Netjail is a user-space mechanism for restricting the socket connection attempts that a process makes. This makes it very useful for studying and/or foiling spyware and other software that has covert "home-calling" features. It is implemented as a shared library which is preloaded when launching the suspect program (via the LD_PRELOAD mechanism available in most moderm Unix systems). This library intercepts socket() and connect() calls to the standard socket library and logs the attempts. Based on environment variables, detailed rules can be put in place about which addresses will be allowed to connect. Connections that are disallowed will return the ECONNREFUSED (Connection Refused) error, which is most likely to be gracefully handled by hidden spyware functionality.
PhiloLogic is a full-text database engine developed for humanities computing text analysis by the ARTFL Project and the Digital Library Development Center at the University of Chicago. It is optimized for fast searching across very large collections of documents. It currently supports TEI-Lite, TEI XML, and TEI SGML documents.
JCGrid is a set of easy-to-use tools for real-world grid-computing. It doesn't require any file system sharing capability (such as NFS). It allows you to easily split a CPU-intensive task among several computers by using the JCGrid framework. Any file required for completing the task will be transferred by the framework. A cache is used in order to minimize file transfers. You can easily add or remove computers from the grid at runtime without losing any work. Support for POVRay is included as an example of use.
pam_envfeed is a PAM module that runs an external program, grabs its output, and then defines the environment variables this program has emitted. It is especially useful for dynamically setting up a PATH that depends on many circumstances (such as whether the user is root, or whether a directory exists or not).
LibSysCTr is a utility library that can be used to intercept system call functions on a Linux system. Process monitoring and sandboxing are just two of its potential uses. Internally, it uses ptrace to monitor and report events to the library caller using callbacks. Utility functions are supplied to retrieve information about the process, get/set the system call parameters, and read/write the monitored process address space.