DHCPD Configuration Editor (DCE) is a Web service that allows you to update MAC addresses in the dhcpd.conf of an ISC DHCP server. It can load a dhcpd.conf file from a server, save a modified dhcpd.conf file to a server, import a dhcpd.conf file from the local filesystem, export a modified dhcpd.conf to the local filesystem, and change the MAC address of previously declared host entries. It can be used with the minimalist General Configuration Form Manager server, or with Apache and its PHP module.
n2 is a client/server system for transmitting forensic snapshots from a number of hosts to a receiver node. This receiver collects statistics and is able to present an overview of the current and historical situation on a server. n2 provides a robust solution for real-time monitoring, optimizing performance, and analyzing crashes.
ChiMeRA is a configuration management tool designed around three basic concepts. The first is a framework for managing servers, allowing for command execution and file transfer over SSH. The second is a repository for managing files that enables change tracking, archiving, and management of various user definable configuration files across multiple servers through a standard revision control tool. The third concept is an aesthetic principle of simplicity, giving administrators straightforward interfaces to manage complicated environments.
sec-wall is a feature-packed security proxy that supports SSL/TLS, WS-Security, HTTP Auth Basic/Digest, extensible authentication schemes based on custom HTTP headers and XPath expressions, powerful URL matching/rewriting, and an optional header enrichment. It's a security wall with which you can conveniently fence otherwise defenseless backend servers.
agentsmith is a daemon that continuously monitors a log file for break-in attempts by remote hosts. Upon detection of a break-in attempt, it launches a user defined script or application, which can do virtually anything from sending mail messages to whatever else you might think of. The criteria for what is considered a break-in attempt can be configured by means of a regular expression.