ENet for C# wraps the C-language ENet networking library. For games and other realtime applications, if you use TCP, old data can hold up newer data, even if it is no longer relevant (old positions, etc.). Your players will perceive any lost packet as a "lag burst". ENet supports multiple in-order streams of data, and allows you to decide on reliability on a per-packet basis. The library is useful for both client-server and peer-to-peer architectures.
Libporty provides a higher level API for some commonly used library functions such as sockets, date/time, file system access, background processes, and asynchronous DNS resolving. Libporty is configured using scconfig and the API is guaranteed to work the same way on all supported systems. An application that exclusively uses the libporty API will not require autotools/scconfig for porting. Libporty has been tested on Linux, Windows, Mac OS X, multiple BSD variants, Minix, OpenSolaris, and some ancient Unix systems.
Collax Business Server is an all-in-one Linux server for small- and medium-sized businesses. It delivers all the important network services within a heterogeneous business environment for communication, infrastructure, compliance, groupware, and storage, all in a reliable and secure way which is easy to manage. It also provides essential security functions such as firewalling and virus and spam filtering, to protect against hacker attacks, viruses, and unsolicited email messages.
pcapfix is a repair tool for corrupted pcap files. It checks for an intact pcap global header and repairs it if there are any corrupted bytes. If one is not present, one is created and added to the beginning of the file. It then tries to find pcap packet headers, and checks and repairs them.
360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, Perl firewall policy manipulation tool to filter, compare to logs, merge, translate, and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA, or ScreenOS commands. It is all contained in one file. It can read policy and logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), and Cisco ASA (show run / syslog format). It uses both inclusive and exclusive CIDR and text filters, permitting you to split large policies into smaller ones for virutalization at the same time as removing unused connectivity. It supports policy to log association, object translation, rulebase reordering and simplification, rule moves, and duplicate matching automatically. It allows you to seamlessly move rules to where you need them. 'print' mode creates a spreadsheet for your audit needs with one command.
KeyOS is an integrated IT management platform compliant with the principles behind ISO 20000. Easily expandable through a plugins system, it provides a wide set of management consoles and dashboards, and interoperability with other tools used by system administrators. It provides a Windows and Linux agent to provide inventory and monitoring of hardware assets, a Centreon-Nagios connector, monitoring for anti-virus and backup programs, remote assistance, a help-desk and ticketing system with request routing, escalation, and SLA management, VoIP integration, automated translation, time-sheets, and intervention reports, and more.
Inguma is a penetration testing and vulnerability research toolkit. The framework includes modules that discover hosts, gather information, fuzz targets, brute force user names and passwords and attempt exploits. While the current exploitation capabilities are limited, the program provides numerous tools for information gathering and target auditing.