV6 VPN, and L2VPN. It sounds text output, MySQL databases, and Oracle databases. For the MySQL backend, there is also a simple PHP frontend. It could be used to monitor and log an ISP's customer activity for Internet and VPNs, as a passive BGP looking glass, or as a backend for some external monitoring and accounting system.
SYINF shows in brief a system's CPU brand and model, RAM size, disk space, operating system, regional parameters, and current date and time. It can run in interactive (menu) or batch mode. There are two versions, in the C and C++ languages. They have been tested on 20 (15) compilers, 26 (25) operating systems, and 18 architectures. (Figures in parentheses are for the C++ version.) Both versions are conveyed in source code form only, each as a single ~35 KB source text file.
Secure GnuPG Form is a Web form that sends encrypted email and attachments using GnuPG, without the sender needing to have GnuPG installed. Versions are available with Recaptcha.net support and two-factor authentication using a username and password and the free PhoneFactor.com service.
Why a milter archiver? If you are required to also log source and destination IPs and BCCs (additional rcpt to's not in a CC field communicated at the SMTP protocol level), then the only option is do this in the MTA, or in a milter application that has hooks in the MTA process (which is exactly why milter was invented). It uses a simple regex file that can be used with several *source target-mailbox rules to define what gets mirrored where. The archiver tries to be as quiet as possible. The possible methods to archive are SMTP, sendmail inject / Postfix inject, IMAP delivery, and milter-add recipient. It was build as a replacement for a Postfix BCC setup: (sender_bcc_maps = regexp:/etc/postfix/archive; recipient_bcc_maps = regexp:/etc/postfix/archive).
SpamBlock counts attempts to establish a connection on port 25/tcp via tcpdump. When a host exceeds the allowed number of attempts per unit of time, it is added to a corresponding ipfw table and email notification is sent. Spamblock currently supports ipfw only, but it can be easily adapted for any firewall and OS. It can also be configured to watch multiple ports to prevent Telnet and SSH attacks in addition to SMTP.
Fallback-gw is a little script to be called via cron that checks availibility of neighbor routers using ping and activates backup routing on ping failure. It can be used as a stupid replacement for BGP/OSPF in a multihomed environment. It has been tested on FreeBSD and on Linux with iproute2.