The goal for A-A-P is to make it easy to locate, download, and install software. Additionally, it supports making changes to a program and managing different versions that exist in the world, making it useful both for users and for developers. It uses a recipe that is similar to a Makefile, but with many enhancements, such as integrated Python script support, support for Internet access, and version control. An IDE will be provided that integrates your favorite editor, debugger, and other tools.
Linux device driver for CueCat barcode readers that supports multiple PS/2 CueCats on either the keyboard port, mouse port (without disabling the mouse) or USB port through a PS/2 -> USB adapter, or native USB CueCats. A standalone application that doesn't require the driver and also reads barcodes from a CueCat connected to a serial port through a homemade PS/2 -> serial converter is included as well. The driver separates CueCat barcode scancodes from normal keyboard or mouse scancodes, decode the barcodes, performs error-checking on them and send them in clear text through a normal character device file. NOTE : the company that created the CueCat has disappeared. CueCat readers are no longer produced or distributed.
pkgusage lists all the packages you have installed on your system, along with a number telling you how many days ago you last accessed any of the files in the package. This could be useful for cleaning out your hard drive. Pkgusage works with RPMs and Debian packages, and is written to be easily portable to other package managers as well.
The Linux User Management System allows an organization to centrally manage their Linux users. It works with all distributions of Linux and in conjunction with GeKL's KDE User Desktop Management System (UDMS). Admins can use it to create groups, import large numbers of users and establish system profiles, and easily maintain profiles.
Access Control Designer is a universal modular tool for visually designing access control policies. The user of this system depicts requirements for the designed security policy in a graphical notation based on a generally accepted security model. The tool will then generate a configuration of security mechanisms, which will be used for the implementation of the security policy. Modularity of the tool will allow users to design security policies for a lot of various environments - systems needed to have access controlled. A pluggable module API allows third-party programmers to provide ACD modules for systems and so allow users to use ACD for designing access control policies for the systems.