Ficl (Forth inspired command language) is an ANS Forth interpreter written in C. Unlike traditional Forths, this interpreter is designed to be embedded into other systems as a command/macro/development prototype language. Ficl provides object extensions that can be used to wrap methods and structures of the host system without altering them.
lando is a command execution system for UNIX. It allows you to run commands as a particular user from somewhere else on your network and see the output on your local machine. It supports authentication via standard /etc/passwd, shadow passwords or PAM. Access control is provided by TCP Wrappers. At present, the only client available is for Win32.
The Faq-O-Matic is a CGI-based system that automates the process of maintaining a FAQ (or Frequently Asked Questions list). It allows visitors to your FAQ to take part in keeping it up-to-date. A permission system also makes it useful as a help-desk application, bug-tracking database, or documentation system.
tn5250 is a 5250 terminal emulator, used for connecting to IBM's AS/400 (now known as eServer iSeries) midrange computers. tn5250 implements TN5250E, which means it is capable of device name selection, and printer sessions. The emulator supports color, 132 column mode, and most other features found in 5250 terminals and Client Access' 5250 emulator. While tn5250 is text-based application, a script is included to run it in an xterm properly. If you don't know what an AS/400 is, this program will probably not be of much use to you.
vines draws vines (wandering plants made up mostly of stems and leaves) on your X11 or SunView screen. By default it draws in black and white, but color options (spring and fall) are provided. The vines can grow across the top of your screen and down the side, down from the top of your screen until they reach the bottom, or start from the center and wander all over the screen forever.
Snort is a network intrusion detection and prevention system. It is the most widely deployed technology of its kind in the world. It performs detection using a variety of methods including rules-based detection, anomaly detection, and heuristic analysis of network traffic. Its rules language is open source and available to the public as well.