SAC performs login accounting, just like the ac program but with total, per day, per user and per tty. It also performs average usage, hourly profiling, login listing, login clipping and raw wtmp reporting as well as tons of other options. SAC supports Tacacs 3.x/4.x and most Radius accounting files.
P-Synch is a commercial password management toolkit which provides automated password synchronization, password strength enforcement, password self-reset by authenticated users, and streamlined password reset by helpdesk. P-Synch is available for both internal use as well as for Internet-based deployments in B2B and B2C applications.
Adeos Filesystem Security Scanner is an automated filesystem security scanner. It recursively walks all mounted filesystems on the local system, and attempts to identify common security concerns, such as SUID, and world-writeable files. The output is available as text or HTML, with either output type formatted in either report or list style. Text is written to stdout and may be redirected to a file, while HTML is written to a file named results.html in the local directory.
CLEX is a file manager with a full-screen user interface written in C with the curses library. It displays directory contents (including file status details) and provides features like command history, filename insertion, or name completion in order to help the user to construct commands to be executed by the shell (there are no built-in commands). CLEX is easily configurable and all its features are explained in the on-line help.
fakechroot provides a fake chroot environment to programs. A fake chroot allows you to run programs which require root privileges on an unprivileged user account. For example, you can create a Debian bootstrap or a development environment and build packages inside a chroot'ed system using a standard non-root user account. You can then use the apt-get command to install other packages without root privileges.
Mail2sh makes it possible to carry out shell commands by email. Email is sent to a particular user on your host and the commands will be carried out if the user and password given matches ones in /etc/passwd. Commands are executed with the user's privileges, and combined with a PGP module ensures a certain level of security for use. Note that the system is not natively encrypted, so use of an encryption mechanism is highly recommended for security reasons.