MIB Smithy SDK is a dynamic extension to Tcl/Tk (8.4+) that allows development of custom scripts for controlling SNMP agents, manipulating SMI definitions, doing conversions, and more. It is based on the core of Muonics' MIB Smithy, and the SDK supports SMIv1 and SMIv2, as well as SNMPv1/v2c/v3 with HMAC-SHA-96 and HMAC-MD5-96 authentication and DES/CBC and AES128/CFB privacy. It also provides complete read-write access to all elements of SMI/MIB Module definitions, unlike similar extensions that provide only read access to a limited subset. The SDK allows multiple discrete SMI databases and SNMP sessions, and provides all of the built-in validation and error recovery capabilites of the full product, without the visual MIB development environment.
@1 Auto Delete deletes all files (in a specific directory) with dates older than the specified number of days. It can be useful if you have pages generated through user's input. It can be run manually from a browser, through telnet, or automatically using crontab. There are only two variables to edit - the directory, and the file age.
The DAP daemon runs entirely as a non-privileged user and sends regular updates of the server status to a specified set of peers in a cluster. You can specify any number of information elements, such as uptime, networkdevice counters (packet/octet), logged in users (via utmp), load averages, and memory/swap usage.
@1 Helpdesk XP Perl is a very powerful Web-based helpdesk system. It supports file attachments, hidden remarks, priority marking, etc. Unlike other similar products, this script does not use the conventional "assign/completed" method to close past tickets. Instead, it uses an intelligent method to sort/rank inquiry tickets. You can even tell whether your replies have been read by the visitors.
Kernel Security Checker is a useful tool to locate attackers residing within a system by employing a direct analysis of the kernel through /dev/kmem and bypassing the hiding techniques of the intruder (kernel static recompilation or use of LKMs). It can find the modified syscalls from userspace, detect the promiscuous interfaces, and find the modifications applied to a protocol.