trackpeer is an agent that helps network and server administrators with tracking their users' computers. It makes it possible to determine the MAC addresses of computers over a network, even when the computers are behind NATed gateways. This agent is intended to be used by the administrators who need to identify and locate malicious computers and virus-infected computers in a network such as a middle-sized wireless LAN, public Ethernet jack system, campus, or corporate network.
trafcnt is an IP accounting scripts for a small LAN. It parses logs created by IPFM or any simillar source and calculates usage costs. It is possible to describe different schemes of operation for different users or groups. OpenBSD's pfctl is used for FW\NAT control, but trafcnt could be easily adapted to use almost anything. It produces clf- style logs.
traffic-vis is a suite of tools to help determine which hosts have been communicating on an IP network, with whom they have been communicating and the volume of communication taking place on a host by host basis. Reports can be generated in ASCII and/or HTML format. traffic-vis can also generate Postscript(tm) and GIF charts showing which hosts have communicated with each other.
Trafmetux is a network traffic meter for Linux. It tells you how much IP traffic has been seen by the Linux kernel module during the last few minutes, hours, days, weeks, and months. It's very useful when you have a limited Internet connection with quotas. For instance, many mobile broadband ISP provide only 3GB/month. In that case, you need to know how many megabytes you already used.
trapdoor2 allows remote users to execute local commands by sending 'magic cookies'. this can e.g. be used to alter local firewalling rules so people can connect to local services after sending the magic cookie. trapdoor2 is implemented as a high-secure HTTPS server and includes support for the Wireless Application Protocol (WAP).
trollhunter offers various tools to either analyze existing logfiles or monitor firewall activity in real time. Currently standard log messages generated by a Linux 2.4 kernel netfilter/iptables firewall are supported. You can choose from a Perl/Tk interface or run in commandline standard ASCII color TTY terminal.
tsocks provides transparent network access through a SOCKS version 4 or 5 proxy (usually on a firewall). tsocks intercepts the calls applications make to create TCP connections and determines if they can be directly accessed or need the SOCKS server. If they need the SOCKS server they connection is negotiated with the server transparently to the application. This allows existing applications to use SOCKS without recompilation or modification. tsocks is a wrapper library for the libc connect() call.