Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
mysqlblasy is a Perl script for automating MySQL database backups. It uses "mysqldump" for dumping mysql databases to the files sytem. It was written with automated usage in mind. For example, it is silent during operation, and only produces noise on errors/problems. It rotates backups automatically to prevent the backup disk from getting full when the administrator is on vacation (or is lazy).
GeoToad is a geocaching query tool to help speed up the boring part of geocaching: choosing the cache and collecting the data. It allows you to generate any kind of complex query you want, and the program will go and poll the Geocaching query, grab the data, and output it to any format you want. The Geocache info can be synced straight to your GPS, iPod, PDA, or cell phone in over 20 different formats.
ChaiScript is an embedded scripting language designed from the ground up to directly target C++ and take advantage of modern C++ development techniques. Being a native C++ application, it has some advantages over existing embedded scripting languages. It uses a header-only approach, which makes it easy to integrate with existing projects. It maintains type safety between your C++ application and user scripts. It supports a variety of C++ techniques including callbacks, overloaded functions, class methods, and STL containers.
Botan is a crypto library written in C++. It provides a variety of cryptographic algorithms, including common ones such as AES, MD5, SHA, HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that are more obscure or specialized. It also offers SSL/TLS (client and server), X.509v3 certificates and CRLs, and PKCS #10 certificate requests. A message processing system that uses a filter/pipeline metaphor allows for many common cryptographic tasks to be completed with just a few lines of code. Assembly and SIMD optimizations for common CPUs offers speedups for critical algorithms like AES and SHA-1.
Attic is a deduplicating backup program. The main goal of attic is to provide an efficient and secure way to back up data. The data deduplication technique used makes Attic suitable for daily backups since only actual changes are stored. Main features: space efficient storage, optional data encryption, and off-site backups.
XCA is an interface for managing RSA and DSA keys, certificates, certificate signing requests, revocation lists and templates. It uses the OpenSSL and Qt4 libraries. Certificates and requests can be created and signed and many x509v3 extensions can be added. XCA supports multiple root and intermediate Certificate authorities. The CAs can be used to create CRLs and extend certificates. The following file-formats are supported: PEM, DER, PKCS#7, PKCS#8, PKCS#10, PKCS#12, and SPKAC.
NOC Project is an Operation Support System (OSS) for telecom companies, service providers, and enterprise Network Operation Centers (NOC). Areas covered by NOC include fault management, performance management, service activation/provisioning, knowledge base, multi-VRF address space management (IPAM), multi-vendor configuration management, DNS provisioning, peering management, RPSL and BGP filter generation, and reporting.