tkbiff allows arbitrary commands to be executed upon mail reception. If you like programs such as xbiff and xbiff++ but wish they were more flexible, then you'll like tkbiff. Unlike other biffs, tkbiff is fully customizable. tkbiff also doesn't waste your valuable screen space with icons; instead, it shows you the mail itself. It supports UNIX, Mac, and Windows, IMAP, POP, and UNIX-style mail files, and SSL and APOP.
BitTorrent is a tool for copying files from one machine to another. FTP punishes sites for being popular. Since all uploading is done from one place, a popular site needs big iron and big bandwidth. With BitTorrent, clients automatically mirror files they download, making the publisher's burden almost nothing.
Platform Independent Petri Net Editor (PIPE) creates and analyses Petri Nets quickly, efficiently, and effectively. A key design feature is the modular approach adopted for analysis, enabling new modules to be written easily and powerfully, using built-in data layer methods for standard calculations. Six analysis modules are provided, including Invariant Analysis, State-Space Analysis (deadlock, etc.), and Simulation Analysis and Classification. PIPE adheres to the XML Petri net standard (PNML). The file format for saving and loading Petri Nets is extensible through the use of XSLT, the default being PNML.
The sigslot library is a portable, type-safe, thread-safe implementation of the signal/slot paradigm written entirely as a C++ template library. No preprocessor is required. The library can coexist with other C++ libraries, notably the Microsoft Foundation Classes (MFC), adding Qt-like functionality to any suitably instrumented classes. The library should work fine with any reasonably standards compliant C++ compiler that supports the STL and templates with optional template parameters. Partial template specialisation is NOT required.
uvlan is a User-space Virtual Local Area Network. In other words, uvlan peers act as nodes on a network switch. Ethernet traffic is routed between peers intelligently. This allows for multiple networks to share resources and even IP address space. Some may call it a VPN (Virtual Private Network) application, but it's much more powerful: it is peer-to-peer, is much simpler, and operates at layer 2 (ethernet). VPNs generally operate at layer-3 (IP), and layer 2 applications like gaming can't be supported with layer 3 tunneling.