cyrus server

Want to know cyrus server? we have a huge selection of cyrus server information on alibabacloud.com

Test postfix + cyrus-imap + cyrus-sasl in linuxas5.5

In linuxas5.5, test postfix + cyrus-imap + cyrus-sasl -- Linux Enterprise Application-Linux server application information. For details, see the following. Test environment: Cat/proc/version Linux version 2.6.18-194. el5xen [Root @ mail ~] #

[Practice] Cyrus IMAP Server imapmagicplus pre-verification Remote Buffer Overflow Vulnerability Analysis

Cyrus IMAP Server imapmagicplus pre-verification Remote Buffer Overflow Vulnerability Analysis Created:Article attributes: originalArticle submitted: San (san_at_xfocus.org) Cyrus IMAP Server imapmagicplus pre-verification Remote Buffer Overflow

Cyrus SASL Introduction

Cyrus SASL Introduction 1. Summary This document describes how to configure SASL by a system administrator. It describes in detail how the system administrator uses the Cyrus SASL library to install a service. 2. SASL Concept SASL stands for the

Postfix SMTP Server Cyrus SASL supports Memory Corruption Vulnerability

Release date:Updated on: Affected Systems:Wietse Venema Postfix 2.xUbuntu Linux 8.xUbuntu Linux 6.xUbuntu Linux 11.xUbuntu Linux 10.xUnaffected system:Wietse Venema Postfix 2.8.3Wietse Venema Postfix 2.7.4Wietse Venema Postfix 2.6.10Wietse Venema

Postfix + Cyrus strange requirements.

Recently, I was working on a project to design a mailbox for users. The specific process is as follows: when you create a new user for the system, you can also create an IMAP mailbox for the user.The IMAP server uses Cyrus.SMTP server uses

Cyrus IMAP index_urlfetch Integer Overflow Vulnerability (CVE-2015-8078)

Cyrus IMAP index_urlfetch Integer Overflow Vulnerability (CVE-2015-8078)Cyrus IMAP index_urlfetch Integer Overflow Vulnerability (CVE-2015-8078) Release date:Updated on:Affected Systems: Cyrus Cyrus IMAP Server 2.5.6Cyrus Cyrus IMAP Server

Cyrus IMAP index_urlfetch Integer Overflow Vulnerability (CVE-2015-8077)

Cyrus IMAP index_urlfetch Integer Overflow Vulnerability (CVE-2015-8077)Cyrus IMAP index_urlfetch Integer Overflow Vulnerability (CVE-2015-8077) Release date:Updated on:Affected Systems: Cyrus Cyrus IMAP Server 2.5.6Cyrus Cyrus IMAP Server

Mail system Server Setup record (v) (postfix+cyrus-sasl+courier-authlib+dovecot+extmail+mysql)

13. Configure Dovecot to complete receiving user verification by accessing MySQLThe dovecot itself is supported by the MySQL authentication method, which provides a configuration file named Auth-sql.conf.ext under/etc/dovecot/conf:[[email protected]

Solve the Problem of cyrus-imap Chinese mail title "XXXX"

Solve the Problem of cyrus-imap Chinese mail title "XXXX"-Linux Enterprise Application-Linux server application information. The following is a detailed description. Because the RFC defines the data format as 7bit, And the 8bit Chinese title is

Linux (CentOS) postfix server SASL authentication and CYRUS-SASL-based access control

First, the CYRUS-SASL-based authentication function is opened for postfix.Modify the/etc/sysconfig/saslauthd file in theMech=pamSwitchMech=shadowStart SASLAUTHDService SASLAUTHD StartVerify that you can use the account password on the system to

Total Pages: 15 1 2 3 4 5 .... 15 Go to: Go

Alibaba Cloud 10 Year Anniversary

With You, We are Shaping a Digital World, 2009-2019

Learn more >

Apsara Conference 2019

The Rise of Data Intelligence, September 25th - 27th, Hangzhou, China

Learn more >

Alibaba Cloud Free Trial

Learn and experience the power of Alibaba Cloud with a free trial worth $300-1200 USD

Learn more >

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.