Blue Mind is a messaging and collaboration platform. It offers scalable shared messaging, calendars and contacts with advanced mobility (iPhone, iPad, Android, etc.), and Outlook and Thunderbird connectivity support. Designed with simplicity as a goal, it uses Web 2.0 technologies with a Javascrit UI, offline Web capability, and a Web-services-oriented pluggable architecture.
PAC provides a GUI to configure SSH and Telnet connections, including usernames, passwords, EXPECT regular expressions, and macros. It is similar in function to SecureCRT or Putty. It is intended for people who connect to many servers through SSH. It can automate logins and command executions.
Stantor-Domodulor is a home automation software system. It lets you manage electric and electronic facilities through Web pages and WAP 2 and 1 for smartphones. Stantor can drive Velleman k8000/k8055/k8061 boards, Ethernet and USB Arduino Mega, Uno and Duemilanove boards, X10 materials, USB webcams, and sound boards. Stantor correspondents can sent alerts via email and instant messaging. The Linux distributions supported are Ubuntu, Fedora, and Mandriva.
Psensor is a graphical hardware temperature monitor for Linux. It can monitor temperatures of the different hardware sensors (motherboard and CPU using lm-sensors), hard disk drives (hddtemp/libatasmart), and ATI/Nvidia GPUs. The fan can also be monitored (lm-sensors). Psensor is designed to be simple and easy to use.
Redo Backup and Recovery is an extremely easy point-and-click rescue live CD with a suite of tools for system backup and recovery, partition editing, deleted file recovery, drive management, data protection, and more. The backup tool stores an image of the entire hard drive, so recovery from viruses, malware, or disc failures takes minutes. It boots from a CD or USB drive. It automatically locates local drives, USB drives, and network-shared drives to make backup storage and retrieval as simple as possible for anyone. The menu-driven GUI includes a Web browser for downloading drivers and a terminal with advanced command line tools.
GroundWork Monitor Community Edition can give you insight into your computing infrastructure, allowing you to see the current and historical states of all your computers: servers, desktops, and laptops, all of your network devices, all of your services (like TCP/IP and Web services), and all of your applications (like mail servers and database apps). You can choose to be alerted when something goes awry via pager, SMS, email, or phone, and even set up automatic restarts or fall-overs.
The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.
BleachBit deletes junk to recover disk space and maintain privacy. It rids your system of old junk including cache, Internet history, temporary files, unused locale files (better than localepurge), logs, and cookies. Designed for Linux systems, it wipes clean 50 applications including Adobe Reader, Bash, Firefox, Flash, OpenOffice.org, Opera, Real Player, Skype, and more. It shreds files so that they cannot be recovered, and it wipes free disk space to hide insecurely deleted files. It offers both a simple PyGTK GUI and a command line interface for automation.
CensorNet Professional is a Web filtering and Internet management tool that is designed to protect, control, and monitor individuals accessing Internet resources on a local area network. It features the ability to control users and machines, group policies, time quotas, realtime content filters (by file extension or image/MIME type), modules, comprehensive reporting with audit trails and management reports, access schedules, and bandwidth limitations. Transparent authentication with Active Directory is available for ease of deployment. Administration can been done using a Web interface.