The stunnel program is designed to work as an SSL encryption wrapper between remote client and local (inetd-startable) or remote server. It can be used to add SSL functionality to commonly used inetd daemons like POP2, POP3, and IMAP servers without any changes in the programs' code. It will negotiate an SSL connection using the OpenSSL or SSLeay libraries. It calls the underlying crypto libraries, so stunnel supports whatever cryptographic algorithms you compiled into your crypto package.
beaTunes is an iTunes companion app capable of automatically analyzing your music collection to help you build better playlists. It analyzes BPM (beats per minute), silence at the beginning or end of a song, and the color (based on frequency spectrum) of a given song. Some of the data is stored through iTunes, and some is stored by beaTunes itself. beaTunes can suggest albums that would complement your music collection, display music charts, and help you find and fix errors in your song meta data, like typos and wrong genres. It also allows you to blog about selected songs or playlists.
Joget Workflow is a platform to easily build enterprise Web apps for cloud and mobile. Build full-fledged apps, e.g. CRM, HR, Healthcare, etc. Drag and drop forms, lists, and UI elements. Add workflows to automate processes. Extend via plugins. Apps are mobile optimized and cloud ready. Download ready made apps from the Joget Marketplace.
PEDSIM is a microscopic pedestrian crowd simulation system. The PEDSIM library allows you to use pedestrian dynamics in your own software. Based on pure C++/STL without additional packages, it runs on virtually every operating system. The PEDSIM Demo Application (Qt) gives you a quick overview of the capabilities, and is a starting point for your own experiments. PEDSIM is suitable for use in crowd simulations (e.g. indoor evacuation simulation, large scale outdoor simulations), where one is interested in output like pedestrian density or evacuation time. The quality of the individual agent's trajectory is high, PEDSIM can be used for creating massive pedestrian crowds in movies. Since libpedsim is easy to use and extend, it is a good starting point for science projects.
360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, Perl firewall policy manipulation tool to filter, compare to logs, merge, translate, and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA, or ScreenOS commands. It is all contained in one file. It can read policy and logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), and Cisco ASA (show run / syslog format). It uses both inclusive and exclusive CIDR and text filters, permitting you to split large policies into smaller ones for virutalization at the same time as removing unused connectivity. It supports policy to log association, object translation, rulebase reordering and simplification, rule moves, and duplicate matching automatically. It allows you to seamlessly move rules to where you need them. 'print' mode creates a spreadsheet for your audit needs with one command.
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of a multimedia file derived from various features from its content. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the features are similar. Potential applications include copyright protection, similarity searches for media files, or even digital forensics.
PolarSSL is a light-weight cryptographic and SSL/TLS library written in C. PolarSSL makes it easy for developers to include cryptographic and SSL/TLS capabilities in their (embedded) applications with as little hassle as possible. Loose coupling of the components inside the library means that it is easy to separate the parts that are needed, without needing to include the total library. PolarSSL is written with embedded systems in mind and has been ported on a number of architectures, including ARM, PowerPC, MIPS, and Motorola 68000. The source is written to have very loose coupling, enabling easy integration of parts in other software projects. Very loosely coupled cryptographic algorithms for MD2, MD4, MD5, SHA1, SHA-256, SHA-512, AES, Camellia, DES, Triple DES, ARC3, and RSA are included.