The BRU Backup and Restore Utility features data-verified backups, scalability, configurability, and ease of use for Linux and Unix. Versions are available for Linux, FreeBSD, and most UNIX variants. It works via an X11 interface, command line interactive, or through a scripted, scheduled (CRON) mechanism.
C-Kermit is a combined serial and network communication software package offering a consistent, medium-independent, cross-platform approach to connection establishment, terminal sessions, file transfer, character-set translation, numeric and alphanumeric paging, and automation of communication tasks. Recent versions include FTP and HTTP clients as well as an SSH interface, all of which can be scripted and aware of character-sets. It supports built-in security methods, including Kerberos IV, Kerberos V, SSL/TLS, and SRP, FTP protocol features such as MLSD, and source-code parity with Kermit 95 2.1 for Windows and OS/2.
The file check daemon monitors files according to rules defined in configuration files. When a file is considered stable (due to its age, presence of a flag file, etc.) then it gets copied to a new location. Rotating backups of the destination file can be made and owner, group and permissions can be specified for the destination. Some examples of where this utility has been found to be useful are: Moving files out of an incoming FTP directory in a timely manner. Moving files uploaded to a web server into directories with different user/group. This lets the administrator run the web server as a non-root user and accept uploads using web server based authentication and then move the files to a more secure area after the transfer. The details of how to determine whether a file is stable and what to do with it once it is are defined in a "Filespec" configuration file. There is a separate filespec for each file that will be monitored which means that each file can have unique behavior associated with it.
gnokii is a multisystem tool suite for mobile phones. It provides a library to communicate with a phone hiding the communication protocol. The library handles SMS, phonebook, calendar, phone calls, and other mobile phone capabilities. It supports Nokia-FBUS mobiles, AT-capable phones (most of the mobiles), as well as Symbian-based phones.
integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. integrit's major advantages are a small memory footprint and simplicity. It works by creating a database that is a snapshot of the most essential parts of your computer system. You put the database somewhere safe, and you can then use it to make sure that no one has made any illicit modifications to the computer system. In the case of a break in, you know exactly which files have been modified, added, or removed.