GNU Bash is an sh-compatible command language interpreter that executes commands read from the standard input or from a file. Bash also incorporates useful features from the Korn and C shells (ksh and csh). Bash is intended to be a conforming implementation of the IEEE POSIX Shell and Tools specification (IEEE Working Group 1003.2).
abcde is a frontend to cdparanoia, wget, cd-discid, id3, and your favorite Ogg Vorbis (the default), MP3, FLAC, Ogg Speex, or MPP (Musepack) encoder. It grabs an entire CD and converts each track to the desired format, then comments or ID3-tags each file, all with one command. It supports multiple output in a single CD read, the creation of a single track from a CD, resume operation, CD concatenation, volume normalization, gapless encoding (with LAME), parallelization, SMP, proxies, customizable filename organization and munging, playlist generation, distributed encoding via distmp3, and more.
Video Contact Sheet *NIX creates a contact sheet (preview) from videos by taking still captures distributed over the length of the video. The output image contains useful information on the video such as codecs, file size, screen size, frame rate, and length. It requires MPlayer or FFmpeg and ImageMagick. It is confirmed to work on Linux and FreeBSD, and possibly other POSIX/UNIX systems.
BRL-CAD is a powerful constructive solid geometry solid modeling system that includes an interactive geometry editor, ray-tracing support for rendering and geometric analysis, path-tracing for realistic image synthesis, network distributed framebuffer support, and image and signal-processing tools.
MoSShE (MOnitoring in Simple SHell Environment) is a simple, lightweight (both in size and system requirements) server monitoring package designed for secure and in-depth monitoring of a handful of typical/critical Internet systems. It supports email alerts and SLA monitoring out of the box, and whatever you can script. The system is programmed in plain (Bourne) SH, and made to be compatible with BASH and Busybox so it can easily be deployed on embedded systems. Monitoring is designed to be distributed over multiple systems, usually running locally. As no parameters are accepted from the outside, checks cannot be tampered or misused from outside. The system is designed to allow decentralized checks and evaluation as well as classical agent-based checks with centralized data accumulation. Agent data is transferred via HTTP, so available Web servers can be co-used for agent data transfer. Each agent creates simple (static) HTML pages with full and condensed status reports on each system, allowing simple local checks.
FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.
Mondo Rescue archives Linux and Linux/Windows systems to tapes, CDs, DVDs, USB devices, or ISO images that may be used to restore some or all of your OS and data in the event of catastrophic data loss, or for cloning a system. The emphasis is on stability and ease of use. Currently, ext2, ext3, ext4, (v)fat, minix, ReiserFS, XFS, and JFS filesystems are supported, as are RAID, DM, Multipath, and LVM.
The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.