The BRU Backup and Restore Utility features data-verified backups, scalability, configurability, and ease of use for Linux and Unix. Versions are available for Linux, FreeBSD, and most UNIX variants. It works via an X11 interface, command line interactive, or through a scripted, scheduled (CRON) mechanism.
C-Kermit is a combined serial and network communication software package offering a consistent, medium-independent, cross-platform approach to connection establishment, terminal sessions, file transfer, character-set translation, numeric and alphanumeric paging, and automation of communication tasks. Recent versions include FTP and HTTP clients as well as an SSH interface, all of which can be scripted and aware of character-sets. It supports built-in security methods, including Kerberos IV, Kerberos V, SSL/TLS, and SRP, FTP protocol features such as MLSD, and source-code parity with Kermit 95 2.1 for Windows and OS/2.
Firewall Builder consists of a GUI and set of policy compilers for various firewall platforms. It helps users maintain a database of objects and allows policy editing using simple drag-and-drop operations. The GUI and policy compilers are completely independent, which provides for a consistent abstract model and the same GUI for different firewall platforms. It currently supports iptables, ipfilter, ipfw, OpenBSD pf, Cisco PIX and FWSM, and Cisco routers access lists.
gnokii is a multisystem tool suite for mobile phones. It provides a library to communicate with a phone hiding the communication protocol. The library handles SMS, phonebook, calendar, phone calls, and other mobile phone capabilities. It supports Nokia-FBUS mobiles, AT-capable phones (most of the mobiles), as well as Symbian-based phones.
gPS (graphical Process Statistics) is a system information applet based on GTK+. It displays the processes of one or more computers (like ps or top), allows killing, renicing, and signal sending, shows lots of details on selected processes, shows CPU/Memory usage and history graphs, and is capable of watching networked computers in addition to the local one. It also provides an easy way to send signals to processes based on their owners (uid), groups (gid), and string matching.
integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. integrit's major advantages are a small memory footprint and simplicity. It works by creating a database that is a snapshot of the most essential parts of your computer system. You put the database somewhere safe, and you can then use it to make sure that no one has made any illicit modifications to the computer system. In the case of a break in, you know exactly which files have been modified, added, or removed.