Trojan scan is a simple shell script that allows for simple but relatively effective checking for trojans, rootkits and other malware that may be using your server and network for unwanted (and possibly illegal) purposes. It works by listing all processes that use the Internet with the lsof command (using -Pni flags). This list is then transformed into signatures in the form of process_name:port_number:user. These signatures then are matched against the allowed process defined in the configuration. If any signatures of running processes are found that do not match the allowed signatures, an email report is sent including ps, ls, and optional lsof output.
cw is a non-intrusive real-time ANSI color wrapper for common Unix-based commands. It is designed to simulate the environment of the commands being executed, so that if a person types 'du', 'df', 'ping', etc. in their shell it will automatically color the output in real-time according to a definition file containing the color format desired. It has support for wildcard match coloring, tokenized coloring, headers/footers, case scenario coloring, command-line- dependent definition coloring, and includes over 50 pre- made definition files.
ICPLD (Internet Connection Performance Logging Daemon) is a connection monitor that sends ICMP requests to IP addresses of your choice and monitors if your machine has a working network connection. It logs failed attempts to reach the hosts, and will stamp a log as soon as a reply is received. It keeps track of when and for how long the connection was unavailable and records both total down time and each occasion of interrupted connection. It supports IPv6 and can execute a command whenever a connection goes up or down, which is useful for alerting users.
fakechroot provides a fake chroot environment to programs. A fake chroot allows you to run programs which require root privileges on an unprivileged user account. For example, you can create a Debian bootstrap or a development environment and build packages inside a chroot'ed system using a standard non-root user account. You can then use the apt-get command to install other packages without root privileges.