slapt-get is an APT-like system for Slackware package management. It allows you to search Slackware mirrors and third-party package sources (such as www.linuxpackages.net) for packages, compare them with installed packages, and install new packages or upgrade installed packages, all with a few simple commands.
Network Shell Utilities: A command line UNIX shell that provides a centralized management platform for 12 operating systems (Linux, Solaris, etc.). We provide native support for over 130 standard UNIX commands, extended to leverage Network Shell's distributed technology. This allows administrators to execute commands on multiple machines simultaneously. Network Shell Deploy: A GUI tool that provides a simple way to obtain system inventory/audit, patch management, package/application management, and content distribution/management. In addition, deploy uses the Network Shell script engine - any job created in the GUI can be saved as a Network Shell script, and modified as required by the administrator.
Loonix is a custom Linux distribution meant for server applications. It comes with only the latest up-to-date programs and applications, all specially configured for optimal performance and ease of use. Programs are neatly organized in structured directories, and strict security rules are in place for sensitive configuration files and other data.
big:eye is a system management server that was developed for enterprise IT infrastructures. It manages faults, performance, inventories, and configurations through an impressive user interface. It produces maps through auto-discovery, and monitors faults, Cisco, Motorola, and SNMP devices.
footprint is a tool that makes it easier to create and manage kickstart files. It allows you to define systems, create profiles for systems, and macros per distribution. It can create kickstart files on the fly, make custom initrd (ramdisks), create custom bootfloppies, and can manage your DHCP and PXE configuration.
slackroll is a package or upgrade manager for Slackware Linux. It is designed to work with official mirrors in systems mainly composed of official packages with a few unofficial packages. It lets you automatically upgrade or install packages, and displays which packages have been added or removed from the Slackware tree.
m23 is a software deployment system for Debian GNU/Linux that allows you to install and administrate hundreds of clients via network. It can partition and format clients and install Debian, (K/X)Ubuntu, Linux Mint, Fedora, OpenSuse, and CentOS operating systems on your virtual and physical clients. Group functions allow the comfortable update and installation of further packages during operation. Mass installation functions simplify your administration chores. m23 has a Web interface. Backup functions are implemented for server and clients.
BitRock InstallBuilder allows you to create easy-to-use multiplatform installers for Linux (x86/PPC/s390/x86_64/Itanium), Windows, Mac OS X, FreeBSD, OpenBSD, Solaris (x86/Sparc), IRIX, AIX, and HP-UX applications. The generated application installers have a native look-and-feel and no external dependencies, and can be run in GUI, text, and unattended modes. In addition to self-contained installers, the installation tool is also able to generate standalone RPM packages.
Owl (Openwall GNU/*/Linux) is a small security-enhanced Linux distribution for servers. Owl also makes a good base system for customized virtual machine images and embedded systems, and Owl live CDs with remote SSH access are good for recovering or installing systems (whether with Owl or not). A single Owl CD includes the full live system, installable packages, the installer program, as well as full source code and the build environment capable of rebuilding the entire system from source. Owl supports multiple architectures (x86, x86-64, SPARC, and Alpha) and offers some compatibility for packages developed for other Linux distributions. The primary approaches to security are proactive source code review, privilege reduction, privilege separation, careful selection of third-party software, safe defaults, and "hardening" to reduce the likelihood of successful exploitation of security flaws.