Cedar Backup is a software package designed to manage system backups for a pool of local and remote machines. Cedar Backup understands how to back up filesystem data as well as MySQL and PostgreSQL databases and Subversion repositories. It can also be easily extended to support other kinds of data sources. Cedar Backup is focused around weekly backups to a single CD or DVD disc. It supports multisession discs, allowing you to add incremental data to a disc on a daily basis. Cedar Backup also provides a Python library of backup-related functionality.
SyncWall is a basic wallpaper changer with a special feature, the ability to synchronize wallpaper changes between several workstations with a basic (and unsecured) client/server protocol. Each workstation must share the same pool of files, there is no FTP or Internet download. Other interesting features are simple multi-monitor support and the ability to add special effects to wallpaper.
repla can turn any command into a shell. It does this by prepending the name of a command to each commandline before executing it. It can also add lists of arguments which are often needed, either prefixed or affixed to the commandline. It really shines with vcs or build commands, such as git, svn, hg, make, configure, etc.
Sphirewall is a user-centric analytical network firewall/router. Out-of-the box, it provides user authentication coupled with powerful analytics which provide you with complete control over your network and users. With Sphirewall, you can manage and understand what is happening on your network with features such as qos, bandwidth quotas, user authentication, and much more. Not built on iptables, it is able to do things which other Open Source firewalls can't. Its very flexible, and with its open JSON API, can easily be plugged into any existing environment.
kgrep searches through a file or files for a specified pattern and displays the target line containing the pattern as well as a certain number of lines on either side of the target line. GNU grep can do this with the -A, -B and -C switches, and other platform-specific grep implementations may have similar functionality. The main advantage to kgrep is that it's small and can be easily used on any system that has Perl5 installed, rather than going through the hassle of installing a different grep binary (this is actually what the author uses it for most often).
BAD (BAckup Daemon) "watches" a directory and copies any files or directories moved/copied into it to another "backup" directory automatically using inotify. It will automatically generates hashes for files using the md5 hashing algorithm, and stores them in a file for quick and easy integrity checking. It will log (mostly) everything it's doing, and makes it very convenient to grep for certain messages using multiple logging levels which the user can set to get the desired output. It has its own built-in uninstaller which will delete any and all files it has created (besides the user's watch and backup directories).