dFlex is a meta-directory application: a set of applications to be used for LDAP directory replication and directory data mapping and translation. It is designed as a simple and flexible framework to provide heterogenous directory data synchronization. It was originally written for a specific directory environment, and preconfigured for common tasks of replication in that environment. However, it can be easily configured to match replication, synchronization, and data mapping needs of a wide variety of directory systems and configurations.
Vortex Library is an implementation of the RFC 3080 and RFC 3081 standard definitions, known as the BEEP Core protocol, implemented on top of the TCP/IP stack. It comes with complete XML-RPC over BEEP RFC 3529 support, complete support for the TUNNEL profile (which allows you to perform proxy operations for every BEEP profile developed), support for HTTP proxies, and more. The API is consistent, easy to use, and allows you to write application protocols very quickly. The API is designed to allow bindings for other languages to be built easily.
PasswordNotify was written to solve a long-standing need of ActiveDirectory and OpenLDAP administrators. It simply queries your LDAP server once a day and notifies a user when their password is about to expire. It is highly customizable, and runs as either a Unix cron job or a Windows service.
Snort is a network intrusion detection and prevention system. It is the most widely deployed technology of its kind in the world. It performs detection using a variety of methods including rules-based detection, anomaly detection, and heuristic analysis of network traffic. Its rules language is open source and available to the public as well.
Galet is a peer-to-peer application which primarily aims to provide easy-to-setup, secure communication channels between the computers of people who know and trust each other. Its secondary goal is to create a public network based on these channels. No direct connections occur between two nodes that have not been explicitly accepted by the users of these nodes. This makes the network very difficult to censor, as an attacker's direct access to the network is limited.