Magnolia is a CMS which delivers smartphone simplicity on an enterprise scale. The mobile-inspired HTML5 user interface works through customisable, task-focused Apps, a notification stream called the Pulse, and a system of Favorites for quickly accessing the workspace. Magnolia allows organizations to orchestrate online services, sales, and marketing across all digital channels, maximizing the impact of every touchpoint. Magnolia’s Open Source technology, support of open standards such as CMIS and JCR, and integration with the Spring Framework enable developers to unlock backend systems and third-party applications. Magnolia is used in more than 100 countries across the world by governments and leading FORTUNE 500 enterprises.
Trojan scan is a simple shell script that allows for simple but relatively effective checking for trojans, rootkits and other malware that may be using your server and network for unwanted (and possibly illegal) purposes. It works by listing all processes that use the Internet with the lsof command (using -Pni flags). This list is then transformed into signatures in the form of process_name:port_number:user. These signatures then are matched against the allowed process defined in the configuration. If any signatures of running processes are found that do not match the allowed signatures, an email report is sent including ps, ls, and optional lsof output.
cw is a non-intrusive real-time ANSI color wrapper for common Unix-based commands. It is designed to simulate the environment of the commands being executed, so that if a person types 'du', 'df', 'ping', etc. in their shell it will automatically color the output in real-time according to a definition file containing the color format desired. It has support for wildcard match coloring, tokenized coloring, headers/footers, case scenario coloring, command-line- dependent definition coloring, and includes over 50 pre- made definition files.
ICPLD (Internet Connection Performance Logging Daemon) is a connection monitor that sends ICMP requests to IP addresses of your choice and monitors if your machine has a working network connection. It logs failed attempts to reach the hosts, and will stamp a log as soon as a reply is received. It keeps track of when and for how long the connection was unavailable and records both total down time and each occasion of interrupted connection. It supports IPv6 and can execute a command whenever a connection goes up or down, which is useful for alerting users.