Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Volltextergebnisse:
- spamreport @linux:email:spamassassin
- m.%Y, %H:%M"` USERFOLDERS=`ls -1d /var/spool/imap/user/*` #USERFOLDERS="/var/spool/imap/user/haasc" LASTRUNFILE="/tmp/spam_lastrun" MAILSUBJECT_ONE="neue Mail... " >> ${PROTOFILE} USER_MAILFILE="${TMPDIR}/${MAILBOX}.mail" USER_HEADER="${TMPDIR}/${MAILBOX}_header.mail"
- postgrey @linux:email:greylisting
- =PATH put daemon pid into this file --user=USER run as USER (default: postgrey) --group=GROUP run as group GROUP (default: nogroup... ost:10023 --daemonize --dbdir=/var/lib/postgrey --user=postgrey --pidfile=/var/run/postgrey.pid --w
- relayhost @linux:email:postfix
- n - - pipe flags=DRhu user=vmail argv=/usr/local/bin/maildrop -d ${recipient... - n n - - pipe user=cyrus argv=/usr/lib/cyrus/bin/deliver -e -r ${sender} -m ${extension} ${user} uucp unix - n n - - pipe flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail
- sasl @linux:email:postfix
- === Testing === Grep the /etc/passwd file for the user "cyrus": cat /etc/passwd | grep cyrus cyrus:x:96:12:User for cyrus-imapd:/usr/lib/cyrus:/bin/bash \\ Set a password e.g. "tester" for user "cyrus": \\ station7:/ # passwd cyrus Changi... uthentication via /etc/passwd. \\ Check now for a user that exists only in LDAP, e.g. user "haasc" with
- amavisd @linux:email:amavisd
- f pre-forked children (2..15 is common) $daemon_user = 'vscan'; $daemon_group = 'vscan'; # 2007... I:mysql:database=mail;host=127.0.0.1;port=3306', 'user1', 'passwd1'], # ['DBI:mysql:database=mail;... es (NOTE: positive: black, negative: white) # 'user1@example.com' => [{'bla-mobile.press@example.com' => 10.0}], # 'user3@example.com' => [{'.ebay.com' =
- ssh-smtp-tunnel @linux:email:postfix
- # need to modify the `$remote_ip` value. $remote_user = "REMOTE-USER"; $remote_host = "REMOTE-HOST"; $remote_port = "25"; $remote_ip = "127.0.0.1"; ## Mod... or if you need to start the tunnel as a non-root user, as ## OpenSSH only allows root users to start tu... al_ip:$local_port:$remote_ip:$remote_port $remote_user\@$remote_host -N"; exit 0; } } elsif (lc($a) e
- gnarwl
- passen:** [L] unix - n n - - pipe flags=DRhu user=vmail argv=/usr/local/bin/maildrop -w 80 -d ${recipient} [VL] unix - n n - - pipe flags=F user=adminvac argv=/usr/local/bin/fork_vacation.sh $se... 755 /usr/local/bin/fork_vacation.sh ==== Create user adminvac with sudo for execute the vacation binar
- verify @linux:email:amavisd:dkim
- eren === <code console> vim /etc/amavis/conf.d/50-user </code> <code conf /etc/amavis/conf.d/50-user> # DKIM-Ueberpruefung: $enable_dkim_verification = 1; $a
- config @linux:email:cyrus
- ot {6} S: + go ahead C: <omitted> S: L01 OK User logged in Authenticated. Security strength fa
- cyrus_secure @linux:email:cyrus
- ot {6} S: + go ahead C: <omitted> S: L01 OK User logged in Authenticated. Security strength fa
- sieve @linux:email:cyrus
- \\ **Sivtest:** station7: #/usr/bin/sivtest as user cyrus: cyrus@station7:~> sivtest -t /etc/ssl/pr
- spamassassin @linux:email:spamassassin
- d). # This however is a really bad idea since any user on the system can run # ps and see the command li
- sign @linux:email:amavisd:dkim
- m_signing = 0;): <code conf /etc/amavis/conf.d/50-user> # DKIM-Signierung: # $enable_dkim_signing = 1; $