Libporty provides a higher level API for some commonly used library functions such as sockets, date/time, file system access, background processes, and asynchronous DNS resolving. Libporty is configured using scconfig and the API is guaranteed to work the same way on all supported systems. An application that exclusively uses the libporty API will not require autotools/scconfig for porting. Libporty has been tested on Linux, Windows, Mac OS X, multiple BSD variants, Minix, OpenSolaris, and some ancient Unix systems.
HATop is an interactive ncurses client and real-time monitoring and statistics displaying tool for the HAProxy TCP/HTTP load balancer. HATop's appearance is similar to top(1). It supports various modes for detailed statistics of all configured proxies and services in near real-time. In addition, it features an interactive CLI for the HAProxy Unix socket. This allows administrators to control the given HAProxy instance (change server weight, put servers into maintenance mode, etc.) directly out of HATop (using keybinds or the CLI) and monitor the results immediately.
Dpmaster is a lightweight master server initially written for the DarkPlaces game engine. Its Quake III Arena-like protocol allows it to fully support new games without having to restart or reconfigure it. In addition to its own protocol, dpmaster also supports the master protocols of "Quake III Arena", "Return to Castle Wolfenstein", and "Wolfenstein: Enemy Territory".
The Subukan Sensor is a complete Network Intrusion Detection System (NIDS) platform. It is not simply an application one can install on an existing operating system. Rather, Subukan is a total software solution including both an operating system and a unique compilation of security tools. It is based on a single file image or firmware that transforms almost any hardware equipment into a fully functional NIDS appliance. Appliance- based technology simplifies administration and provides the capability for remote upgrades.
CloudVPN is a secure decentralized mesh networking tool. It allows applications to use it as a mesh transport layer for packet routing, easily creating mesh ethernet VPN, secured audio/video broadcasting or communication channels, etc. It can create secured networks with special or weird topologies, so it's very easy to create connection schemes with clustered/decentralized servers, topologies with better throughput, ring-like topologies for failover, long-line for passing through many routes, or tree topology for optimizing inter-server bandwidth needs.