Code Manager 2 (CM2) has been designed to provide a complete source code control system for a set of developers sharing the same working directory tree. It offers developers and organizations many advantages. It provides a comprehensive set of features and has been designed to be very easy to pick up and use to manage projects. It works across Unix and Windows platforms, requiring little configuration and only a limited number of dependencies. It provides facilities at both an individual source file level and project level. The project level facilities include facilities to copy or merge whole projects or generate and apply change-sets. It uses an efficient repository format to handle large files and large numbers of files and directories. It provides facilities to generate packages from the project in a number of formats (including TP2, Slackware, APT, RPM, Autopackage, SVR4, and InstallP).
WACS is a tool for building adult Web sites. It is equally suitable for managing a private collection or building a commercial site. WACS has many best of breed features, including dynamic filtering, model catalogs, random sampling, galleries, automatic download, and a powerful search engine. WACS contains both a full ready-to-run Web environment and an extensive programming API implemented in both Perl and PHP.
Clonezilla is a partition or disk cloning tool similar to Symantec Ghost. It saves and restores only blocks in use on the hard drive if the file system is supported. For unsupported file systems, dd is used instead. It has been used to clone a 5 GB system to 40 clients in about 10 minutes.
safe-rm is intended to prevent the accidental deletion of important files by replacing /bin/rm with a wrapper that checks the given arguments against a configurable blacklist of files and directories that should never be removed. Users who attempt to delete one of these protected files or directories will not be able to do so and will be shown a warning message instead. Protected paths can be set both at the site and user levels.
Moscrack is a WPA cracker for use on clusters. It supports MOSIX, SSH, and RSH connectivity and works by reading a word list from STDIN or a file, breaking it into chunks, and passing those chunks off to separate processes that run in parallel. The parallel processes are then executed on different nodes in your cluster. All results are checked and recorded on your master node. Logging and error handling are taken care of. It is capable of running reliably for long periods of time, without the risk of losing data or having to restart. Moscrack uses aircrack-ng by default. Pyrit for WPA cracking and Dehasher for Unix password hashes are supported via plugins.
360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, Perl firewall policy manipulation tool to filter, compare to logs, merge, translate, and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA, or ScreenOS commands. It is all contained in one file. It can read policy and logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), and Cisco ASA (show run / syslog format). It uses both inclusive and exclusive CIDR and text filters, permitting you to split large policies into smaller ones for virutalization at the same time as removing unused connectivity. It supports policy to log association, object translation, rulebase reordering and simplification, rule moves, and duplicate matching automatically. It allows you to seamlessly move rules to where you need them. 'print' mode creates a spreadsheet for your audit needs with one command.
Collax V-Family is a management suite based on a 64bit Linux system and KVM to provide server virtualization. It offers solutions for single virtualization hosts, as well as high availability management on two or more nodes, allowing embedded HA storage using DRBD and iSCSI. By using live snapshots, automatic live migration, and incremental backups, the availability of virtual machines is increased tremendously in case of hardware and software maintenance or even hardware failures. Virtual network switches and the protocols GVRP, LLDP, and RSTP help to set up a virtual DMZ.