@1 Auto Delete deletes all files (in a specific directory) with dates older than the specified number of days. It can be useful if you have pages generated through user's input. It can be run manually from a browser, through telnet, or automatically using crontab. There are only two variables to edit - the directory, and the file age.
APAMOD is a command line tool for manipulation and extraction of VirtualHost sections in Apache's httpd.conf. It can extract a specified VirtualHost section to a file, update a specified VirtualHost section, lock the file the VirtualHost is in, extract, add, modify, delete, and comment specified lines in a VirtualHost section, extract the ServerName or the ServerAliases for any ServerAlias or ServerName, and extract all ServerNames or all ServerNames and ServerAliases.
AXIGEN is a fast, reliable and secure mail server with an open architecture. It is designed for easy management and allows full control of the email traffic from a central Web/CLI admin module. AXIGEN provides ESMTP, IMAP, and POP3 services and has been tested with standard mail clients. A special Webmail module enables email access and delivery from Web browsers. During the evaluation period, users are provided with full technical support.
Abyss Web Server X1 is a personal Web server. Despite its small footprint, it supports secure SSL connections (HTTPS), CGI/FastCGI, ISAPI extensions, server-side includes (SSI), download resuming, caching negotiation, logging, custom error pages, password protection, IP address control, URL rewriting, aliases, custom MIME types, index files, custom directory listings, anti-leeching, and bandwidth throttling. It also features an automatic anti-hacking system and an intuitive multilingual remote Web management interface.
Akeni Enterprise Instant Messaging is a messaging system that offers strong encryption and integration with Active Directory and LDAP. It also provides corporate messaging policy management through the use of public groups and role based user access rights. All messages can be logged into flat files and databases to allow for searching and auditing. The role based access right system allows the administrator to control whether users are allowed to send files, initiate chats and conferences, and to "lock down" users' contact lists.