GLoid is a 3D block game inspired by Arkanoid. It was originally written as an SDL and OpenGL exercise, but has developed into a full-featured, highly playable game with refined graphics and sound effects. It runs equally well on Windows, Linux, and Mac OS X, and has minimal hardware requirements.
AnyChart is a flexible Macromedia Flash-based solution that allows you to create animated, compact, interactive, and attractive charts. Driven by an XML interface, it has no installation and is easily used. There is no need for Active-X on the server since graphics are rendered on the client. All scripting languages (ASP, PHP, ColdFusion, Perl, etc.) are supported. You can easily add your own custom images, sounds, texts, etc.
ipclassify is a Linux user space application that blocks/marks connections from/to hosts based on lists specified in a configuration file. Currently, the block lists are in the format and obtained from iblocklist.com. If you are familiar with moblock then you know, essentially, what ipclassify is. The difference is that ipclassify can have multiple NFQUEUEs and is threaded (pthreads).
PascalSCADA is a framework for Delphi and Lazarus to quick development of HMI/SCADA applications. The platforms supported by PascalSCADA are Windows, Linux, and FreeBSD under 32 and 64 bits (FreeBSD only in 32 bits). You can communicate with CLP's, create interfaces, store values and alarms of process, and control users of the application.
USL is an object-oriented scripting language written with C++ and compiled on both Linux and Windows. Without a script provided, USL is an interactive interpreter and programmable command shell. There is no socket programming with USL. USL is intended for general purpose scripting in local systems.
ssh-forcecommand is a script to safely execute remote commands via ssh. It is especially aimed at automated remote commands (in which ssh keys are not secured via password), where a compromise of the remote system could also compromise the local system. To prevent this, ssh-forcecommand can be invoked through the ssh configuration, which will limit the remote system so that it can only execute a set of statically defined commands. This way, compromising the local system is made much more difficult.