There are many photo-gallery programs available. Zoph is different, as it concentrates on the management of large collection of photos instead of just showing them on the Web. It can store a lot of information about your photos, including the regular EXIF info, photographer, location, title, description, rating, and the people in the photo. Photos can appear in multiple albums and categories. Additional features include search, slideshows, lightboxes, email, access privileges, and multiple languages.
OCS Inventory is an application designed to help a network or system administrator keep track of the configuration and software of computers that are installed on the network. Information about hardware and operating system are collected. OCS Inventory is also able to detect all active devices on your network, such as switches, routers, network printers, and unattended devices. It also allows you to deploy software, commands, or files on client computers.
PRADS is a "Passive Real-time Asset Detection System". It passively listens to network traffic and gathers information on hosts and services it sees. This information can be used to map your network, letting you know what services and hosts are alive and used. It can also be used together with your favorite IDS/IPS setup for "event to host/service" correlation. It can help you make sure that your inventory database is up to date. PRADS commes in two versions. One written in Perl, and one written in C. Some features might only be found in one of the versions.
Stupa is an associative search engine. It lets you search related documents with high performance and high precision. Since document data and inverted indexes are kept in memory, Stupa reflects updates of documents in search results in real time. A server implementation of Stupa is possible by using Thrift.
John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, lots of other hashes and ciphers are added in the community-enhanced version (-jumbo), and some are added in John the Ripper Pro.
cronbot is a wrapper script for cron jobs. Rather than running your job/script directly, you run it through cronbot, and it will allow a little more control to help keep things from getting out of hand. The default behavior is to only allow one instance of your job to run. This can be changed with the --duplicate option. You can also pass in a maximum time of execution for a job or add a random amount time to delay the start of your job. By default, jobs are run with a default "nice" value, which is usually 10.
LibBi is used for state-space modelling and Bayesian inference on high-performance computer hardware, including multi-core CPUs, many-core GPUs (graphics processing units), and distributed-memory clusters. The staple methods of LibBi are based on sequential Monte Carlo (SMC), also known as particle filtering. These methods include particle Markov chain Monte Carlo (PMCMC) and SMC2. Other methods include the extended Kalman filter and some parameter optimization routines. LibBi consists of a C++ template library and a parser and compiler, written in Perl, for its own modelling language.
FusionInventory Agent is an generic inventory agent that can collect information from various sources including the local machine, network, and remote devices. It also has the ability to send Wake on LAN requests and deploy software. The agent can be used with GLPI, Uranos, Rudder, Pulse2, and OCS Inventory.
Jmx4Perl provides an alternate way of accessing Java JEE Server management interfaces that are based on JMX (Java Management Extensions). It is an agent-based approach where a small Web application deployed on the application server provides HTTP/JSON-based access to JMX MBeans registered within the application server. It is set up from a handful of Perl modules, which can be integrated seamlessly in your own programs. It also includes a Nagios plugin, check_jmx4perl, a jmx4perl command line tool for remote JMX queries and operations, and a readline-based JMX shell j4psh, with context sensitive command completion and syntax highlighting.
The Paranoid modules provide a number of routines that are intended for use in strict and taint-safe scripts. The modules cover a variety of tasks from command-line argument parsing to process and network management. All of the modules use a debug trace framework for diagnostic output that is easily used and extended for application code as well.