EncFS is an encrypted pass-through filesystem which runs in userspace on Linux (using the FUSE kernel module). Similar in design to CFS and other pass-through filesystems, all data is encrypted and stored in the underlying filesystem. Unlike loopback filesystems, there is no predetermined or pre-allocated filesystem size.
GNU SIP Witch is a secure peer-to-peer VoIP server. Calls can be made even behind NAT firewalls, and without requiring service providers. SIP Witch can be used on the desktop to create bottom-up secure calling networks and as a free software alternative to Skype. It can also be used as a stand-alone SIP-based office telephone server, or to create secure VoIP networks for an existing IP-PBX such as Asterisk, FreeSWITCH, or Yate.
CloudVPN is a secure decentralized mesh networking tool. It allows applications to use it as a mesh transport layer for packet routing, easily creating mesh ethernet VPN, secured audio/video broadcasting or communication channels, etc. It can create secured networks with special or weird topologies, so it's very easy to create connection schemes with clustered/decentralized servers, topologies with better throughput, ring-like topologies for failover, long-line for passing through many routes, or tree topology for optimizing inter-server bandwidth needs.
SecureCam is a video surveillance system with a nice GUI. It supports multiple camera and video file inputs. It detects motion in input video using fast algorithms. Alarm notification is provided by email, alarm sound, and video recording. Currently, only a Windows installer is provided, but the source can be compiled on Linux.
Nova is a software application for preventing and detecting hostile network reconnaissance (such as nmap scans). It does this by first creating the Haystack: a large collection of low interaction honeypots using an updated version of Honeyd. Finding real machines on the network becomes like finding a needle in a haystack of fake machines. Second, Nova uses machine learning algorithms to automatically detect and classify attempts at hostile reconnaissance, so there's no need to go searching manually through your honeypot's log files. It provides an easy to use Web-based interface powered by Node.js to configure itself and Honeyd instances.