AnomicFTPD is an RFC959-compliant FTP server with OS- independent user and group management. Active and passive modes, non-root mode, and anonymous and/or read-only modes are supported. A built-in client IP filter acts as a firewall and provides additional access limitation. The server has no online interface; attributes, groups, and user accounts are configured through text files. The protocol/ format-unspecified LIST command produces output that is compatible with most FTP clients, including common Web browsers in FTP mode.
CyberFusion is a system that provides secure file transfer across a LAN, a WAN, and the Internet. It offers encryption and security, reliability and guaranteed delivery, management and automation, audit and control. It offers cost-saving migration from competitor products such as Connect:Direct which is supported with useful tools. It may be used as part of a VPN, ERP, EAI, or ETL software solution for secure file transfers as well as in disaster recovery, data archive, and backup and restore operations.
Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for bulk or emergency data destruction.
DFF (Digital Forensics Framework) is a simple but powerful tool with a flexible module system which will help you in your digital forensics works, including file recovery due to error or crash, evidence research and analysis, etc. DFF provides a robust architecture and some handy modules.
EncFS is an encrypted pass-through filesystem which runs in userspace on Linux (using the FUSE kernel module). Similar in design to CFS and other pass-through filesystems, all data is encrypted and stored in the underlying filesystem. Unlike loopback filesystems, there is no predetermined or pre-allocated filesystem size.
The goal of Escape-K is to provide an all-in-one platform for IT service management. This means that using a single application (the Escape-K client console), users are able to manage any sized computer organization, from workstation and printers to servers, databases, or network devices. Escape-K follows the main guidelines recommended by ITIL. Therefore, the core of the application is the composed of the CMDB. Depending of the chosen perspective, Escape-K users can deal with incidents and problem resolution as well as server or database administration.