- 1HS SMTP1
- 2Infinite MLM Software89
- 4InterBase Data Access Components7
- 5PeaZip for Linux120
- 6HS X.25 and RFC1613 XOT C Source Library17
- 7LinkAssistant Professional13
- 8IDAutomation OCR Font Advantage Package5
- 9SecureFX for Linux4
- 10VPN Unlimited for Linux 64bit6
- 11ABCMachOneMessenger News Ticker FX1
- 12Free Calendar Software Professional11
- 14Nicomsoft OCR9
- 15LiveCyberCash Video Chat Software12
YTalk is a compatible replacement for the Unix talk(1) program, which adds a number of features. Mainly, it can talk to more than one person at a time, and it can the two different types of talk daemons out there. To install this commands are usefull: ./configure make make install YTalk was written and maintained by Britt Yenne up to verison 3.0pl2. That version was released years ago, and there have been no new releases since then, so I (Roger Espel Llima, ) have taken up maintenance, updating the code to work with newer Unixes, fixing bugs and adding new features. YTalk is free software, which can be freely redistributed, used and modified as long as the copyright notices are kept in the source and header files..Ytalk - Unix Talk - Unix - Compatible - New - Program - Chat - Communications
Jtalk is a Jabber client that provides an interface somewhat similar to the historic Unix Talk system. Jtalk is distributed under the terms of the GNU General Public Licence. Note: jtalk is not a full-featured Jabber client.
DateAug 22, 2010
AfterStep is a window manager for the Unix X Window System. Originally based on the look and feel of the NeXTStep interface, it provides end users with a consistent, clean, and elegant desktop.
DateSep 29, 2010
Wsh, "Web Shell" is a remote UNIX/WIN shell, that works via HTTP/HTTPS.
DateOct 13, 2010
lpr-bash is a replacement for the "lpr" command found in lpr(ng), CUPS, and other Unix printing systems. lpr-bash is implemented as a shell script.
DateNov 3, 2010
BruteBlock project allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attackers IP address into ipfw2 table effectively blocking them.
DateSep 17, 2010