Open Transactions is a solid, easy-to-use, financial crypto and digital cash library, including an API, server, and test client. It features anonymous numbered accounts, untraceable digital cash, triple-signed receipts, basket currencies, and signed XML contracts. It also supports cheques, invoices, payment plans, markets with trades, and other instruments. It uses OpenSSL and Lucre blinded tokens.
OSCATS (Open-Source Computerized Adaptive Testing System) implements Item Response Theory (IRT) and cognitively diagnostic (latent classification) models and item selection algorithms used in Computerized Adaptive Testing (CAT). OSCATS facilitates the development of CATs and simulations of CATs by providing ready-to-use code for running the CAT item selection and ability/classification estimation in an extensible, modular framework. The library is written in object-oriented C using GObject, and has bindings to Python, Perl, PHP, and Java.
OCS Inventory is an application designed to help a network or system administrator keep track of the configuration and software of computers that are installed on the network. Information about hardware and operating system are collected. OCS Inventory is also able to detect all active devices on your network, such as switches, routers, network printers, and unattended devices. It also allows you to deploy software, commands, or files on client computers.
Pandora FMS is a software-monitoring tool which has been created for all kinds of companies. It is specially designed for large environments and works by first managing servers, applications, and communications, and then notifying clients of problems and failures before they occur. Pandora FMS also includes a configurable report system which evaluates and notifies the client on the level of fulfilment and compliance of their systems. It supports all kinds of technologies unifying the management tools of your system, such as performance monitoring, network monitoring, and availability management. Pandora FMS makes your company management more agile and improves your process performance.
RedWolf is a security threat simulator that tests security system effectiveness. Its threat generation capabilities include email, IM, malware, P2P, social networking, VoIP, DDoS, and many more. The guiding philosophy is that by generating realistic scenarios in a wide variety of categories, an auditor or organization can assess the effectiveness of network defenses. The scenario suite allows one to verify compliance with PCI-DSS, Sarbanes-Oxley, or HIPAA controls. RedWolf helps identify data loss risks and provides expert recommendations concerning risk mitigation. It reports present findings, recommendations, best practices, and blocking guidance in a straightforward, easily readable format. RedWolf also acts as a 'Red Team' agent, running drills to measure the readiness of your operations staff.