cw is a non-intrusive real-time ANSI color wrapper for common Unix-based commands. It is designed to simulate the environment of the commands being executed, so that if a person types 'du', 'df', 'ping', etc. in their shell it will automatically color the output in real-time according to a definition file containing the color format desired. It has support for wildcard match coloring, tokenized coloring, headers/footers, case scenario coloring, command-line- dependent definition coloring, and includes over 50 pre- made definition files.
ICPLD (Internet Connection Performance Logging Daemon) is a connection monitor that sends ICMP requests to IP addresses of your choice and monitors if your machine has a working network connection. It logs failed attempts to reach the hosts, and will stamp a log as soon as a reply is received. It keeps track of when and for how long the connection was unavailable and records both total down time and each occasion of interrupted connection. It supports IPv6 and can execute a command whenever a connection goes up or down, which is useful for alerting users.
Ametys is a powerful Web CMS used by many institutions of higher education and government, but also industries and SMEs. It is known for its ergonomic design which promotes ease of use, its social Web functionality, and the ability to manage a large number of users. It makes content publishing accessible for the non-programmer and provides an easy editorial interface very similar to Microsoft Office applications.
fakechroot provides a fake chroot environment to programs. A fake chroot allows you to run programs which require root privileges on an unprivileged user account. For example, you can create a Debian bootstrap or a development environment and build packages inside a chroot'ed system using a standard non-root user account. You can then use the apt-get command to install other packages without root privileges.
Logger is a log queueing and optimization utility. It can completely replace sys/klogd, handle logs larger than 2GB, perform automatic nightly log rotation without affecting services, and transfer logs between machines via TCP connections. Any application that writes a text log can be maintained by Logger. It is light, small, and fast, emphasizes security, and reduces drive usage through memory queueing.
ircproxy is an Internet Relay Chat Proxy, which works as a layer between your IRC client and the IRC server. It features bouncer capability and has more features, flexibility, and configuration options than other tools. It also includes an option to use the system password list instead of requiring a separate password database.
integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. integrit's major advantages are a small memory footprint and simplicity. It works by creating a database that is a snapshot of the most essential parts of your computer system. You put the database somewhere safe, and you can then use it to make sure that no one has made any illicit modifications to the computer system. In the case of a break in, you know exactly which files have been modified, added, or removed.