This is a staging site. Uploads will not persist. Testing only.
Combined CD Player + Mixer designed for WindowMaker

wmrack

Combined CD Player + Mixer designed for WindowMaker

This dockapp combines a CD player and a mixer in one 48x48 window. Very efficient on screen real-estate. Especially handy if you mainly want a mixer, and only rarely use a CD player, but want to have one around just in case.
network packet generator and capture tool

packit

network packet generator and capture tool

Packit (PACket toolKIT) is a network auditing tool. It uses libpcap and can make real packages (frames) that are able to travel in a network. Packit also allows one to add personalized payloads. Other good feature is the possibility to read dump files created by tcpdump.
Debian Edu Xfce desktop applications

education-desktop-xfce

Debian Edu Xfce desktop applications

This metapackage depends on various Xfce components that are useful for teachers and their students.
Selected three lines. They are dumped to stdout on exit.

iselect

ncurses-based interactive line selection tool

iSelect is an interactive line selection tool, operating via a full-screen Curses-based terminal session. It can be used either as an user interface frontend controlled by a Bourne-Shell/Perl/Tcl backend as its control script or in batch mode as a pipeline filter (usually between grep and the final executing command).
fast interactive 2D plotter and data viewer

quickplot

fast interactive 2D plotter and data viewer

A 2-D plotter with infinite zooming, value picking, pipe input, and unlimited plots displayed. Quickplot is meant for looking at your data quickly and of secondary importance is making static pictures of your data. It is a data viewer, not a plot editor. It reads ASCII text and sound files. It has lots of command line options, making it very shell script friendly.
plain text watermarking and watermark recovery

snowdrop

plain text watermarking and watermark recovery

Snowdrop provides reliable, difficult to remove steganographic watermarking of text documents (internal memos, draft research papers, advisories and other writing) and C sources (limited distribution software, licensed software, or freely available code) so that: (1) leaks can be identified if the data goes public. (2) original source can be determined and demonstrated if part of the document is claimed by somebody else, copied without permission, etc. Snowdrop uses redundant steganography using four different logical channels, and should be proof to many modifications, including reformatting, spell checking and so on.