Browse Definitions:

Linux freeware and shareware guide

Here you'll find a number of useful tools that can be used as is or customized to create your own tools.

Have you come across freeware that we don't have listed here? Shoot us an e-mail, and we'll add it to the library. Don't forget to bookmark this page, as it will be updated frequently.

Please note: We've separated the resources into two different categories, shareware and freeware.

   Data management
   Miscellaneous gadgets
   Web development

[ Return to Table of Contents ]


  • CrashMail II: A Fidonet tosser that can handle JAM and *.msg, and has a built-in AreaFix.

  • kAntiSpam: With this utility no one can send e-mail to a kAntiSpam account without being approved.

  • MailMan: Send and receive Internet e-mail from any Web browser.

  • Shareware

  • Advanced Web Ranking: Query over 130 search engines and find out if you're moving up or down in the rankings.

  • Cross-Desktop: An integrated Web based e-mail client, file explorer and RSS reader.

  • UliCampaigner Pro: A full-featured, Web-based eCampaign management program.

  • NetAuth: With this utility you'll be able to create and manage your own e-mail accounts.

  • Data management
    [ Return to Table of Contents ]


  • Mimer SQL TAR Engine: This database solution conforms to international ISO SQL standards.

  • SQLyog Job Agent (SJA): Use this graphical tool to manage your MySQL database anywhere in the world.

  • Shareware

  • Recital Linux Developer Personal Edition: This database provides language and data compatibility with FoxPro, FoxBASE and Clipper.

  • Language
    [ Return to Table of Contents ]


  • ActiveTcl: This is a distribution of Tcl for Linux, Solaris, HP-UX and Windows.

  • Euphoria: A programming language.

  • JProbe Profiler: Helps developers diagnose performance bottlenecks in Java code.

  • Perl: Scans arbitrary text files, extracts information from those text files and prints reports based on that information.

  • REBOL/core: A messaging language that spans more than 20 platforms.

  • Ruby: An interpreted scripting language for object-oriented programming.

  • SDCC: An optimizing ANSI-C compiler.

  • XML for C++: XML for C++ parser is a validating XML parser written in a portable subset of C++.

  • Shareware

  • Shutdown Now: This is a Linux GUI shutdown utility that can be accessed from any shortcut.

  • Tcl Dev Kit: This package extends and updates the tools found in TclPro.

  • Miscellaneous gadgets
    [ Return to Table of Contents ]


  • AceaXe Plus: Linux emulator

  • VICE: Linux emulator

  • MZL & Novatech Traffic Statistics Linux Server:Allows you to view Linux server network usage information.

  • WeatherBug: Keeps you abreast of the latest weather conditions.

  • Shareware

  • Readerware: Catalog your books, music and videos.

  • Framsticks Theater: An application which illustrates some basic phenomena, like genes and genetics.

  • RunDNS: A stand-alone DynDNS DDNS client.

  • Vypress Chat: An application for real-time chatting in small or home office local networks.

  • Security
    [ Return to Table of Contents ]


  • Autonice: A Perl script intended for multi-user systems.

  • BitDefender: A virus defense solution designed for Linux systems.

  • Fortify: Provides 128-bit cryptography to users of Netscape Navigator and Communicator.

  • FrazierWall: A firewall utility for Linux.

  • Logi.Crypto: A pure-Java package for strong encryption.

  • MPP Free Edition: For users of SpamAssassin and ClamAV with Sendmail, QMail, Postfix, CGPro or SurgeMail e-mail servers.

  • Panda Antivirus: An antivirus for Linux servers and desktops.

  • R-Linux Data Recovery: A data recovery software tool.

  • SecureCentral PatchQuest: Automated patch management software.

  • Topsecret: Encrypt files with the aid of a catalyst, which you can create and modify.

  • Shareware

  • Astaro Network Security: Protect your organization against threats to your system.

  • Easy3DESCrypt: This is a file encryption tool.

  • Secret Keeper: This utility securely stores and retrieves log-in information.

  • Web development
    [ Return to Table of Contents ]


  • Bitmap Garamond: A set of text fonts designed for use in Web browsers.

  • MSCBlob: An auxiliary component for data blocks storing and transmitting.

  • Linux file splitter: Full graphical user-interface.

  • MM3-WebAssistant - Proxy Offline Browser: The proxy offline browser archives all web pages you have visited online.

  • Shareware

  • WireFusion: Create advanced interactive presentations for the Web.

  • openadaptor: A Java/XML-based software platform.

  • MSCUpload: This program allows Web developer to receive forms with multiple files from user.

  • BugHotel: A hotel booking that uses the Internet to network your office.

  • Grendel Ad Server Lite: An ad serving system.

  • MSCCrypto: A collection of encryption and hashing algorithms.

  • MSCPack: A collection of Miraplacid Scripting Components.

  • Deluxe Menu: Allows professional and amateur Web developers to create navigation systems.

  • This was last updated in September 2005

    Start the conversation

    Send me notifications when other members comment.

    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

    Please create a username to comment.


    File Extensions and File Formats

    Powered by:


    • smart contract

      A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

    • risk map (risk heat map)

      A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

    • internal audit (IA)

      An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...


    • evil maid attack

      An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

    • Common Body of Knowledge (CBK)

      In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

    • rootkit

      A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...


    • value-based healthcare

      Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

    • health informatics

      Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

    • clinical trial

      A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...


    • crisis communication

      Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

    • Zerto

      Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

    • crisis management plan (CMP)

      A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...


    • cache memory

      Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

    • RAID 10 (RAID 1+0)

      RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

    • Red Hat OpenStack Platform

      Red Hat OpenStack Platform is a commercially supported distribution of open source OpenStack software designed to build and ...


    • hybrid hard disk drive (HDD)

      A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.