Spinlogs is a shell script for rotating system logs. It is configurable through a text file similar in format and featureset to the newsyslog program in FreeBSD. Any Unix system running ksh should be able to use it. There are many options defining how and when log files should be rotated, and the config file is very straightforward. Rotating log files is a pretty simple task, but some commercial platforms don't include anything better than the old "newsyslog", so this is provided as a system-independent alternative.
JH2N (Java host to named conversion program) converts a hosts file to a full BIND 8 or 9 configuration. JH2N was inspired by the h2n.pl program included in the O'Reilly "DNS and BIND" book. Various options are available to enhance its operation by incuding external files. Using the simple host file syntax, very large and complex zones can be maintained.
Styx is a scanner/parser generator designed to address some shortcomings of the traditional lex/yacc combination. It has unique features like automatic derivation of depth grammar, production of the derivation tree, including it's C interface, preservation of full source information, pretty printing to faciliate source-source translation, and persistence to aid rapid interpreter writing. It also supports reentrancy. Styx works well under several different OSes, including serveral Unixes, DOS, and Windows.
Virtual Qmail Web Administrator (VqAdmin) is a CGI Web program to allow virtual email hosting machine administators to add, delete, and modify virtually hosted email domains and users using vpopmail. Authentication is provided by ACLs and the Apache htpasswd method. Machine Administrators can add/delete virtual email domains, and tech users can admin user email accounts such as setting passwords, disk quotas, and privileges.
Monit is a utility for managing and monitoring processes, programs, files, directories, and devices on a Unix system. It conducts automatic maintenance and repair and can execute meaningful causal actions in error situations. It can be used to monitor files, directories, and devices for changes, such as timestamps changes, checksum changes, or size changes. It is controlled via an easy to configure control file based on a free-format, token-oriented syntax. It logs to syslog or to its own log file and notifies users about error conditions via customizable alert messages. It can perform various TCP/IP network checks, protocol checks, and can utilize SSL for such checks. It provides an HTTP(S) interface for access.