Arrow is an elegant, powerful, graphical interface to electronic mail. This is not just another single window mail reader. Instead, it displays each mailbox and message in a separate window, thereby allowing one to simultaneously open as many mailboxes and view and compose as many messages as one wishes. This paradigm also allows one to drag-and-drop text between messages and organize ones mail by dragging messages between mailboxes.
Beonex Communicator is Mozilla polished for end users. It contains Navigator, Mailnews, Composer, and ChatZilla. Navigator has support for key web standards and a convenient interface. For example, it eases searching the Internet, similar to Apple's Sherlock on Macintosh. The Bookmark Manager can deal with huge collections of bookmarks and allows you to overview and sort them while you are surfing. If you want, you can track the latest headlines or webcams using the Sidebar. The Mailnews client supports multiple IMAP, POP3 and/or news accounts for each user, so you can download and manage all your email from various accounts in one place and store them on your computer or the server. Beonex puts a strong emphasis on security, privacy, and netiquette, to protect the private or confidential information on your computer and to encourage fairness.
BrowserExpress is a Web-based e-mail client. BrowserExpress provides a Web browser interface to any mail server, giving all your users Web-based e-mail from any Web browser. The BrowserExpress interface is fully customizable to support your branding, banner advertisements, and language choice. BrowserExpress implements POP3, SMTP, LDAP, and MIME standards.
Ebola is used as a bridge between AV engines (e.g., Sophos) and scanning scripts (e.g., Inflex and AMaViS) to provide much-improved performance by handling file scanning requests on behalf of the scripts while keeping a SINGLE session of the AV engine open, rather than restarting one each time.
Email Security through Procmail (the Procmail Sanitizer) provides methods to sanitize email, removing obvious exploit attempts and disabling the channels through which exploits are delivered. Facilities for detecting and blocking Trojan Horse exploits and worms are also provided.