@1 Helpdesk XP Perl is a very powerful Web-based helpdesk system. It supports file attachments, hidden remarks, priority marking, etc. Unlike other similar products, this script does not use the conventional "assign/completed" method to close past tickets. Instead, it uses an intelligent method to sort/rank inquiry tickets. You can even tell whether your replies have been read by the visitors.
The Advanced Bash Scripting Guide is both a reference and a tutorial on shell scripting. This comprehensive book, the equivalent of 1,032 print pages, covers almost every aspect of shell scripting. It contains 382 profusely commented illustrative examples, a number of tables, and a cross-linked index/glossary. Not just a shell scripting tutorial, this book also provides an introduction to basic programming techniques, such as sorting and recursion. Included scripts are the Game of Life, a Perquackey variant, a Morse code trainer, and an implementation of the Gronsfeld Cipher. This book is suited for both individual study and classroom use. It covers Bash, up to and including version 4.2. Note that users of miniaturized single-board computers running Linux, such as the Raspberry Pi and the Beagle Bone, would find this Guide useful for learning and running Bash scripts to explore and expand the capabilities of these small, but powerful machines.
System Configuration Collector collects and classifies most of your Unix/Linux/BSD configuration data in flat files called snapshots. This allows changes in snapshots of consecutive runs to be detected. These changes are added to a logbook, which is helpful for administrators during troubleshooting and for auditors during audits. Snapshots and logbooks are also available in HTML format. All data can be send to an SCC server, where a Web interface provides access to summaries and supports comparing snapshots of different servers and searching of all data. A WMI-based Windows client is also available.
Email Security through Procmail (the Procmail Sanitizer) provides methods to sanitize email, removing obvious exploit attempts and disabling the channels through which exploits are delivered. Facilities for detecting and blocking Trojan Horse exploits and worms are also provided.
fs-check checks filesystem sizes to see if they are getting too full. It uses a configuration file that specifies the filesystems to check, email contacts, trigger thresholds (percentage or amount used/unused), and a report program to run. It includes fs-report, which shows things like the largest files, the newest files, the intersection of these and core files. It can be run from cron or as a daemon.