- Aria is a download tool similar to Reget or GetRight. It downloads files from the Internet via HTTP or FTP. The transfer can be paused, resumed, queued, and saved. You can paste URLs from the clipboard, pasting as many as you want at a time. It has a friendly GTK-based GUI and useful log consoles. It supports URL list import, CRC checking, an HTTP proxy server, HTTP recursive downloads, defining specific file retrieval procedures for particular servers, and cut-and-paste.
- aria2 is a utility for downloading files. It has completely new design concept from its predecessor, Aria, and is written from scratch. aria2 has a segmented downloading engine in its core. It can download one file from multiple URLs or multiple connections from one URL. This results in very high speed downloading, much faster than ordinary browsers. This engine in was implemented in a single-thread model. The architecture is clean and easy to extend. aria2 currently supports HTTP, FTP, and BitTorrent. It also supports Metalink version 3.0.
- 'authfail' is a tool for adding IP addresses to an ACL when entities from those addresses attempt to log into a system, but cause authentication failures in auth.log. It reads data from auth.log in real time and adds the IP into netfilter with a DROP/REJECT policy.
- 'AutoScan' is an application designed to explore and manage your network. Entire subnets can be scanned simultaneously without human intervention. It features OS detection, automatic network discovery, a port scanner, a Samba share browser, and the ability to save the network state.
- Autossh is a program to monitor and automatically reestablish SSH connections. It is similar to rstunnel (Reliable SSH Tunnel), but is easier to set up and use, especially for connections to multiple hosts. The program monitors connections by using a loop of port forwardings, and will back off on the rate of connection attempts when experiencing rapid failures (such as connection refused).
- BIRD is a dynamic routing daemon for UNIX-like systems. It should support all routing protocols used in the contemporary Internet, such as BGP, OSPF, RIP, and their IPv6 variants. It also has a very flexible configuration mechanism, and a route filtering language.
- BW whois 2
- BW whois is a whois client that works as a command line tool or as a Web application. It includes configurable with self-detecting CGI support, multiple security options in the CGI mode, a mature TLD table, database caching (using MySQL), and many more options and features.
- Balance is a simple but powerful generic TCP proxy with round-robin load balancing and failover mechanisms. Its behaviour can be controlled at runtime using a simple command line syntax.
- BannerKiller is a very simple HTTP proxy that lets you filter pages by forbiding pages whose URLs match some pattern. It can be used for censorship or to filter ads, and is particularly valuable for people with slow connections who normally have to wait for banner ads to download before they can view a page. The software is no longer currently being developed; the authors suggests the program SwiftSurf in place of bannerkiller.
- 'basE91' is an advanced method for encoding binary data as ASCII characters. It is similar to UUencode or base64, but is more efficient. The overhead produced by basE91 depends on the input data. It amounts at most to 23% (versus 33% for base64) and can range down to 14%, which typically occurs on 0-byte blocks. This makes basE91 very useful for transferring larger files over binary insecure connections like e-mail or terminal lines.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.