BlueProximity helps add a little more security to the desktop. It does so by detecting a certain Bluetooth device, most likely a mobile phone, and keeping track of its distance. If it is moved away from the computer and the distance is above a certain level (no measurement in meters is possible) for a given time, it automatically locks the desktop (or starts any other shell command wanted). Once away, the computer awaits its master's return: if the device is nearer than a given level for a set time, the computer unlocks without any interaction (or starts any other shell command wanted).
Mumbles is a plugin-driven, DBus based notification system written for the GNOME desktop. Similar to libnotify notifications and Growl for Mac OS X, Mumbles aims to provide a modern notification system for the GNU/Linux desktop. It includes plugins for applications such as Pidgin, Firefox, and Thunderbird, Growl network notification support, and themes.
Uzklive is the live port of Uruzuki GNU/Linux. It contains a lot of multimedia applications, games, and networking tools. You can use Synaptic as an on-the-fly software installer and, while uzklive is running, you can use temporarily installed software. It uses the GNOME desktop environment with Woki Toki's Rico sound theme. It can also be used to install the Uruzuki GNU/Linux distribution over the network.
GPicView is a simple and fast image viewer with low memory usage. It's aimed at replacing the default image viewer of current desktop systems. Fast startup, low memory usage, and a simple user interface make it a good choice for a default viewer. It is extremely lightweight and fast with low memory usage, has a simple and intuitive interface, minimal library dependencies (only GTK+ is used), and doesn't require any specific desktop environment. It was inspired by the Windows XP image viewer and gimmage.
Gringotts is a small utility that allows you to jot down sensitive data (passwords, PINs, small files, etc.) in an easy-to-read, easy-to-access, and most of all very secure form. It lets the user choose from among eight strong encryption algorithms (RIJNDAEL-128, RIJNDAEL-256, SERPENT, TWOFISH, CAST-256, SAFER+, LOKI97, 3DES), two hashing algorithms (SHA1, RIPEMD 160), and two compression techniques (ZLib and BZip2) with four compression ratios. It allows the user to use any file or an entire floppy disk as a password, as an alternative to the usual text string.