RSS 2166 projects tagged "GPLv2"

Download Website Updated 09 Mar 2008 udpfwd

Screenshot
Pop 25.14
Vit 1.00

udpfwd is a stateful userspace UDP port forwarder that can accomplish SNAT/DNAT. It listens for packets received on a given port, changes their source IP addresses to the address of the local host ("SNAT"), and forwards them to the destination (dest_ip:dest_port) from a randomly chosen local sending port. Once chosen, the source_ip:source_port:send_port triplet is unique, allowing for connection tracking. Conversely, when a packet is received on send_port, its destination is changed to source_ip:source_port ("DNAT"), and forwarded onwards.

No download Website Updated 08 Mar 2008 Dave's Unit Test

Screenshot
Pop 20.30
Vit 2.01

Dave's Unit Test (DUT) is a simple infrastructure for doing unit testing in C and C++. It can test boolean assertions, and test for the existence of expected C++ exceptions or POSIX signals. It also traps unexpected exceptions or signals.

Download Website Updated 07 Mar 2008 MITRE Honeyclient Project

Screenshot
Pop 92.34
Vit 1.82

A 'honeypot' is designed to detect server-side attacks. In contrast, a 'honeyclient' is designed to detect client-side attacks. Specifically, a honeyclient is a dedicated host that drives specially instrumented applications to access remote servers to see if those servers are behaving in a malicious manner (by compromising the client). Honeyclients can proactively detect exploits against client applications without known signatures. This framework uses a client-server model with SOAP messaging as the primary communication method, and uses the free version of VMware Server as a means of virtualizing the client environment.

Download Website Updated 05 Mar 2008 vov

Screenshot
Pop 18.57
Vit 1.00

vov (Vov's Obsessive Von-neumann) is a tool that emulates the behavior of a von Neumann machine. It is basically an interpreter that reads files in the form of memory assignments and executes the encoded instructions. The vov's instructions allow you to perform simple arithmetic data manipulation. It is a very useful tool to see if your programs work and how. You can run a vov program from a file as you would any other shell, Perl, Python, or Ruby program.

No download Website Updated 05 Mar 2008 hamachi-gui

Screenshot
Pop 27.64
Vit 1.75

hamachi-gui is a graphical user interface (GUI) for the zero configuration VPN client Hamachi. The official client for Linux has only a command line interface. hamachi-gui provides a user friendly GUI with comparable features and more.

Download Website Updated 05 Mar 2008 JPerf

Screenshot
Pop 53.22
Vit 1.00

JPerf is a perfect hash function generator for Java. The principle of perfect hashing is to reduce the average constant overhead of a hash table by precomputing a hash function which is optimal for the key set. Other advantages include a reduction in memory usage. Finding such a hash function is hard, especially in the general case. These run-time savings come at a cost of increased map creation time. JPerf can create a perfect hash function for a given set of keys and values.

Download No website Updated 04 Mar 2008 Aspic

Screenshot
Pop 42.84
Vit 1.00

Aspic is a program that generates line art images from a text description of a picture that contains commands such as "line", "box", "circle", and "arc". Aspic's concept is similar to the "pic" command. Output is either encapsulated PostScript, or Scalable Vector Graphics (SVG). Quite complex pictures can be constructed from Aspic's primitives, which include facilities for positioning text alongside graphics, and the use of colour.

Download Website Updated 02 Mar 2008 Amua

Screenshot
Pop 38.88
Vit 3.66

Amua is a status bar application for controlling Last.fm Web radio streams as an alternative to the official Last.fm player.

Download Website Updated 28 Feb 2008 BlueProximity

Screenshot
Pop 81.33
Vit 2.94

BlueProximity helps add a little more security to the desktop. It does so by detecting a certain Bluetooth device, most likely a mobile phone, and keeping track of its distance. If it is moved away from the computer and the distance is above a certain level (no measurement in meters is possible) for a given time, it automatically locks the desktop (or starts any other shell command wanted). Once away, the computer awaits its master's return: if the device is nearer than a given level for a set time, the computer unlocks without any interaction (or starts any other shell command wanted).

Download Website Updated 27 Feb 2008 XNetworkStrength

Screenshot
Pop 18.33
Vit 1.00

XNetworkStrength is a tool to visually track wireless connectivity between a laptop and a local access point (AP). It uses only the X11 windowing system for its graphics, and should compile on any Linux system.

Screenshot

Project Spotlight

InterceptNate

A Hibernate session and transaction manager.

Screenshot

Project Spotlight

TurnKey Torrent Server Appliance

A Torrent server appliance that is easy to use and lightweight.