Big Brother is a combination of monitoring methods. Unlike SNMP where information is just collected and devices polled, Big Brother is designed in such a way that each local system broadcasts its own information to a central location. Simultaneously, Big Brother also polls all networked systems from a central location. This creates a highly efficient and redundant method for proactive network monitoring.
Zenoss is an enterprise network/systems management application that provides an integrated software package for monitoring availability, performance, events, and configuration across layers (network, servers, applications, environment, etc.) and across platforms (Linux, Windows, Unix, etc.).
smartmontools contains utilities that control and monitor storage devices using the Self-Monitoring, Analysis, and Reporting Technology (S.M.A.R.T.) system built into ATA and SCSI hard drives. This is used to check the reliability of the hard drive and to predict drive failures. Version 5.x is designed to comply with the ATA/ATAPI-5 specification. Future releases will comply with the ATA/ATAPI-6 and ATA/ATAPI-7 specifications. It is meant to be an up-to-date replacement for the ucsc-smartsuite and smartsuite packages, and is derived from that code.
Lire is a pluggable log analyzer. It has analyzers for over 25 log file formats, ranging from Apache WWW log files to iptables firewall logs and CUPS printing logs. Reports are generated in 9 different output formats, ranging from Excel 95 to PDF to HTML, optionally with included graphs.
Logrep is a secure multi-platform tool for the collection, extraction, and presentation of information from various log files. It features HTML reports, multi-dimensional analysis, overview pages, SSH communication, and graphs, and supports 25 popular systems including Snort, Squid, Postfix, Apache, Sendmail, syslog, iptables/ipchains, xferlog, NT event logs, Firewall-1, wtmp, Oracle listener, and Pix.
Lepton's Crack is a generic password cracker. It is easily-customizable with a simple plugin system and allows system administrators to review the quality of the passwords being used on their systems. It can perform a dictionary-based (wordlist) attack as well as a brute force (incremental) password scan, including the use of regular expressions. It supports standard MD4 hash, standard MD5 hash, NT MD4/Unicode, Lotus Domino HTTP password (R4), and SHA-1 hash formats. LM (LAN Manager) plus appending and prepending of characters is available in the Development branch (strongly recommended).
MIB Smithy SDK is a dynamic extension to Tcl/Tk (8.4+) that allows development of custom scripts for controlling SNMP agents, manipulating SMI definitions, doing conversions, and more. It is based on the core of Muonics' MIB Smithy, and the SDK supports SMIv1 and SMIv2, as well as SNMPv1/v2c/v3 with HMAC-SHA-96 and HMAC-MD5-96 authentication and DES/CBC and AES128/CFB privacy. It also provides complete read-write access to all elements of SMI/MIB Module definitions, unlike similar extensions that provide only read access to a limited subset. The SDK allows multiple discrete SMI databases and SNMP sessions, and provides all of the built-in validation and error recovery capabilites of the full product, without the visual MIB development environment.
BleachBit deletes junk to recover disk space and maintain privacy. It rids your system of old junk including cache, Internet history, temporary files, unused locale files (better than localepurge), logs, and cookies. Designed for Linux systems, it wipes clean 50 applications including Adobe Reader, Bash, Firefox, Flash, OpenOffice.org, Opera, Real Player, Skype, and more. It shreds files so that they cannot be recovered, and it wipes free disk space to hide insecurely deleted files. It offers both a simple PyGTK GUI and a command line interface for automation.