GNU ddrescue is a data recovery tool. It copies data from one file or block device (hard disk, CD-ROM, etc.) to another, trying to rescue the good parts first in case of read errors. GNU ddrescuelog is a tool that manipulates ddrescue logfiles, shows logfile contents, converts logfiles to/from other formats, compares logfiles, tests rescue status, and can delete a logfile if the rescue is done.
GNU ed is an 8-bit clean implementation of the POSIX line-oriented text editor. Ed is the "standard" text editor in the sense that it is the original editor for Unix, and thus widely available. For most purposes, however, it is superseded by full-screen editors such as GNU Emacs or GNU Moe.
KDE-Services extends the features of the Dolphin File Manager right-click menu in the KDE graphical environment. It allows you to play and convert between several video formats, extract audio from movies and convert them to MP3 or FLAC, convert audio to MP3 or FLAC, securely send a file or directory to Mailx as an email, send files to Thunderbird as attachments, burn and checksum ISO images, execute scripts and applications, get low-level information on video files, build ISO images from folders, replace text, search, SSH, use Midnight Commander, use system, network, and backup/restore tools, use Samba, extract subtitles from MKV video, multiplex subtitles into MPEG-2 videos, and work with YouTube, DVDs, multimedia, GPG. You can add a timestamp prefix to a filename or directory name. A paranoid shredder, an HTTP publisher, graphic tools, RPM package tools, Xorg configuration, and Dropbox tools are included.
GNU Moe is a powerful, 8-bit clean console text editor for ISO-8859 and ASCII character encodings. It has a modeless, user-friendly interface, online help, multiple windows, unlimited undo/redo capability, unlimited line length, global search/replace (on all buffers at once), block operations, automatic indentation, word wrapping, filename completion, a directory browser, duplicate removal from prompt histories, and delimiter matching.
The OATH Toolkit makes it easy to build one-time password authentication systems. It contains shared libraries, commandline tools, and a PAM module. Supported technologies include the event-based HOTP algorithm (RFC4226) and the time-based TOTP algorithm (RFC6238). OATH stands for Open AuTHentication, which is the organization which specifies the algorithms. For managing secret key files, the Portable Symmetric Key Container (PSKC) format described in RFC6030 is supported.
GNU Recutils is a set of tools and libraries to access human-editable text-based databases called recfiles. A recfile contains data structured as a sequence of records. The rec format supports data integrity with the usage of record descriptors (keys, mandatory fields, field types, etc.) as well as the ability of record fields to refer to other records. Despite its simplicity, recfiles can be used to store medium-sized databases. The GNU recutils suite comprises a texinfo manual describing the Rec format, a C library (librec) providing a rich set of functions to access rec files, a set of C utilities that can be used in shell scripts and in the command line to operate on rec files, and an Emacs mode (rec-mode).
The GNU Autoconf Archive is a collection of more than 450 macros for GNU Autoconf. They can be re-used without imposing any restrictions on the licensing of the generated configure script. In particular, it is possible to use them in configure scripts that are meant for non-free software.
The minfx project is a Python package for numerical optimization. It provides a large collection of standard minimization algorithms, including the line search methods (steepest descent, back-and-forth coordinate descent, quasi-Newton BFGS, Newton, and Newton-CG), the trust-region methods (Cauchy point, dogleg, CG-Steihaug, and exact trust region), the conjugate gradient methods (Fletcher-Reeves, Polak-Ribiere, Polak-Ribiere +, and Hestenes-Stiefel), the miscellaneous methods (Grid search, Simplex, and Levenberg-Marquardt), and the augmented function constraint algorithms (logarithmic barrier and method of multipliers).