Cassandra is a scientific data viewer based on VTK. Cassandra provides dynamic interaction with the VTK pipeline and enables the user to load plug-ins dynamically in order to perform specific tasks in data manipulation and visualisation. Cassandra is open and modular, and can easily be extended to new filters through a set of dynamically loadable plug-ins. A plug-in template is provided to help users to develop and share their own plug-ins. This approach allows users to perform complex filtering without any specific knowledge of VTK or C++.
Ivman is a flexible userspace volume manager for Linux. Originally an automounter, it can also be used to run arbitrary commands when certain devices are added to or removed from the system, when properties on existing devices change, or when devices emit conditions. Unlike gnome-volume-manager, it runs from a console. It uses D-BUS and HAL to listen for new devices, and uses pmount for mounting.
SiteManager is an Open Source Web Application Toolkit for PHP Developers that includes a framework for code modules and layout templates, database connectivity, SmartForms, sessions, and some other tools. All parts of the system are integrated through object-oriented libraries which allow for easy expandability and maintenance.
Engauge Digitizer is digitizing software that converts an image showing a graph or map into numbers. The image file can come from a scanner, digital camera, or screenshot. The numbers can be read on the screen, and written or copied to a spreadsheet. Highlights for beginners include an intuitive interface and extensive context-sensitive documentation. Highlights for experts include compensation for image distortion, cartesian and polar coordinates, linear and logarithmic coordinates, automatic scanning, graphical previews, and browser help.
Eckbox is van Eck Phreaking tool that interprets a radio signal emanating from a computer's monitor to recreate the image (in black and white) that is displayed on it. It could be used as a valuable security tool for testing otherwise secure computers or for developing hardware and software to counter this type of remote shoulder-surfing. It is not intended to be used for illegal purposes, and includes information on the hardware required.