Warning! No encryption!
The tools here are some other utilities for data transfer etc. There is usually no encryption or compression or anything.
The tools are developed under Linux with
ESR's paradigm
release early, release often
in mind.
So you can consider this beta software, or alpha, or pre-alpha, or even worse ;)
Have a look in the download directory for all downloads.
As everything here, all you get is the source. No binaries here.
*NEW* 2004-01-04: Support for Unix sockets added, can interconnect 2 sockets now.
Accept is a simple TCP connector/receptor for data transfer via TCP.
(download latest version)
If you look for something more powerful, perhaps have a look into:
D. J. Bernstein's
ucspi-tcp,
especially tcpserver and tcpclient.
There are also:
tcpcon (TCP/UDP/PTY),
netcat (TCP/UDP),
socket and
netpipes (read the ssh examples there).
CFP will become a Content Filtering http-Proxy
(download latest version)
This is pre alpha code. It is inetd driven and does not yet filter anything. However it can do
GET/HEAD/POST/CONNECT and has some limited ftp:// support (with help of shell).
As a goodie there is an old source code of my inetd based port forwarder in the archive, too.
xml2sql-v is a quick and dirty XML to SQL converter
(download latest version)
to transform any XML file into INSERT statements into two SQL tables.
This is beta code.
It is based on expat and thus outputs UTF-8 characters.
Accompaning there are 3 quick'n'dirty utilities:
Note that Latin1 is also known as ISO-8859-1, which is the first codepage of ISO/Unicode and thus UTF-8, too.
A little patch for ShellInABox version 1.0beta-24Jun01:
This patch skips one frequent HTTP-request when it's not neccessary and installs a little IO-counter in the configuration dialog.
Note that shellinabox runs fine under HTTPS with a BasicAuth Web Password Protection in the directory, too.
This nicely protects agains playing kids and makes line sniffing a hard job (it's possible, though, as ShellInABox has no builtin
own encryption and the data packets are quite short, thus are weak against dictionary attacks).
If you have a partly defective hard drive then DiskImg
(download latest version) is for you.
This is alpha code as it was not thoroughly tested.
With this hopefully you can take an image of the rest of all readable sectors before
the drive fails completely.
However currently you are on your own how to go further with this image.
Perhaps you will write it to another drive with dd or make an nbd drive of it?
This utility is easy to use and can write a log of all defects it finds.
It's currently only useful for medias with 512 byte sectors.
After writing diskimg (because I did not find anything) I stumbled across recoverdm, which features low level (raw) IO to read a part of defective sectors on CD/DVD.
I hacked sslwrap210 (found in SuSE8.2) to allow SMTP user authentication with PAM
(download latest version).
The generic source password_verify.c within this archive I hereby dedicate into the Public Domain.
It does a simple PAM based password verification.
With this routine it should be fairly easy to just verify a user via PAM.
More is on the new tools page.
This is free software according to the GNU GPL.
Copyright (C)2000-2003 by Valentin Hilbig
Note that the software comes with absolutely no warranty of any kind.