TIA is an ncurses-based console IDE for GCC, G++, Java, Perl, PHP, BASH, BUSH, HTML, and GNAT (Ada 95). It has integrated support for CVS, SVN, and ncurses compatible mice. Features include a ddd-style console debugger, automatic spelling correction, keyword hilighting, project statistics, automatic backups, and keyboard macros. The project window controls optimization and debug settings all in one place. TIA supports make, cook, and gnatmake project builders. For large projects, each user has a separate preference file.
NARC (Netfilter Automatic Rules Configurator) is a free firewalling package for Netfilter/Iptables, released under the BSD license. It attempts to simplify the setup of a firewall (stateful packet filter) via the iptables tools. It is a bash shellscript that generates (hopefully) sensible and secure rules for Netfilter based on a simple configuration file. It features quick setup via a simple configuration file, connection tracking (and fragmentation reassembly), customized logging, probe detection (TCP & UDP), and much more.
slakbootIBS (Slackware Interactive Boot Scripts) is an enhanced set of replacement boot scripts for the Slackware Linux distribution. It includes a set of control and dispatch tools for configuring and booting with colorized interactive scripts. The new boot process allows the operator to select or skip start-up components in realtime. It facilitates debugging of startup problems and allows operators to maintain a common baseline to support several local configurations or multiple servers with a single set of scripts.
Ratoximus is a backend for rating your music on the fly. When a good song comes up on your playlist, you can mark it up to your favorites, and when you just can't stand a song, you can blacklist it. A cleanlist is generated based on a preselected list, taking out the blacklisted entries. It includes a simple interactive frontend, and tips to other methods.
Trojan scan is a simple shell script that allows for simple but relatively effective checking for trojans, rootkits and other malware that may be using your server and network for unwanted (and possibly illegal) purposes. It works by listing all processes that use the Internet with the lsof command (using -Pni flags). This list is then transformed into signatures in the form of process_name:port_number:user. These signatures then are matched against the allowed process defined in the configuration. If any signatures of running processes are found that do not match the allowed signatures, an email report is sent including ps, ls, and optional lsof output.