IlohaMail is a light weight, feature rich webmail program written in PHP. It's released under the General Public License and available at http://www.ilohamail.org. The version I installed was version 0.8.12-stable.
The ease of setup alone makes IlohaMail a mail solution worth investigating. While not very customized, a basic installation can be achieved simply by unzipping the source's tarball and copying the code directory to a web-accessible location! IlohaMail comes with it's own custom IMAP/POP library so no c-client installation or PHP recompile are needed.
IlohaMail supports sending and receiving attachments and strives to handle mail in an RFC822 compliant manner. It hosts a slew of additional features as well, such as support for over 20 languages, multiple sender identities, aspell-based spell check and a calender. More features are under development, such as support for themes and GnuPG encryption.
The myriad of configuration options are found in the files located in the conf/ directory. An administrator can set default values, the fields to display on the login page, whether or not to use a MySQL backend, spam options to prevent a user from using IlohaMail to disseminate bulk emails and more.
The downside of IlohaMail is that it is still considered in the beta stages of development, though the web site claims to have at least one wide-spread commercial deployment. Documentation primarily exists in the form of commented source code and a discussion forum and a growing DocBook can be found at the project's website.
Though still beta, IlohaMail provides a sleek, efficient web-base email solution. It's mission, to be a "compact, skeletal solution that will work off the bat on Joe's $9.95/month hosted server and provide everything he needs, yet capable of scaling up to meet the requirements of a large scale corporate deployment," has been accomplished superbly.
DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.