Freedup finds and eliminates duplicate files by linking them, and thus reduces the amount of used disk space within one or more file systems. By default, hardlinks are used on a single device, symbolic links when the devices differ. A set of options allows you to modify the methods of file comparison, the hash functions, the linking behavior, and the reporting style. You may use batch or interactive mode. Freedup usually only considers identical files, but when comparing audio or graphics files, you may elect to ignore the tags.
smartmontools contains utilities that control and monitor storage devices using the Self-Monitoring, Analysis, and Reporting Technology (S.M.A.R.T.) system built into ATA and SCSI hard drives. This is used to check the reliability of the hard drive and to predict drive failures. Version 5.x is designed to comply with the ATA/ATAPI-5 specification. Future releases will comply with the ATA/ATAPI-6 and ATA/ATAPI-7 specifications. It is meant to be an up-to-date replacement for the ucsc-smartsuite and smartsuite packages, and is derived from that code.
Outwit is a suite of tools based on the Unix tool design principles allowing the processing of Windows application data with sophisticated data manipulation pipelines. The outwit tools offer access to the Windows clipboard, the registry, the event log, relational databases, document properties, shell links, and the event log.
The TeleAuth Client Tools are a set of Unix tools for the TeleAuth two-factor/two-channel authentication system. This includes a commandline client and a set of PAM modules. It also enables out-of-the-box two-factor authentication on Linux, Mac OS X, and Windows machines. These tools can be used to integrate Web sites, VPNs, and other network services with TeleAuth. They are primarily written for the free Public TeleAuth Server.
Weplab is a tool to review the security of WEP encryption in wireless networks from an educational point of view. Several attacks are available, so it can measure the effectiveness and minimum requirements of each one. Currently, weplab supports several methods, and it is able to crack the WEP key from 600,000 encrypted packets.