libsysactivity is a lightweight library that retrieves statistics of the system's activity in a portable and thread safe way. In each OS that it supports, it offers the same API for retrieving the activity of Hard disks, CPUs memory, Processes, Network interfaces, Memory, and Swaps.
Moose File System (MooseFS / MFS) is a fault tolerant, network distributed file system. It spreads data over several physical servers, which are visible to the user as one resource. For standard file operations MooseFS mounted with FUSE acts like other Unix-alike file systems: it has a hierarchical structure; it stores POSIX file attributes; and it supports special files, symbolic links, and hard links. Access to the file system can be limited based on IP address and/or password. It offers high reliability, since several copies of the data can be stored across separate computers. Capacity is dynamically expandable by attaching new computers or disks. Deleted files are retained for a configurable period of time (with a file system level "trash bin"). MooseFS supports coherent snapshots of files, even while the file is being written or accessed.
Arkeia Free Version is a no-cost version of Arkeia Network Backup specifically for small networks. It allows an administrator to backup and restore files via a Web UI. This edition has the option to backup up to two machines to a 250 GB disk storage or tape drive. It allows you to backup Linux machines, Windows desktops, Mac desktops, FreeBSD servers, and more.
downtimed is a program that monitors operating system downtime, uptime, shutdowns, and crashes and records such events. At OS startup it logs information about previous downtime. It then periodically updates a time stamp file on the disk, which is used to determine the approximate time when the system was last up and running. During a graceful system shutdown, it records a time stamp in another file. The downtimes(1) command line tool can be used to inspect records of past downtime.
agentsmith is a daemon that continuously monitors a log file for break-in attempts by remote hosts. Upon detection of a break-in attempt, it launches a user defined script or application, which can do virtually anything from sending mail messages to whatever else you might think of. The criteria for what is considered a break-in attempt can be configured by means of a regular expression.