C-ICAP Classify is a module that allows classification (labeling) of Web pages, images, and soon video based on content. Labels are placed in HTTP headers. Any PIC-Label META tags are exported into HTTP headers. This allows for creation of very flexible filters according to rules defined by the user, using the ICAP enabled proxy's ACLs. It is not a URL filter, so implementing it with sslBump or similar proxy technologies makes it very difficult to bypass. Text classification is done using Fast Hyperspace (based on Hyperspace from CRM114) and/or a Fast Naive Bayes. Image and video (when implemented) use haar feature detection from the OpenCV library.
BGPHist is a tool that receives MP-BGP updates, decodes them, and writes them to a database for logging and monitoring purposes. It support not only Internet routes, but also these address families: IPv4 multicast, IPv4 labeled unicast, VPNv4 unicast, IPv6 unicast, IPv6 labeled unicast, VPNv6 unicast, L2VPN VPLS-VPWS, and IPv4 MVPN. It supports text output, MySQL databases, and Oracle databases. For the MySQL backend, there is also a simple PHP frontend. It could be used to monitor and log an ISP's customer activity for Internet and VPNs, as a passive BGP looking glass, or as a backend for some external monitoring and accounting system.
web2ldap is a full-featured Web-based LDAPv3 client written in Python. It is designed to run either as with stand-alone built-in Web server or under the control of another Web server with FastCGI support (e.g. Apache with mod_fastcgi). It has support for various LDAPv3 bind methods and a powerful built-in schema browser. HTML templates are supported for displaying and editing entries, and LDIF templates can be used for quickly adding new entries. A built-in X.509 parser displays a detailed view of certificates and CRLs with active links.
Collax Business Server is an all-in-one Linux server for small- and medium-sized businesses. It delivers all the important network services within a heterogeneous business environment for communication, infrastructure, compliance, groupware, and storage, all in a reliable and secure way which is easy to manage. It also provides essential security functions such as firewalling and virus and spam filtering, to protect against hacker attacks, viruses, and unsolicited email messages.
The Collax Security Gateway is a Unified Threat Management (UTM) Solution for small- and medium-sized businesses. It includes an easy to configure stateful inspection firewall, email security features including anti-spam and anti-virus, Internet access control, Internet SSL interception, Internet networking optimization tools, Internet network fault tolerance, clientless VPN technology, and remote administration.
rdesktop is an open source client for the Remote Desktop Protocol (RDP), which is used in a number of Microsoft products including Windows NT Terminal Server, Windows 2000 Server, Windows XP, Windows 2003 Server, and Windows 2008 R2 Server. rdesktop currently runs on Linux and other Unix based platforms with the X Window System.
Star is a very fast, POSIX-compliant tar archiver, maintained for more than 30 years. It saves many files together into a single tape or disk archive, and can restore individual files from the archive. It includes command line interfaces for the "tar", "Sun-Tar", "cpio", "pax", and "gnutar" command-line syntax. It includes a FIFO for speed, a pattern matcher, multi-volume support, the ability to archive sparse files and ACLs, the ability to archive extended file flags, automatic archive format detection, automatic byte order recognition, automatic archive compression/decompression, remote archives, and special features that allow star to be used for full and incremental backups. It includes the only known platform independent "rmt" server program.
Tor-ramdisk is a uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced in tor-ramdisk by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key, which may be exported and imported by FTP or SSH.