GNU Mach is the microkernel upon which a GNU Hurd system is based. It provides an Inter Process Communication (IPC) mechanism which the Hurd uses to define interfaces for implementing in a distributed multi-server fashion the services a traditional operating system kernel provides. Mach is particularly well-suited for SMP and network cluster techniques. Thread support is provided at the kernel level, and the kernel itself takes advantage of that. Network transparency at the IPC level makes resources of the system available across machine boundaries.
The GNU Hurd is the GNU project's replacement for the Unix kernel. The Hurd is a collection of servers that run on the Mach microkernel to implement file systems, network protocols, file access control, and other features that are implemented by the Unix kernel or similar kernels (such as Linux).
Ametys is a powerful Web CMS used by many institutions of higher education and government, but also industries and SMEs. It is known for its ergonomic design which promotes ease of use, its social Web functionality, and the ability to manage a large number of users. It makes content publishing accessible for the non-programmer and provides an easy editorial interface very similar to Microsoft Office applications.
Magnolia is a CMS which delivers smartphone simplicity on an enterprise scale. The mobile-inspired HTML5 user interface works through customisable, task-focused Apps, a notification stream called the Pulse, and a system of Favorites for quickly accessing the workspace. Magnolia allows organizations to orchestrate online services, sales, and marketing across all digital channels, maximizing the impact of every touchpoint. Magnolia’s Open Source technology, support of open standards such as CMIS and JCR, and integration with the Spring Framework enable developers to unlock backend systems and third-party applications. Magnolia is used in more than 100 countries across the world by governments and leading FORTUNE 500 enterprises.
Trojan scan is a simple shell script that allows for simple but relatively effective checking for trojans, rootkits and other malware that may be using your server and network for unwanted (and possibly illegal) purposes. It works by listing all processes that use the Internet with the lsof command (using -Pni flags). This list is then transformed into signatures in the form of process_name:port_number:user. These signatures then are matched against the allowed process defined in the configuration. If any signatures of running processes are found that do not match the allowed signatures, an email report is sent including ps, ls, and optional lsof output.