FTPL (FakeTime Preload Library, aka libfaketime) intercepts various system library calls and tricks programs of your choice into seeing a faked system time without having to change the time system-wide. This can be used for running legacy software with Y2K bugs, testing software for year-2038 compliance, debugging time-related issues such as expired SSL certificates, and using software that ceases to run outside a certain time frame. The faked time can be specified either absolutely or relative to the real current time, and optionally also affects file timestamps. The faked clock continues to run, but can optionally be frozen, slowed down, or made faster. A wrapper script "faketime" simplifies the usage, similar to tools such as fakechroot.
ICPLD (Internet Connection Performance Logging Daemon) is a connection monitor that sends ICMP requests to IP addresses of your choice and monitors if your machine has a working network connection. It logs failed attempts to reach the hosts, and will stamp a log as soon as a reply is received. It keeps track of when and for how long the connection was unavailable and records both total down time and each occasion of interrupted connection. It supports IPv6 and can execute a command whenever a connection goes up or down, which is useful for alerting users.
Log watcher is a PHP class that polls log files and takes newly added lines to send them to a given watcher email address. Although this class can be used to poll any type of log files, it was developed with the intention to overcome a limitation of the PHP error trapping system that is not able to capture certain types of errors during script execution, like script parsing errors or form file uploading failures. It is meant to be used from cron-like task schedulers to poll log files regularly. The email notification message can be composed from text templates. The message delivery function can be replaced by custom functions like the urgent mail function that can be faster for delivering critical messages.
picocom is a minimal dumb-terminal emulation program. It is ideal for embedded systems since its memory footprint is minimal (less than 20K, when stripped). Apart from being a handy little tool, the source distribution includes a simple, easy to use, and thoroughly documented terminal-management library.
Kernel Security Checker is a useful tool to locate attackers residing within a system by employing a direct analysis of the kernel through /dev/kmem and bypassing the hiding techniques of the intruder (kernel static recompilation or use of LKMs). It can find the modified syscalls from userspace, detect the promiscuous interfaces, and find the modifications applied to a protocol.