Description
-----------
Net::Telnet allows you to make client connections to a TCP port
and do network I/O, especially with a port using the TELNET
protocol. Simple I/O methods such as print, get, and getline are
provided. More sophisticated interactive features are provided
because connecting to a TELNET port ultimately means communicating
with a program designed for human interaction. Some interactive
features include the ability to specify a timeout and to wait for
patterns to appear in the input stream, such as the prompt from a
command interpreter.
The Network Time Protocol (NTP) is used to synchronize the time of a
computer client or server to another server or reference time source,
such as a radio or satellite receiver or modem.
It provides client accuracies typically within a millisecond on LANs
and up to a few tens of milliseconds on WANs relative to a primary
server synchronized to Coordinated Universal Time (UTC) via a Global
Positioning Service (GPS) receiver, for example.
Typical NTP configurations utilize multiple redundant servers and diverse
network paths, in order to achieve high accuracy and reliability.
Some configurations include cryptographic authentication to prevent
accidental or malicious protocol attacks.
See homepage for more infos:
Socketpipe connects over a TCP/IP socket a remote command to a local
input generation command and/or a local output processing command.
The connection is made by redirecting the input/output file descriptors
to the socket. This saves the context switching and data copying
overhead associated with piping data through ssh(1) or rsh(1).
Socketpipe must be installed on both machines and user authentication
is still performed by a command like ssh(1) or rsh(1). The
confidentiality and integrity of the data in transit is not protected
against mallicious attacks; the command is designed for use in a
trusted LAN environment.
Uplog is an UDP-based ping program that gives an ASCII
graphical log of packet loss. Once per second, it sends a UDP
packet to the echo port of the target host and waits for a
reply. If it gets a reply an X is written, otherwise a dot is
written to the log file. If a packet with an incorrect sequence
number arrives, a colon is written to the log file. By
examining the log file, one can easily see when and how the
packet losses occur.
GNU Zebra is a free software (distributed under GNU Generic Public
License) which manages TCP/IP based routing protocols.
It supports BGP-4 protocol as described in RFC1771 (A Border Gateway
Protocol 4) and RIPv1, RIPv2 and OSPFv2.
Zebra uses multithread technology under multithread supported UNIX
kernels. However it can be run under not-multithread supported
UNIX kernels.
Zebra is intended to be used as a Route Server and a Route Reflector.
Zebra is not a toolkit, it provides full routing power under a new
architecture.
This is is a set of Python bindings for the scrypt key derivation function.
Scrypt is useful when encrypting password as it is possible to specify a
minimum amount of time to use when encrypting and decrypting. If, for example,
a password takes 0.05 seconds to verify, a user won't notice the slight delay
when signing in, but doing a brute force search of several billion passwords
will take a considerable amount of time. This is in contrast to more
traditional hash functions such as MD5 or the SHA family which can be
implemented extremely fast on cheap hardware.
Intel's Active Management Technology is a simple embedded subsystem
that helps you manage remote servers. In particular you can power off
or reset a remote system, regardless of the state of the operating
system.
amtc is a tool to efficiently monitor, power-control on a scheduled
basis and interactively manage a bigger bunch of PCs equipped with
Intel vPro technology, distributed over several rooms. Having a
practical tool for this purpose massively eases system management
procedures, from scheduled, unattended OS-re-installs to individual,
interactive remote power management needs.
geomWatch is a program for monitoring the well-being of GEOM providers and ZFS
pools. It checks the state of each configured provider and pool at a configured
interval, and, if it notices that a component has been lost, or encounters a
problem during the check, it will send an e-mail with details of the matter--
such as what components were lost and which remain, or, in the event of a
problem, what the problem was--to an arbitrary number of recipients, so that
corrective action can be taken (for example, replacing a failed disk).
-Boris Kochergin <spawk@acm.poly.edu>
stress is a tool which imposes a configurable amount of CPU,
memory, I/O, or disk stress on a POSIX-compliant operating
system. It is written in portable ANSI C, and uses the GNU
Autotools to compile on a great number of UNIX-like operating
systems.
stress is not a benchmark. It is a tool used by system
administrators to evaluate how well their systems will scale,
by kernel programmers to evaluate perceived performance
characteristics, and by systems programmers to expose the
classes of bugs which only or more frequently manifest
themselves when the system is under heavy load.
The symon project consists of three parts; a data monitor, a data consolidator
and a data displayer.
symon is a is a lightweight system monitor that measures cpu, memory, pf,
interface and disk statistics every 5 seconds. It sends this data on to symux
for further processing. symon has been designed to inflict minimal performance
and security impact -- it can be run as nobody on the system it monitors.
symux is a non-privileged daemon that listens to incoming symon traffic. symux
can write the incoming symon streams into rrd files. Clients interested in
monitoring machine state can also log into symux and receive data as ascii as
it arrives.