ADTPro transfers disks to and from Apple II and Apple /// computers and the modern world using any of these communications methods: serial/USB, UDP via the Uthernet or LANceGS Ethernet cards, or audio via the Apple's cassette ports. ADTPro has comprehensive bootstrapping support for otherwise diskless Apple IIs. The home page includes extensive tutorials for getting started.
Botan is a crypto library written in C++. It provides a variety of cryptographic algorithms, including common ones such as AES, MD5, SHA, HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that are more obscure or specialized. It also offers SSL/TLS (client and server), X.509v3 certificates and CRLs, and PKCS #10 certificate requests. A message processing system that uses a filter/pipeline metaphor allows for many common cryptographic tasks to be completed with just a few lines of code. Assembly and SIMD optimizations for common CPUs offers speedups for critical algorithms like AES and SHA-1.
Charm++ is a portable adaptive runtime system for parallel applications. Application developers create an object-based decomposition of the problem of interest, and the runtime system manages issues of communication, mapping, load balancing, fault tolerance, and more. Sequential code implementing the methods of these parallel objects is written in C++. Calls to libraries in C++, C, and Fortran are common and straightforward. Charm++ is portable across individual workstations, clusters, accelerators (Cell SPEs and GPUs), and supercomputers such as those sold by IBM (Blue Gene, POWER) and Cray (XT3/4/5/6). Applications based on Charm++ are used on at least 5 of the 20 most powerful computers in the world.
The ELF-Encrypter program suite is a collection of programs to encrypt ELF binaries using various algorithms, including the ones provided by GPG. One can choose a lot of methods to obtain the encryption key, such as hashing a list of PCI peripheals, MAC addresses of ethernet cards, file inode numbers, passphrases and passwords. The suite also contains programs to manipulate and inject plain or encrypted code into ELF binaries.
Eckbox is van Eck Phreaking tool that interprets a radio signal emanating from a computer's monitor to recreate the image (in black and white) that is displayed on it. It could be used as a valuable security tool for testing otherwise secure computers or for developing hardware and software to counter this type of remote shoulder-surfing. It is not intended to be used for illegal purposes, and includes information on the hardware required.