On Saturday, May 08, 2010 at 06:19 CEST,
James Logan wrote:
> On Thu, May 6, 2010 at 7:02 AM, J.D. Bronson wrote:
>
> > I am seeing random spam come in with this consistent type of 'from':
> >
> > (r...@www.cheapquotesonline.com)
> > (r...@chat.biznizpro.com)
> > (r...@safetyaboutonline.net
> -Original Message-
> From: owner-postfix-us...@postfix.org [mailto:owner-postfix-
> us...@postfix.org] On Behalf Of mouss
> Sent: Friday, May 07, 2010 11:51 PM
> To: postfix users
> Subject: Re: Php hook for all my emails
>
> Andrés Gattinoni a écrit :
> > On Fri, May 7, 2010 at 5:29 P
Andrew Grant a écrit :
> Can you offer a suggestion on how this SHOULD be done? I am trying to
> check the "recipient" because I want to limit who can send to the
> "recipient" address of management.t...@testdomain.com.
>
you already do check_recipient_access to call the restriction class. now
in
Mark Scholten a écrit :
> [snip]
> I am now doing it by parsing the logs, but I want to get the following
> information in a MySQL database (currently I get it from the logs, but that
> takes a few hours to parse for 1 day logs).
> I currently log the following data in a MySQL database:
> - sende
On Sat, May 8, 2010 at 9:37 AM, Mark Scholten wrote:
> I am now doing it by parsing the logs, but I want to get the following
> information in a MySQL database (currently I get it from the logs, but that
> takes a few hours to parse for 1 day logs). I currently log the following
> data in a MyS
ed:
> can someone beat me with a clue bat to get me started in the right
> direction to best practice to stop; " root+:|" exploits
> (or is this something that I should move over to spam-l, or some other spot?
You run an MTA that is immune against such attacks (such as Postfix),
and you do the sa
I have postfix installed and configured on my Mac OS 10.6.3 machines. It works
correctly because the unix mail program works fine and sendmail interface can
send emails as well. However, I encounter this strange problem. The printing
commands, lpr and lp, have the -m switch which sends an e-m
On 05/08/2010 06:50 PM, Wietse Venema wrote:
ed:
can someone beat me with a clue bat to get me started in the right
direction to best practice to stop; " root+:|" exploits
(or is this something that I should move over to spam-l, or some other spot?
You run an MTA that is immune agains
On 07/05/2010 23:51, mouss wrote:
Andrés Gattinoni a écrit :
On Fri, May 7, 2010 at 5:29 PM, Noel Jones wrote:
On 5/7/2010 2:53 PM, Andrés Gattinoni wrote:
Here's an example of a shell script that receives all mail. Shouldn't be
much of a stretch to use PHP instead.
http://www.postfix.org/F
I like a firewall for incoming mail, thanks for the tio :p
2010/5/6 Helga Mayer
> Quoting The Doctor :
>
> - Forwarded message from -
>>
>> X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on
>> doctor.nl2k.ab.ca
>> X-Spam-Level:
>> X-Spam-Status: No, score=0.0 required=5.0 tes
Hi all,
Is it possible to filter incoming messages before mailbox delivery
without use of procmail or maildrop?
I'm trying to use osbf-lua spamfilter, I setup this with postfix
after-queue filter http://www.postfix.org/FILTER_README.html
but it's not what I want, because outgoing mails are being
Yes, you can check grey listing topics and dns black list topics, all
incomming mail is procesed before arrive to the server with this features.
:: L.I. Ricardo D. Carrillo Sánchez
:: Security Specialist
:: Unive
On Sat, May 8, 2010 at 8:11 PM, Bruno Ribeiro da Silva
wrote:
> Hi all,
>
> Is it possible to filter incoming messages before mailbox delivery
> without use of procmail or maildrop?
>
> I'm trying to use osbf-lua spamfilter, I setup this with postfix
> after-queue filter http://www.postfix.org/FIL
13 matches
Mail list logo