root

Suche

Unten sind die Ergebnisse Ihrer Suche gelistet.

amavisd @linux:email:amavisd
6 Treffer, Zuletzt geändert:
f subdirs to disperse quarantine # $daemon_chroot_dir = $MYHOME; # chroot directory or undef # $db_home = "$MYHOME/db"; # $helpers_home = "$MYHOME/var"; # prefer $MYHOME clean and owned by root? # $pid_file = "$MYHOME/var/amavisd.pid"; # ... the socket name in this entry # When running chrooted one may prefer: ["CONTSCAN {}\n","$MYHOME/clamd
operation @linux:email:amavisd
5 Treffer, Zuletzt geändert:
ntine for files older than 31 days: #10 1 * * * root find /var/lib/amavis/virusmails/ -mtime +31 -exec rm {} \; #15 1 * * * root find /var/lib/amavis/tmp/ -mtime +31 -exec rm -r {} \; # oder: # 15 1 * * * root find /var/lib/amavis/ -iname "amavis-*" -mtime +31 -exec rm -r {} \; # oder: 10 1 * * * root find /var/lib/amavis/virusmails/ -mtime +31 -pri
cyrus_secure @linux:email:cyrus
5 Treffer, Zuletzt geändert:
\\ Test MECH=LOGIN: \\ station7:/ # imtest -a root -u root -m LOGIN station7.example.com -s verify error:num=20:unable to get local issuer certificate ... eted Please enter your password: C: L01 LOGIN root {6} S: + go ahead C: <omitted> S: L01 OK Us... \\ Test MECH=PLAIN: \\ station7:/ # imtest -a root -u root -m PLAIN station7.example.com -s verify
config @linux:email:cyrus
3 Treffer, Zuletzt geändert:
ue \\ ==== Testing ==== station7:/ # imtest -a root -u root -m LOGIN station7.example.com S: * OK station7 Cyrus IMAP4 v2.2.12 server ready C: C01 CAPA... eted Please enter your password: C: L01 LOGIN root {6} S: + go ahead C: <omitted> S: L01 OK Us
monitoring @linux:email:monitoring
3 Treffer, Zuletzt geändert:
o crontab: ### Postfix-Monitoring: * * * * * root /usr/local/bin/qshape.pl /var/spool/postfix/active/ > /srv/www/cgi-bin/active * * * * * root /usr/local/bin/qshape.pl /var/spool/postfix/deferred/ > /srv/www/cgi-bin/deferred * * * * * root /usr/local/bin/logtail.pl -f /var/log/mail | egre
postfix_secure @linux:email:postfix
3 Treffer, Zuletzt geändert:
===== # service type private unpriv chroot wakeup maxproc command + args # ... smtps is running at port 465** \\ smtptest -u root -a root station7.example.com -s verify error:num=20:unable to get local issuer certificate verify e
sasl @linux:email:postfix
3 Treffer, Zuletzt geändert:
ault smtp_sasl_password_maps must be read-only to root, since these maps contain the usernames and passwords to authenticate. If you run saslfinger as root access will be no problem, but saslfinger will fa... telnet test, but don't want to run saslfinger as root change permissions of smtp_sasl_password_maps so
config @linux:email:postfix
2 Treffer, Zuletzt geändert:
ct \\ === Testing === station7:/ # smtptest -u root -a root station7.example.com S: 220 station7.example.com ESMTP Example Inc. Mailserver C: EHLO exam
ssh-smtp-tunnel @linux:email:postfix
2 Treffer, Zuletzt geändert:
# 25, or if you need to start the tunnel as a non-root user, as ## OpenSSH only allows root users to start tunnels to low-numbered ## "privileged ports." If t
pflogsum @linux:email:monitoring
1 Treffer, Zuletzt geändert:
e> /etc/cron.d/postfix_report <code> 55 6 * * * root /usr/local/bin/postfix-report.sh </code> \\ \\ <
relayhost @linux:email:postfix
1 Treffer, Zuletzt geändert:
aas.$mydomain $mydomain masquerade_exceptions = root message_size_limit = 30000000 mydestination =