Since v2.04, bash has allowed you to intelligently program and extend its standard completion behavior to achieve complex command lines with just a few keystrokes. Imagine typing ssh [Tab] and being able to complete on hosts from your ~/.ssh/known_hosts files. Or typing man 3 str [Tab] and getting a list of all string handling functions in the UNIX manual. mount system: [Tab] would complete on all exported file-systems from the host called system, while make [Tab] would complete on all targets in Makefile. This project was conceived to produce programmable completion routines for the most common Linux/UNIX commands, reducing the amount of typing sysadmins and programmers need to do on a daily basis.
Murdoc is a system for documenting system management departments. All documents of a system management department can be put in Murdoc for convenient browsing and searching. It comes with several tools for creating content, like a Unix documenter (for automatically documenting Unix servers on a daily basis), a Windows documenter (for automatically documenting Microsoft Windows servers on a daily basis), and a Logbook writer (for entering logbook entries by the system administrators). A searching feature is included.
The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.
Stealth (SSH-based Trust Enhancement Acquired through a Locally Trusted Host) is a file integrity scanner. It differs from a program like Tripwire in that it does not require the use of read-only media or modifiable logs. It leaves (almost) no trace on the computer being checked. It is very difficult for intruders to detect or evade, and cannot be modified by intruders. It can be used to perform integrity checks on many computers without a heavy maintenance burden. It can be used without being installed on the target computer.