GNU grep is based on a fast lazy-state deterministic matcher (about twice as fast as stock Unix egrep) hybridized with a Boyer-Moore-Gosper search for a fixed string that eliminates impossible text from being considered by the full regexp matcher without necessarily having to look at every character. The result is typically many times faster than Unix grep or egrep.
integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. integrit's major advantages are a small memory footprint and simplicity. It works by creating a database that is a snapshot of the most essential parts of your computer system. You put the database somewhere safe, and you can then use it to make sure that no one has made any illicit modifications to the computer system. In the case of a break in, you know exactly which files have been modified, added, or removed.
KBACKUP is intended for handling of backups no matter whether they reside on disk or tape or even in files. As most other backup programs available today are either confusing the user with lots of long command line options, or user friendly but not powerful at all, the aim behind writing KBACKUP was to provide a user friendly yet powerful backup program. It is also intended to be kept compatible to existing and well proven archive formats, so you can restore your archives even if you should not have KBACKUP around anymore.
Perdition is a fully featured POP3 and IMAP4 proxy server. It is able to handle both SSL and non-SSL connections and redirect users to a real-server based on a database lookup. Perdition supports modular based database access. The distribution ships with modules for ODBC, MySQL, PostgreSQL, GDBM, POSIX Regular Expression, and NIS. The API for modules is open, allowing abitary modules to be written to allow access to any data store. Perdition can be used to create large mail systems where an end-user's mailbox may be stored on one of several hosts, to integrate different mail systems together, to migrate between different email infrastructures, and to bridge plain-text, SSL, and TLS services. It can also be used as part of a firewall.