root

Suche

Unten sind die Ergebnisse Ihrer Suche gelistet.

operation @linux:email:amavisd
5 Treffer, Zuletzt geändert:
ntine for files older than 31 days: #10 1 * * * root find /var/lib/amavis/virusmails/ -mtime +31 -exec rm {} \; #15 1 * * * root find /var/lib/amavis/tmp/ -mtime +31 -exec rm -r {} \; # oder: # 15 1 * * * root find /var/lib/amavis/ -iname "amavis-*" -mtime +31 -exec rm -r {} \; # oder: 10 1 * * * root find /var/lib/amavis/virusmails/ -mtime +31 -pri
cyrus_secure @linux:email:cyrus
5 Treffer, Zuletzt geändert:
\\ Test MECH=LOGIN: \\ station7:/ # imtest -a root -u root -m LOGIN station7.example.com -s verify error:num=20:unable to get local issuer certificate ... eted Please enter your password: C: L01 LOGIN root {6} S: + go ahead C: <omitted> S: L01 OK Us... \\ Test MECH=PLAIN: \\ station7:/ # imtest -a root -u root -m PLAIN station7.example.com -s verify
config @linux:email:cyrus
3 Treffer, Zuletzt geändert:
ue \\ ==== Testing ==== station7:/ # imtest -a root -u root -m LOGIN station7.example.com S: * OK station7 Cyrus IMAP4 v2.2.12 server ready C: C01 CAPA... eted Please enter your password: C: L01 LOGIN root {6} S: + go ahead C: <omitted> S: L01 OK Us
monitoring @linux:email:monitoring
3 Treffer, Zuletzt geändert:
o crontab: ### Postfix-Monitoring: * * * * * root /usr/local/bin/qshape.pl /var/spool/postfix/active/ > /srv/www/cgi-bin/active * * * * * root /usr/local/bin/qshape.pl /var/spool/postfix/deferred/ > /srv/www/cgi-bin/deferred * * * * * root /usr/local/bin/logtail.pl -f /var/log/mail | egre
sasl @linux:email:postfix
3 Treffer, Zuletzt geändert:
ault smtp_sasl_password_maps must be read-only to root, since these maps contain the usernames and passwords to authenticate. If you run saslfinger as root access will be no problem, but saslfinger will fa... telnet test, but don't want to run saslfinger as root change permissions of smtp_sasl_password_maps so
amavisd @linux:email:amavisd
2 Treffer, Zuletzt geändert:
MYHOME/var"; # prefer $MYHOME clean and owned by root? # $pid_file = "$MYHOME/var/amavisd.pid"; # ... e '-f=/var/amavis' is needed if not running it as root, so it # can find, read, and write its pid
config @linux:email:postfix
2 Treffer, Zuletzt geändert:
ct \\ === Testing === station7:/ # smtptest -u root -a root station7.example.com S: 220 station7.example.com ESMTP Example Inc. Mailserver C: EHLO exam
postfix_secure @linux:email:postfix
2 Treffer, Zuletzt geändert:
smtps is running at port 465** \\ smtptest -u root -a root station7.example.com -s verify error:num=20:unable to get local issuer certificate verify e
ssh-smtp-tunnel @linux:email:postfix
2 Treffer, Zuletzt geändert:
# 25, or if you need to start the tunnel as a non-root user, as ## OpenSSH only allows root users to start tunnels to low-numbered ## "privileged ports." If t
pflogsum @linux:email:monitoring
1 Treffer, Zuletzt geändert:
e> /etc/cron.d/postfix_report <code> 55 6 * * * root /usr/local/bin/postfix-report.sh </code> \\ \\ <
relayhost @linux:email:postfix
1 Treffer, Zuletzt geändert:
aas.$mydomain $mydomain masquerade_exceptions = root message_size_limit = 30000000 mydestination =