Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Enhance Your Mail Server With ASSP (Anti-Spam SMTP Proxy)

Unix+clones

Good-looking fonts in X Windows

Post date: April 23, 2005, 09:04 Category: Desktop Views: 3208 Comments
Tutorial quote: What makes the difference betweek "ugly" and "beautiful" fonts? Several things.

One of them is anti-aliasing (or AA in short). It's the technique which adds gray pixels in various shades around the edges of black text and thus blurs the jagged and pixelated edges. It works with other colors, too.

Another thing is having good quality fonts to start with. Font which are ugly by nature or don't scale well to various sizes are not much nicer when anti-aliased. See what kinds of fonts are out there by browsing through the Font HOWTO (not the same as the FDU HOWTO above).

Finally, there's the issue of readability which applies to you directly. How well does the end-product look anyhow? Do you really need anti-aliasing for an 8 pixel text? And other similar questions, which you'll learn how to answer according to your own preferences.
Unix+clones

How To Automate Spamcop Submissions

Post date: May 26, 2006, 07:05 Category: Network Views: 3838 Comments
Tutorial quote: Spamcop is a service which provides RBLs for mailservers in order to reject incoming mail from spammers.

Their philosophy is to process possible spam complaints from users. When they receive a certain amount of complaints during a time-period then they will blacklist the offender. This system is dependant on spam reporting from users. However, their submission process is not very user-friendly.

As I have said above, Spamcop is pretty much dependant on the user input. If no one submits and verifies spam, then they will have no blacklist. However that whole submission and verification process is a bit annoying. Why should I bother to actually submit spam to spamcop and have it verified? If I just delete it, that will take less time...

The human being isn't really made to do repeating things. This gets quickly boring and hence my idea to automate this submission and verfication process.
In this howto I will show you how I achieved that. All I do is just putting the spam into certain folders and our good old friend cron does the rest.
Ubuntu

How to use SSH Via HTTP Proxy using Corkscrew in Ubuntu

Post date: December 28, 2008, 22:12 Category: Software Views: 5645 Comments
Tutorial quote: If you want to ssh your vps server or your home computer from your work place (assuming you are using http proxy).You need to use Corkscrew.corkscrew is a simple tool to tunnel TCP connections through an HTTP proxy supporting the CONNECT method. It reads stdin and writes to stdout during the connection, just like netcat.

eBox

Using eBox As A Gateway: Firewall, Traffic Shaping, HTTP Proxy And More

Post date: June 11, 2010, 12:06 Category: Installing Views: 7001 Comments
Tutorial quote: eBox Platform is the Linux small business server that allows you to manage all your network services like firewall, DHCP, DNS, VPN, proxy, IDS, mail, file and printer sharing, VoIP, IM and much more. These functionalities are tightly integrated, automating most tasks, avoiding mistakes and saving time for system administrators. This article will show you step by step how to use eBox as a Gateway, featuring network configuration, load balancing between two Internet connections with WAN failover and multigateway rules for policy routing, traffic shaping, DHCP and DNS cache for the LAN network and HTTP proxy with different content filtering policies and antivirus.
Debian

Virtual Users And Domains With Postfix, Courier And MySQL (+ SMTP-AUTH, Quota, SpamAssassin, ClamAV)

Post date: October 9, 2005, 18:10 Category: Network Views: 4536 Comments
Tutorial quote: This document describes how to install a mail server based on Postfix that is based on virtual users and domains, i.e. users and domains that are in a MySQL database. I'll also demonstrate the installation and configuration of Courier (Courier-POP3, Courier-IMAP), so that Courier can authenticate against the same MySQL database Postfix uses.

The resulting Postfix server is capable of SMTP-AUTH and TLS and quota (quota is not built into Postfix by default, I'll show how to patch your Postfix appropriately). Passwords are stored in encrypted form in the database (most documents I found were dealing with plain text passwords which is a security risk). In addition to that, this tutorial covers the installation of Amavisd, SpamAssassin and ClamAV so that emails will be scanned for spam and viruses.
Debian

Installing Maia Mailguard On Debian Lenny (Virtual Users/Domains With Postfix/MySQL)

Post date: July 8, 2010, 10:07 Category: Installing Views: 4660 Comments
Tutorial quote: This guide explains how to install Maia Mailguard, a spam and virus management system, on a Debian Lenny mailserver. Maia Mailguard is a web-based interface and management system based on the popular amavisd-new email scanner and SpamAssassin. Written in Perl and PHP, Maia Mailguard gives end-users control over how their mail is processed by virus scanners and spam filters, while giving mail administrators the power to configure site-wide defaults and limits.
Fedora+Core

Set Up A Fedora 7 Mail Server Using Qmail Toaster

Post date: June 20, 2007, 23:06 Category: Installing Views: 9385 Comments
Tutorial quote: This document describes how to install a Fedora 7 mail server based on Qmail using Qmail Toaster. Qmail is an Internet Mail Transfer Agent (MTA) for UNIX-like operating systems. It is a drop-in replacement for the Sendmail system provided with UNIX operating systems. Qmail uses the Simple Mail Transfer Protocol (SMTP) to exchange messages with MTAs on other systems.
OpenBSD

Transparent proxying with squid and pf

Post date: May 17, 2005, 08:05 Category: Network Views: 13210 Comments
Tutorial quote: squid is a caching web proxy, it's set up between web browsers and servers, fetching documents from servers on behalf of browsers. It can accelerate web access by caching frequently requested pages and serving them from its cache. It can also be used to filter pop-up ads and malware or to enforce access control (which clients may request what pages based on different authentication methods).

Traditionally, the proxy is an optional component, and browsers are configured to actively use the proxy. Transparent proxying means forcing all web traffic through the proxy without the cooperation (or knowledge) of the clients. Once all browser connections pass through the proxy, outgoing connections to external hosts can be restricted to the proxy, and direct connections from local clients can be blocked.

The OpenBSD packet filter (pf) can be used to redirect connections based on various criteria, including source and destination addresses and ports. For instance, one can redirect all TCP connections with destination port 80 (HTTP) that arrive through an interface connected to local workstations to a squid proxy running on a different address and port.
Linux

How to Avoid Getting Blacklisted

Post date: July 7, 2007, 23:07 Category: Security Views: 4446 Comments
Tutorial quote: A blacklist usually refers to a list of email or IP addresses known to send spam emails or some other type of unsolicited messages. Such lists are currently used by mail servers for filtering incoming emails and blocking the ones listed, in order to improve mail security and integrity. The blacklist is also the opposite of what is called a whitelist.
Ubuntu

Setting up squid proxy server on Ubuntu (Quick Start Guide)

Post date: October 10, 2010, 05:10 Category: Software Views: 5340 Comments
Tutorial quote: Squid is an internet proxy server that can be used within a network to distribute an internet connection to all the computers within the network. One central computer is connected to the internet through any means such as dial-up, cable modem, ISDN, DSL, or T1, runs squid, and thus acts as the firewall to the internet. Because it is a proxy, it has the capabilities to log all user actions such as the URLs visited. There are many features that can be configured in squid. This guide is meant to be a quick start guide for those who are eager to get squid working and then configure it from there.
Web-based applications and online marketing solutions - LumoLink