Hot Copy creates an instant point-in-time snapshot of any block device while the system is running without interrupting applications or requiring the use of LVM. As block level changes are made to the real device, hot copy makes a backup copy of the changed block. The changed blocks are efficiently stored in unused space on your hard disk. These stored changed blocks maintain a point-in-time snapshot and space is only needed when you make changes to the real device. You can even write to your snapshots.
OKL4 Microkernels are a family of second-generation microkernels based on the original designs and implementations by Jochen Liedtke. Originally implemented in highly tuned i386-specific assembly language code, the API has seen extensive development in a number of directions, both in achieving a higher grade of platform independence and also in improving security, isolation, and robustness. There have been various re-implementations of the original binary kernel interface and its higher level successors, including L4Ka::Pistachio, L4/MIPS, and Fiasco. For this reason, the name L4 now applies to the whole microkernel family including the L4 kernel interface and its different versions.
sqlzma is a patch against lzma and squashfs that makes squashfs support both LZMA compression and ZLIB compression. A squashfs image file that uses LZMA compression has no backward compatibility, but the patched squashfs and its tools can handle the old squashfs image generated by the unpatched squashfs-tools.
Fyrewall is a full featured firewall system based on FreeBSD. It comes with an easy installation interface. Fyrewall includes features such as full control via a Web interface, an aliasing system for easing management of firewall rules, failover clustering support via CARP, load balancing, integrated VPN support for many popular protocols, traffic and system statistics reporting, and the packaging system.
The sniffy project can trace/log the data of any pseudo terminal in the system. Due to the way the terminal works, such a terminal trace provides complete information of what happened on the terminal screen, and sniffy is able to display/replay this information. It consists of a kernel module able to connect/hook on the pseudo terminal, a program to display the contents of any pseudo terminal on the fly, a daemon process tracing the pseudo terminal content into the file, and a replay program to replay any stored pseudo terminal session.