Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Volltextergebnisse:
- spamreport @linux:email:spamassassin
- XXXX` || exit 1 DATENOW=`date +"%d.%m.%Y, %H:%M"` USERFOLDERS=`ls -1d /var/spool/imap/user/*` #USERFOLDERS="/var/spool/imap/user/haasc" LASTRUNFILE="/tmp/spam_lastrun" MAILSUBJECT_ONE="neue Mail in Ihrem
- amavisd @linux:email:amavisd
- f pre-forked children (2..15 is common) $daemon_user = 'vscan'; $daemon_group = 'vscan'; # 2007... I:mysql:database=mail;host=127.0.0.1;port=3306', 'user1', 'passwd1'], # ['DBI:mysql:database=mail;host=host2', 'username2', 'password2'], # ["DBI:SQLite:dbname=... es (NOTE: positive: black, negative: white) # 'user1@example.com' => [{'bla-mobile.press@example.com
- postgrey @linux:email:greylisting
- =PATH put daemon pid into this file --user=USER run as USER (default: postgrey) --group=GROUP run as group GROUP (default: nogroup... ost:10023 --daemonize --dbdir=/var/lib/postgrey --user=postgrey --pidfile=/var/run/postgrey.pid --w
- sasl @linux:email:postfix
- === Testing === Grep the /etc/passwd file for the user "cyrus": cat /etc/passwd | grep cyrus cyrus:x:96:12:User for cyrus-imapd:/usr/lib/cyrus:/bin/bash \\ Set a password e.g. "tester" for user "cyrus": \\ station7:/ # passwd cyrus Changi... uthentication via /etc/passwd. \\ Check now for a user that exists only in LDAP, e.g. user "haasc" with
- relayhost @linux:email:postfix
- n - - pipe flags=DRhu user=vmail argv=/usr/local/bin/maildrop -d ${recipient... - n n - - pipe user=cyrus argv=/usr/lib/cyrus/bin/deliver -e -r ${sender} -m ${extension} ${user} uucp unix - n n - - pipe flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail
- ssh-smtp-tunnel @linux:email:postfix
- # need to modify the `$remote_ip` value. $remote_user = "REMOTE-USER"; $remote_host = "REMOTE-HOST"; $remote_port = "25"; $remote_ip = "127.0.0.1"; ## Mod... or if you need to start the tunnel as a non-root user, as ## OpenSSH only allows root users to start tunnels to low-numbered ## "privileged ports." If this i
- gnarwl
- passen:** [L] unix - n n - - pipe flags=DRhu user=vmail argv=/usr/local/bin/maildrop -w 80 -d ${recipient} [VL] unix - n n - - pipe flags=F user=adminvac argv=/usr/local/bin/fork_vacation.sh $se... 755 /usr/local/bin/fork_vacation.sh ==== Create user adminvac with sudo for execute the vacation binar
- sign @linux:email:amavisd:dkim
- m_signing = 0;): <code conf /etc/amavis/conf.d/50-user> # DKIM-Signierung: # $enable_dkim_signing = 1; $... o MTA to re-route mail from authenticated roaming users or # from internal hosts to a dedicated TCP port... ING'} = { # mail supposedly originating from our users originating => 1, # declare that mail was sub
- sieve @linux:email:cyrus
- \\ **Sivtest:** station7: #/usr/bin/sivtest as user cyrus: cyrus@station7:~> sivtest -t /etc/ssl/pr... n Optionen: > help Usage: sieveshell [-u username] [-a authname] [-r realm] <server> help
- spamassassin @linux:email:spamassassin
- d). # This however is a really bad idea since any user on the system can run # ps and see the command li... t hostname IMAP server name [%s]%s --imapuser username Who you login as [%s] --imapinbox mbox
- verify @linux:email:amavisd:dkim
- eren === <code console> vim /etc/amavis/conf.d/50-user </code> <code conf /etc/amavis/conf.d/50-user> # DKIM-Ueberpruefung: $enable_dkim_verification = 1; $a
- config @linux:email:cyrus
- ot {6} S: + go ahead C: <omitted> S: L01 OK User logged in Authenticated. Security strength fa
- cyrus_secure @linux:email:cyrus
- ot {6} S: + go ahead C: <omitted> S: L01 OK User logged in Authenticated. Security strength fa
- smtp-authentication @linux:email:postfix
- permit_sasl_authenticated == Testing == Code the username "larrylaffer" with the password "kensentme" f