BAD (BAckup Daemon) "watches" a directory and copies any files or directories moved/copied into it to another "backup" directory automatically using inotify. It will automatically generates hashes for files using the md5 hashing algorithm, and stores them in a file for quick and easy integrity checking. It will log (mostly) everything it's doing, and makes it very convenient to grep for certain messages using multiple logging levels which the user can set to get the desired output. It has its own built-in uninstaller which will delete any and all files it has created (besides the user's watch and backup directories).
Bastille Unix (formerly Bastille Linux) aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat (Fedora Core, Enterprise Linux, and original Red Hat), SuSE, Gentoo, Mandrake, and Debian Linux, as well as HP-UX and Mac OS X. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.
BitNami Review Board Stack Native Installer is an easy-to-install distribution of the Review Board application. It includes pre-configured, ready-to-run versions of Apache, MySQL, Django, and Subversion, so users can get a Review Board installation up and running in minutes after answering a few questions. Windows, Linux, Linux 64, and Mac OS X operating systems are supported. Review Board is a powerful Web-based code review tool which offers developers an easy way to handle code reviews. It scales well from small projects to large companies and offers a variety of tools to take much of the stress and time out of the code review process.
Bletchley is a real-world cryptanalysis framework. It was created to assist with the detection, analysis, and exploitation of cryptographic flaws and aims to help automate the tedious aspects of this analysis while leaving the security expert in control of the process. It features automated token encoding detection (36 encoding variants), passive ciphertext block length and repetition analysis, a script generator for efficient automation of HTTP requests, and a flexible, multithreaded padding oracle attack library with CBC-R support.
The Cambridge Z88 Software project was created by and for the "die-hard" users of the Cambridge Z88, the iPad of the 80s. Its object is to streamline the operating system, OZ, and build new Z88 applications by replacing the built-in ROM with a larger device. It also includes a Z88 emulator and debugging environment.