bcnu is a Web-based system management tool which delivers information on the status of networked systems in a simple and easy-to-use manner. It uses a web browser to display information about hosts in a tabular form. Historical information can be held indefinitely, and there is a powerful query tool available to interrogate it. Client systems can run an agent which logs information back to a central system. An agent scheduler is integrated to allow agents to be run at different intervals. Standard agents include ftp, http, disk space, logfiles, processes, and more.
CGI::Application is a Perl framework intended to make it easier to create sophisticated, reusable Web-based applications. This module implements a methodology which can make Web software easier to design, easier to document, easier to write, and easier to evolve. CGI::Application builds on standard, non-proprietary technologies and techniques, such as the Common Gateway Interface and Lincoln D. Stein's excellent CGI.pm module. CGI::Application judiciously avoids employing technologies and techniques which would bind a developer to any one set of tools, operating system, or Web server.
Obsidian is an extensible virtual world system with a fullblown multiplayer client-server architecture. It is not a VRML2 world system, though there are plans to include VRML2 as a world data format. Note that active development on this system stopped a while ago, though the code is still available for the curious. The code may not even compile on current Linux or Irix systems.
The Paranoid modules provide a number of routines that are intended for use in strict and taint-safe scripts. The modules cover a variety of tasks from command-line argument parsing to process and network management. All of the modules use a debug trace framework for diagnostic output that is easily used and extended for application code as well.
autofwd is an automated firewalling daemon intended to block hosts performing unwanted acts. While it was designed to be used to thwart hosts running dictionary attacks on logins (of any service), it can be used for just about anything. The external commands it runs are configurable, allowing you to take additional actions against offending hosts such as running an nmap OS fingerprint before firewalling, or just silently logging the event.
Class::EHierarchy is intended for use as a base class for custom objects. The objects need one or more of the following features: orderly bottom-up destruction of objects, opaque objects, class-based access restrictions for properties and methods, primitive strict property type awareness, and alias-based object retrieval.