35 projects tagged "SysAdmin"

No download No website Updated 09 Mar 2010 Mr Bix

Screenshot
Pop 38.31
Vit 39.27

Mr Bix is a TCP proxy of sorts in which an incoming connection becomes two outgoing connections, only one of which returns data to the original incoming connection as with a normal TCP proxy; data returned from the other is discarded. It is intended to be used to permit testing of new services or servers with live traffic.

No download Website Updated 06 Apr 2011 RHash

Screenshot
Pop 19.80
Vit 35.82

RHash is a utility for computing hash sums and creating magnet links. It supports CRC32, MD4, MD5, SHA1/SHA2, Tiger, TTH, Torrent BTIH, AICH, ED2K, GOST R 34.11-94, RIPEMD-160, HAS-160, EDON-R 256/512, WHIRLPOOL, and SNEFRU hash algorithms. Hash sums are used to ensure and verify the integrity of large volumes of data for long-term storage or transferral. RHash can calculate magnet links and EDonkey 2000 links. It can update existing hash files by adding sums of files missing in the hash file. It can output in a predefined (SFV, BSD-like) or user defined format. It can process directories recursively.

Download Website Updated 08 Dec 2011 Restricted Shell Rbash

Screenshot
Pop 23.79
Vit 30.34

A tool for setting up account environment using Bash shell in rbash mode. Includes basic files and a program to create a dummy user, who can only run commands of your choice. Useful for setting up tightly confined, secure accounts with minimum effort.

Download Website Updated 29 Nov 2011 Sequencer

Screenshot
Pop 30.76
Vit 30.23

Sequencer is an engine used by system administrators for the computation and execution of sequences of actions over hardware or software. It can ping various devices in parallel, power on your whole cluster, or generate an Emergency PowerOff (EPO) script for your data center or cluster. It takes into account various dependencies (power off nodes before switches, clients before server), deals with failures kindly, and is very efficient (>4000 nodes in less than 10 minutes).

Download Website Updated 12 Aug 2009 Unhide.rb

Screenshot
Pop 76.00
Vit 1.00

Unhide.rb finds hidden processes on your system. It looks for active processes in many different ways. Processes found by some means but not others are considered to be "hidden", and are reported to the user. Unhide.rb is a Ruby rewrite of the original Unhide, which was written in C. Unhide.rb performs the same checks as the original, but is 10 times faster in only half as much code, and has better diagnostics when hidden processes are found.

No download Website Updated 13 Aug 2011 WinAdminPassword

Screenshot
Pop 17.97
Vit 31.96

WinAdminPassword is a tool for deploying unique passwords on Windows and Unix systems. Passwords are based on the computer's serial number and a secret key. The advantage is that no password is stored in a database and you can display them with a GLPI plugin, Webmin, etc.

Download Website Updated 09 Apr 2011 agentsmith

Screenshot
Pop 69.30
Vit 1.59

agentsmith is a daemon that continuously monitors a log file for break-in attempts by remote hosts. Upon detection of a break-in attempt, it launches a user defined script or application, which can do virtually anything from sending mail messages to whatever else you might think of. The criteria for what is considered a break-in attempt can be configured by means of a regular expression.

Download Website Updated 19 Feb 2012 badsector

Screenshot
Pop 32.36
Vit 28.82

badsector implements the algorithm described in http://smartmontools.sourceforge.net/BadBlockHowTo.txt for the ext[2-4] partitions. The smartmontools can report problematic bad sectors in LBA addressing format. This program relocates bad LBA sectors, provided they are unused.

Download No website Updated 24 Jan 2013 cronbot

Screenshot
Pop 18.89
Vit 22.18

cronbot is a wrapper script for cron jobs. Rather than running your job/script directly, you run it through cronbot, and it will allow a little more control to help keep things from getting out of hand. The default behavior is to only allow one instance of your job to run. This can be changed with the --duplicate option. You can also pass in a maximum time of execution for a job or add a random amount time to delay the start of your job. By default, jobs are run with a default "nice" value, which is usually 10.

Download Website Updated 13 Mar 2014 dedup.pl

Screenshot
Pop 85.90
Vit 1.86

dedup.pl is a script that scans Unix file systems and deletes duplicates files or creates hard links between duplicates, thereby freeing up disk space.

Screenshot

Project Spotlight

getID3()

Extracts useful information (title, bitrate, playtime, etc.) from MP3s and more.

Screenshot

Project Spotlight

C5Connector.Java

A backend for the Core Five file manager.