- 8Interactive Decompiler80
- 10Network Management Tool10
- 13Download Slave18
- 14Printer Tools - PRN2FILE437
- 15Debian GNU/Linux11
- 2HybridJava Compiler7
- 5CrossUI RAD Desktop - Linux3250
- 6CloudView NMS60
- 7Infinite MLM Software72
- 8PeaZip for Linux100
- 9EasyXLS for Java23
- 10Ganib - Project Management Software22
- 12Font MICR BankenScribe25
- 13Tiny Mp3 Player38
- 15Kaldin | Online examination software51
YTalk is a compatible replacement for the Unix talk(1) program, which adds a number of features. Mainly, it can talk to more than one person at a time, and it can the two different types of talk daemons out there. To install this commands are usefull: ./configure make make install YTalk was written and maintained by Britt Yenne up to verison 3.0pl2. That version was released years ago, and there have been no new releases since then, so I (Roger Espel Llima, ) have taken up maintenance, updating the code to work with newer Unixes, fixing bugs and adding new features. YTalk is free software, which can be freely redistributed, used and modified as long as the copyright notices are kept in the source and header files..Ytalk - Unix Talk - Unix - Compatible - New - Program - Chat - Communications
Jtalk is a Jabber client that provides an interface somewhat similar to the historic Unix Talk system. Jtalk is distributed under the terms of the GNU General Public Licence. Note: jtalk is not a full-featured Jabber client.
DateAug 22, 2010
AfterStep is a window manager for the Unix X Window System. Originally based on the look and feel of the NeXTStep interface, it provides end users with a consistent, clean, and elegant desktop.
DateSep 29, 2010
Wsh, "Web Shell" is a remote UNIX/WIN shell, that works via HTTP/HTTPS.
DateOct 13, 2010
lpr-bash is a replacement for the "lpr" command found in lpr(ng), CUPS, and other Unix printing systems. lpr-bash is implemented as a shell script.
DateNov 3, 2010
BruteBlock project allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attackers IP address into ipfw2 table effectively blocking them.
DateSep 17, 2010