Trojan scan is a simple shell script that allows for simple but relatively effective checking for trojans, rootkits and other malware that may be using your server and network for unwanted (and possibly illegal) purposes. It works by listing all processes that use the Internet with the lsof command (using -Pni flags). This list is then transformed into signatures in the form of process_name:port_number:user. These signatures then are matched against the allowed process defined in the configuration. If any signatures of running processes are found that do not match the allowed signatures, an email report is sent including ps, ls, and optional lsof output.
se is a screen-oriented version of the classic UNIX text editor ed. The editor implements many of the commands of ed, but instead of being line-oriented, se is screen-oriented. The command syntax is very familiar to users who already know ed. If you get stuck, there is a built-in help system that describes many of the available commands. Many configurable options can be loaded from a .serc file. se can be run interactively or in a script via the included scriptse utility. The editor is portable across many platforms, supporting major Linux and BSD distributions as well as other systems like GNU, Minix, Haiku, OpenSolaris, and Cygwin.
fakechroot provides a fake chroot environment to programs. A fake chroot allows you to run programs which require root privileges on an unprivileged user account. For example, you can create a Debian bootstrap or a development environment and build packages inside a chroot'ed system using a standard non-root user account. You can then use the apt-get command to install other packages without root privileges.