phalanx computes a digest of many buffers simultaneously, and produces a combined hash of them all. It is an initiative to provide a fast, simple, and portable alternative method to compute a checksum in a parallel fashion. It has options for I/O buffer size, hash width, number of threads, and more. It can be run single-threadedly for performance comparisons. It can check files against previously-saved sums, like "MD5sum" does. It also has a "demo" mode, to ascertain accurate operation. It is intended to be useful on large files and multicore/multiprocessor/multithreaded environments.
JavaAutotoolsExample is an example of a Java Swing program that uses GNU Gettext, Autoconf, Automake, Make, and Java JNI. JavaAutotoolsExample is intended to help Java developers and maintainers make their full-featured Java programs respect the standard "./configure && make && sudo make install" procedure for build and installation.
Moscrack is a WPA cracker for use on clusters. It supports MOSIX, SSH, and RSH connectivity and works by reading a word list from STDIN or a file, breaking it into chunks, and passing those chunks off to separate processes that run in parallel. The parallel processes are then executed on different nodes in your cluster. All results are checked and recorded on your master node. Logging and error handling are taken care of. It is capable of running reliably for long periods of time, without the risk of losing data or having to restart. Moscrack uses aircrack-ng by default. Pyrit for WPA cracking and Dehasher for Unix password hashes are supported via plugins.
UnDBX is a tool to extract, recover, and undelete email messages from Outlook Express .dbx files. On first run, all messages are extracted as individual .eml files. Subsequent runs only update the output directory with new messages, and delete old .eml files that correspond to deleted messages in the .dbx file. Corrupted .dbx files (including files larger than 2GB) can be opened in recovery mode, in order to recover messages and partially undelete deleted messages. The success of recovery depends on the type and level of .dbx file corruption.
PropXX provides a property/configuration mechanism for C++ applications. Properties can be defined in files similar to but more flexible than Java properties. Property files are defined in a type-safe, modular way and offer the full expressiveness of the Lua scripting language. The design of PropXX combines flexibility with high performance for the C++ code that accesses property values. The property values are stored in objects of special property classes, which are automatically generated from the property set definitions. Performance-critical code can be inlined by the compiler, and a typical access to a property value is as cheap as reading a single variable from the memory. No costly data structures like hashes, balanced trees, etc. are involved.
RSound is a simplistic and lightweight framework for networked TCP/IP audio. It is designed to be very simple to implement, and to work well with music and video players. A librsound is supplied. It is not designed for low latency audio (games), and lets the sound backend take care of sound mixing. It supports POSIX-compliant systems (including cygwin). It includes audio output support for ALSA, OSS, libao, and PortAudio.
Crules is a dynamic programming language that takes influences from Python, Perl, and Haskell. The main motivation for this language was the concept or design of a new paradigm or feature called "rules". A rule is a potential entry point which has dependencies rather than parameters. Any rule can be overridden to have different or no dependencies. Since the language itself can decide on the best course of actions for an operation, dependencies become preconditions for execution. It also features lazy evaluation, object orientation, variadic and anonymous-parameter functions, and reflection. These features help make the language truly dynamic.
htrosbif is a tool that actively probes an HTTP server. It prods the Web server in all sorts of old, new, basic, fancy, spec-compliant, and spec-breaking ways. It tries to characterize both the well-spoken educated responses and the seriously deviant babble it receives in return. Signatures contain no user data, only header names and HTTP-level quirks. As a useful side effect, this might detect reverse proxies, HTTP load balancers, intrusion prevention systems, and Web application firewalls.