AKFAvatar is a fancy graphical user interface for text oriented applications where an avatar appears on the screen and provides information in a balloon. It also supports recorded audio files. Applications for AKFAvatar can be written in Lua, and there are interfaces for C, Objective C, C++, Free Pascal, and GNU Pascal. A number of ready-to-use applications and modules are provided, including a text viewer and a module that makes question-answer exercises. For POSIX-compatible operating systems there is a man page viewer and a terminal emulator, which makes it possible to run many existing terminal-based programs in this fancy environment.
CGI-Musicbox is a collection of programs to manage a digital jukebox via CGI. Music is played on server which is controlled through a Web interface. It can play lists, individual files, directories, and audio CDs. Lists can be created and edited through the interface. CD ripping and encoding (to ogg, mp3, or m4a) can be fully controlled. Music files can be updated from clients.
DMines is the classic minesweeper game with a dynamic twist -- some of the unrevealed mines change locations every set number of seconds (15 by default). Current features include 3 levels (easy, normal, and hard), resizing of the playing field, setting the number of mines, and setting the time it takes the mines to change locations.
DynChap provides an additional pseudo hardware token based authentication layer for PoPToP virtual private networks. The authentication uses the user's mobile phone to generate a hash that needs to be entered along with the user's password in a custom connection dialogue. Upon connecting, the VPN verifies the authenticity of the hash. The hash is generated from a serial (by default 32 printable characters) stored in the J2ME based mobile phone and the current time; the VPN server compares this hash against the serial and current time, minus or plus a small deviation (by default 2 minutes). If the username, password, and hash match, access is granted and the custom dialer is closed, the connection can now be controlled like an ordinary VPN connection.