YourKit Java Profiler is a CPU and memory profiler that makes it easy to solve wide range of CPU- and memory-related performance problems. It features automatic leak detection, powerful tools for the analysis of memory distribution, an object heap browser, comprehensive memory tests as part of your JUnit testing process, extremely low profiling overhead, transparent deobfuscation support, and integration with Eclipse, JBuilder, IntelliJ IDEA, NetBeans, and JDeveloper IDEs.
TrueCL aims to provide advanced high availability clustering across larger clusters. It has currently been tested with up to 8 nodes. It is the successor to linuxha.net. It has been designed to be as portable as possible and currently has been tested on Linux, Solaris, and HP-UX. It has many advanced features, including multiple storage types, a dynamic architecture, volume manager neutrality, file system neutrality, heterogeneous cluster support, no hard limits, and encryption of communication between nodes.
Lynis is an auditing and hardening tool for Unix derivatives like Linux/BSD/Solaris. It scans systems to detect software and security issues. Besides security-related information, it will also scan for general system information, installed packages, and possible configuration mistakes. The software is aimed at assisting automated auditing, software patch management, and vulnerability and malware scanning of Unix-based systems.
fio is an I/O tool meant to be used both for benchmark and stress/hardware verification. It has support for 19 different types of I/O engines (sync, mmap, libaio, posixaio, SG v3, splice, null, network, syslet, guasi, solarisaio, and more), I/O priorities (for newer Linux kernels), rate I/O, forked or threaded jobs, and much more. It can work on block devices as well as files. fio accepts job descriptions in a simple-to-understand text format. Several example job files are included. fio displays all sorts of I/O performance information, including complete IO latencies and percentiles. Fio is in wide use in many places, for both benchmarking, QA, and verification purposes. It supports Linux, FreeBSD, NetBSD, OpenBSD, OS X, OpenSolaris, AIX, HP-UX, Android, and Windows.
Kelly is a JBuilder 4 & 5 plugin that makes it easy to deploy EJBs to JOnAS 2.x. Kelly can be installed and run with other JBuilder 4 & 5 plugins such as BEA WebLogicServer 5.1, BEA WLS 6, IBM WebSphere 3.5, Borland AS 4.5, etc. Kelly provides services to Jbuilder 4 & 5 java developers such as the ability to create any XML deployment files required by JOnAS 2.x, hot loading and unloading of any EJBs to JOnAS (only for JBuilder 5), control of JOnAS start-up from JBuilder 4 & 5, and the supply of JOnAS word dictionaries to JBuilder 4 & 5 in order to enhance the JBuilder 4 & 5 text completion services.
dlh is a fast LaTeX-to-HTML translator written in C that can handle most of LaTeX. It features not invoking LaTeX for any purpose; with the exception of figure support it's completely independent of any other program. In particular, it generates all cross-references and table of contents in a single run Tables are supported and translated into HTML3 tables, and PostScript figures (\psfig command) are supported (requires GhostScript and pnmtogif to translate PS into GIF files).
ATG Dynamo integration for JBuilder is a JBuilder 5 plugin that makes it easy to deploy J2EE applications to the ATG Dynamo Application Server version 5.1 (DAS). It can be installed and run with the other JBuilder 5 plugins such as BEA WebLogicServer 5.1, BEA WLS 6, IBM WebSphere 3.5, Borland AS 4.5, etc.
The Directory Server NT Authentication Module project is made of two parts: The first is a simple daemon which takes an NT user's domain credentials (including password) and attempts to authenticate via the SMB protocol with those credentials. The second part is a plugin which takes an LDAP DN and password and discovers the DN's NT domain identifier (if the entry has such an ID). The daemon will only listen on localhost, so the credentials are not exposed via the network, and it does not run as root, so that compromise can be limited. It attempts to locate all the domain controllers for an arbitrary domain, so failure of one DC does not cause the module to fail the authentication attempt unless no DC can be found that will accept the credential.