hwloc provides command line tools and a C API to obtain the hierarchical map of key computing elements, such as: NUMA memory nodes, shared caches, processor sockets, processor cores, and processor "threads". hwloc also gathers various attributes such as cache and memory information, and is portable across a variety of different operating systems and platforms. hwloc primarily aims at helping high-performance computing (HPC) applications, but is also applicable to any project seeking to exploit code and/or data locality on modern computing platforms.
Harm acts as a four-way socket redirector that allows you to effectively make a TCP connection from the Internet to a host behind a Linux masquerade-style firewall. The server (behind the firewall) makes connections to the client (on the Internet). After a successful connection, it will bounce packets from a telnet client (Windows and Linux) to the Harm client, to the Harm server (Linux only), or to the telnet daemon behind the firewall.
HashCash is an anti-spam, anti-DoS system for email. The concept centers around the sender of the mail completing a computationally expensive task (in this case, generating hash collisions) that the recipient can verify very quickly. This allows the sender to "pay" for transport in CPU cycles, creating artificial scarcity. Programs are included to add payment to messages (for the sender) and to verify message payment (for the recipient).
HashCatalog is a program that can find duplicate files in one or more folders or between two lists of one or more folders. HashCatalog supports a regular expression mask to select files to be evaluated for duplicates. HashCatalog will always recurse directories in search of files. HashCatalog can also create an XML file containing a listing of files, along with enough information to be able to determine duplicates. This XML file can be used to allow searches for duplicates against removable media. The catalog can be supplied to the list of search locations, along with individual files and folders. The hash methods supported are: MD5, SHA, SHA1, SHA256, SHA384, and SHA512.
Haskell IDoc extracts interface documentation and declarations from Haskell modules based on standard Haskell layout rules and a small number of clues that the programmer embeds in interface comments. These clues have been designed to be visually non-imposing when displaying the source in a text editor. Interface documentation is rendered in standard markup languages. IDoc has been designed to be simple to use and install.