cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up.
Finnix is a small, self-contained, bootable Linux CD distribution ("LiveCD") for system administrators, based on Debian testing. You can use it to mount and manipulate hard drives and partitions, monitor networks, rebuild boot records, install other operating systems, and much more.
muser lists processes which have a given directory (or cwd if not specified) as a parent of their current working directory (thus making it impossible to unmount that directory if it is a mount point). This script has overlapping functionality with the fuser program from the psmisc package, but has the advantage that it works on SMB mounts. Additionally, it provides a color, formatted listing of process IDs, executable names, current working directories, and the command lines used to run the programs. It works with varying-sized /proc/*/cwd fields.
netview lets you browse, mount, and unmount SMB shares using any browser, but especially Konqueror or any browser which is also a file manager. It provides actual mounting of shares so you can edit files on them. It addes mounted shares to /etc/fstab automatically so they will be remounted, and manages storage of passwords in a $HOME/.smbpasswd file for later auto-mounting of shares.
The goal of Escape-K is to provide an all-in-one platform for IT service management. This means that using a single application (the Escape-K client console), users are able to manage any sized computer organization, from workstation and printers to servers, databases, or network devices. Escape-K follows the main guidelines recommended by ITIL. Therefore, the core of the application is the composed of the CMDB. Depending of the chosen perspective, Escape-K users can deal with incidents and problem resolution as well as server or database administration.