Postfix Mailserver

In: Science

Submitted By arnoh
Words 461
Pages 2
POSTFIX

CONFIGURATIE
Nameserver ook instellen als mailserver

$ sudo vi /etc/bind/db.jonas.lan

MX-record toevoegen

@ IN SOA jonas.lan. root.jonas.lan. ( 2011120103 ; Serial 604800 ; Refresh 86400 ; Retry 2419200 ; Expire 604800 ) ; Negative Cache TTL
;
@ IN NS ns.jonas.lan.
@ IN A 127.0.0.1
@ IN MX 5 mail.jonas.lan ns IN A 192.168.1.5 (eigen ip-adres) mail IN A 192.168.1.5

INSTALLEREN
$ sudo apt-get install postfix

Volgend venster verschijnt:

Selecteer en vul volgende zaken in:

Internet Site jonas Dit is de naam van waaruit mails zullen verstuurd worden
( jonas@mail.jonas.lan )

poortstatus controleren
$ sudo netstat –ntlp

tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN

Configuratie MAILS
$ sudo vi /etc/postfix/main.cf

Onderaan de file staat het volgende:

hostname = jonas

* Als je tijdens de installatie een verkeerde naam hebt opgegeven, kan je die hier veranderen * * maildirectory Om je mails in een directory te plaatsen moet je onderaan de file nog een lijn toevoegen:

home_mailbox = maildir/ ( willekeurige mapnaam )

mails van netwerk ontvangen
Om mails van anderen in je netwerk te kunnen ontvangen moet je volgende lijn aanvullen met je eigen netwerkadres:

mynetworks = 127.0.0.1/8 [::ffff:127.0.0.0]/104 [::1]/128 192.168.1.0/24

controles
Controleer eerst of je mailserver bereikbaar is
$ dig mail.jonas.lan

;; ANSWER SECTION: mail.jonas.lan 604800 IN A 192.168.1.5

Eventueel kan je ook op een andere pc controleren of de mailserver bereikbaar is
$ dig mail.jonas.lan @192.168.1.5…...

Similar Documents

Key Computer Terms Checkpoint

...Telecommunications Transmission of signals over longdistances http://www.techterms.com/definition/telecommunications Analog and digital communications. Technology services Services that involve technology http://www.techterms.com/definition/technologyservices It services, and technical support Personal digital assistants Handheld electronic devices that work as a calender dayplanner, note pad and many other things http://www.techterms.com/definition/pda Sharp mobillon, sont cli Personal computers A computer used for work or personal use on a daily basis http://www.techterms.com/definition/pc Dell, mac, hp emachines Servers A computer that provides data to other computers http://www.techterms.com/definition/server Web servers, mailservers, file servers. Microsoftlls. Supercomputers A high performance computing machine designed to have extremely fast processing speeds. http://www.techterms.com/definition/supersomputer Ibm’s system x roadrunner system. Secondary storage technology Storage devices and storage media that are not always directly acessible by a comeuter http://www.techterms.com/definition/secondarystorage External harddrives, usb flash drives, tape drives. Input devices Any device that provides input to a computer http://www.techterms.com/definition/inputdevice Keyboard and mouse, joystick microphone. Output devices Any device that outputs information from a computer http://www.techterms.com/definition/outputdevice Monitor,speekers,......

Words: 384 - Pages: 2

Articles

...Question 1 Change the following infix expression postfix expression.  (A + B)*C+D/E-F Question 2 Suppose a 3d array LA is declared using LA(3:8, -4:1, 6: 9), base(LA)=200, w=4. find loc of LA[2,-2,5]. (Row major order). Question 3 Convert the expression (True && False) || !(False || True) to postfix expression. Show the contents of the stack at every step. Question 4 Use a stack to evaluate the following postfix expression and show the content of the stack after execution of each operation. Don't write any code. Assume as if you are using push and pop member functions of the stack. AB-CD+E*+ (where A=5, B=3, C=5, D =4, and E=2) Question 5 Evaluate the following postfix expression using a stack and show the contents of stack after execution of each operation : 50,40,+,18, 14,-, *,+ Question 6 Evaluate the following postfix expression using a stack and show the contents of stack after execution of each operation : TRUE, FALSE, TRUE, FALSE, NOT, OR, TRUE, OR, OR, AND Question 7 Write a program for creating polynomial using linked list? Question 8 Each node of a STACK contains the following information, in addition to required pointer field : i) Roll number of the student ii) Age of the student Give the structure of node for the linked stack in question TOP is a pointer which points to the topmost node of the STACK.......

Words: 357 - Pages: 2

Essay

...hosts: files nisplus dns Check the /etc/resolv.conf file to make sure that the IP address 127.0.0.1 of your localhost is listed as a name server Check that your /etc/host.conf contains the word bind Restart the named daemon->Type rndc start, then at the prompt type dig – – – Configuring DNS Client ● Entries in /etc/resolv.conf file are as follows: searchdomainname nameserverIP-address ● where domainname is the default domain name to search, and IP-address is the IP address of your DNS server. Eg: a sample /etc/resolv.conf file: search example.org nameserver 192.168.1.15 ● Configuring Mail Services ● ● ● ● ● ● ● Tracing Email Delivery Process Mail User Agent (MUA) Introducing SMTP Configuring Sendmail Using Postfix Mail Server Serving Email with POP and IMAP Maintaining Email Security Tracing Email Delivery Process Mail User Agent (MUA) Her MUA formats the message in e-mail format and uses the Simple Mail Transfer Protocol (SMTP) to send the message to the local mail transfer agent (MTA), in this case smtp.a.org, run by Alice's Internet Service Provider (ISP). Mail User Agent (MUA) • To be able to send mail, you, or your users, need a program called a Mail User Agent (MUA) • The MUA, also called a mail client, enables users to write and read mail messages • Two types of MUAs are available: a graphical user interface (GUI), such as Netscape Messenger, and a command-line interface, such as Pine. MUA sends it to the mail transfer agent......

Words: 5132 - Pages: 21

Data Structure

...Question 1 Change the following infix expression postfix expression. (A + B)*C+D/E-F Question 2 Suppose a 3d array LA is declared using LA(3:8, -4:1, 6: 9), base(LA)=200, w=4. find loc of LA[2,-2,5]. (Row major order). Question 3 Convert the expression (True && False) || !(False || True) to postfix expression. Show the contents of the stack at every step. Question 4 Use a stack to evaluate the following postfix expression and show the content of the stack after execution of each operation. Don't write any code. Assume as if you are using push and pop member functions of the stack. AB-CD+E*+ (where A=5, B=3, C=5, D =4, and E=2) Question 5 Evaluate the following postfix expression using a stack and show the contents of stack after execution of each operation : 50,40,+,18, 14,-, *,+ Question 6 Evaluate the following postfix expression using a stack and show the contents of stack after execution of each operation : TRUE, FALSE, TRUE, FALSE, NOT, OR, TRUE, OR, OR, AND Question 7 Write a program for creating polynomial using linked list? Question 8 Each node of a STACK contains the following information, in addition to required pointer field : i) Roll number of the student ii) Age of the student Give the structure of node for the linked stack in question TOP is a pointer which points to the topmost node of the STACK. Write......

Words: 308 - Pages: 2

Data Structure

...DATA STRUCTURE - STACK AND QUEUE Assignment 1 (MCA) Question 1 Complete the class with all function definitions for a stack class stack { int data[10]; int top; public : stack(){top=-1;} void push(); void pop(); } Change the following infix expression postfix expression. (A + B)*C+D/E-F Convert the expression (True && False) || !(False || True) to postfix expression. Show the contents of the stack at every step. Use a stack to evaluate the following postfix expression and show the content of the stack after execution of each operation. Don't write any code. Assume as if you are using push and pop member functions of the stack. AB-CD+E*+ (where A=5, B=3, C=5, D =4, and E=2) Evaluate the following postfix expression using a stack and show the contents of stack after execution of each operation : 50,40,+,18, 14,-, *,+ Evaluate the following postfix expression using a stack and show the contents of stack after execution of each operation : TRUE, FALSE, TRUE, FALSE, NOT, OR, TRUE, OR, OR, AND Complete the class with all function definitions for a circular queue class queue { int data[10]; int front, rear; public : Question 2 Question 3 Question 4 Question 5 Question 6 Question 7 1 queue(){front=-1;rear=-1} void add(); void remove(); } Question 8 Each node of a STACK contains the following information, in addition to required pointer field : i) Roll number of the student ii) Age of the student Give the structure of node for the linked stack in question TOP...

Words: 376 - Pages: 2

Tech

... | | | | | | | | 2. (18 points) ) For X = 0011 1111, show the result of the following independent operations (i.e. each instruction occurs with X starting at the value above): a) Shift-right ____ ____ b) Circular Shift-right ____ ____ c) Shift-left ____ ____ d) Circular Shift-left ____ ____ e) Arithmetic Shift-left ____ ____ f) Arithmetic Shift-right ____ ____ 3. (12 points) a) Convert the following formula from postfix (Reverse Polish Notation) to infix: AB*CD/+ b) Convert the following formula from infix to postfix (Reverse Polish Notation): A + B * C + D / E * F Note that the result of part b) can be used in problem 7 In the problems 4 through 7 write code that performs the computation: X = A + B * C + D / E * F using CPUs that have the following instruction formats. You may only use registers A through F, plus X and T. Registers A through F may not be changed, i.e. their values are fixed. Register T may be used as a temporary register, and Register X must contain the final answer. 4. (12 points) Three-operand instructions 5. (12 points) Two-operand instructions 6. (12...

Words: 457 - Pages: 2

Dissertation for Desk Calculator

...expression and output is obtained in a text file. Method followed to solve the expression is, the input is fetched from the input text document and converted to postfix notation using expression tree data structure, the resulted RPN expression is evaluated and the result is shown in output text file. Infix is converted to postfix because, it is easy for the compiler to execute the expression in postfix format. Commonly used data structures for evaluating expressions are stacks and expression trees, both of the above data structures are analyzed and concluded that expression trees are the best suited data structure for solving infix expression. 1.Introduction: Consider a situation where you are writing a programmable calculator. If the user types in 10 + 10, how would you compute a result of the expression? You might have a solution for this simple expression. But what if he types in 3 * 2 / (5 + 45) % 10 ? What would you do then? The expression that you see above is known as Infix Notation. It is a convention which humans are familiar with and is easier to read. But for a computer, calculating the result from an expression in this form is difficult. Hence the need arises to find another suitable system for representing arithmetic expressions which can be easily processed by computing systems. The Prefix and Postfix Notations make the evaluation procedure really simple. The calculator you will be working with uses Reverse Polish Notation (RPN),......

Words: 1838 - Pages: 8

C Operators

...Checks if the value of two operands is equal or not, if values are not equal then condition becomes true. Example (A == B) is not true. == != (A != B) is true. > Checks if the value of left operand is greater than the value of right operand, if yes then condition becomes true. Checks if the value of left operand is less than the value of right operand, if yes then condition becomes true. Checks if the value of left operand is greater than or equal to the value of right operand, if yes then condition becomes true. Checks if the value of left operand is less than or equal to the value of right operand, if yes then condition becomes true. (A > B) is not true. < (A < B) is true. >= (A >= B) is not true. postfix ++ and postfix –– prefix ++ and prefix –– sizeof & typecasts * + / – >> = % * +–~! Left to right Unary Right to left Unary Multiplicative Additive Bitwise shift Relational Equality Bitwise-AND Bitwiseexclusive-OR Right to left Left to right Left to right Left to right Left to right Left to right Left to right Left to right | Bitwiseinclusive-OR Left to right && || Logical-AND Logical-OR Left to right Left to right ?: Conditionalexpression Right to left = *= += ^= , /= |= %= = &= Simple and compound assignment2 Sequential evaluation Right to left –= Left to right Operators are listed in descending order of precedence. If several operators appear on the same line or in a......

Words: 462 - Pages: 2

Aouch; Adsf

...expressions. Notations of Expressions Let X=A+B be an expression. Then the notations of expressions are defined as: 1. Prefix notation: the operator is written before the two operands. Ex. +AB 2. Infix notation: the operator is written in between the two operands. Ex. A+B 3. Postfix notation: the operator is written after the two operands. Ex. AB+    Illustration: X=A+B/C-D Find the 3 notations of the above expression. Prefix: -+A/BCD Infix: A+B/C-D Postfix: ABC/+D-    Knowing the underlying principles on the 3 notations of expressions, we now are ready to use stacks to evaluate expressions. There are 2 possible ways to evaluate expressions 1. 2. Prefix method Postfix method Prefix Method Let there be 2 stacks X and S. Assume that X contains the prefix notation of the expression and S be initially empty. S will be used to do the evaluation. Get the top of X. If x [i] is an operand, push the element into S.  If x[i] is an operator, pop the 2 topmost element of S. Apply the operation defined by x[i] then push the result into S  4. Repeat steps 2-3 until X is empty or S is left with only one element. That element must be the result of the evaluation process. Conversion of infix to postfix notation using stacks •push only operations onto the stack •push the operator if the incoming operator has a higher precedence than the top operator in the stack. •If the incoming operator has a priority...

Words: 654 - Pages: 3

Nt1430

...first-time authentication message (page 6) again as OpenSSH verifies that you are connecting to the correct system. Ch 20 end of chapter questions/exercises #6, #9 6. Describe the software and protocols used when Max sends an email to Sam on a remote Linux system. One possible answer of many: a. Max’s MUA passes the email to sendmail. b. The sendmail daemon uses SMTP to deliver the email to the instance of sendmail on Sam’s system. c. On Sam’s system, sendmail passes the email to the local MDA (procmail). d. The MDA stores the email in Sam’s file in the spool directory. e. Sam’s MDA retrieves the email from the spool directory 9. Give a simple way of reading your email that does not involve the use of an MUA. Postfix is an alternative MTA. Postfix is fas and easy to administer but is compatible enough with sendmail to not upset sendmail users....

Words: 464 - Pages: 2

Mobility of Factors of Production

...Providing support, including procedural documentation and relevant reports; Following diagrams and written instructions to repair a fault or set up a system; Responding within agreed time limits to call-outs; Set-up & Configuration of Linux Server ; -mail server, graph server, and proxy servers. Technical Environment i. ii. Windows server ,window xp , Linux servers ( Postfix ,Squid ,Iptables ,Proxy) ,network Graphing servers ,Bind Dns Server ,Apache Web servers ,what up gold ,cacti graphing ,nagios . AS a support engineer am Responsible for: i. ii. Day-to-day support on Network Devices for more than one hundred client Fulfill client support need optimally. Professional Experience Professional Skills Extensive experience in installation, administration and networking in various environments. well working acquaintance in Linux environment operate FTP SSH Samba Server in Linux Environment Linux Shell Scripting Security administration port security on switch and IP security on Router via Access list Thorough knowledge of Windows Vista; Windows XP; Centos server, apache web server ,Mysql server Postfix Mail server using Ired OS System development using PHP and Mysql Operating Systems: Windows9X, Windows2000, Windows ME, Windows XP, Windows, Vista, Linux, Unix, MS DOS Software: MS Office 2007; MS Office 2003/XP; Norton Utilities; WinFax; PC Anywhere; Hardware: Intel, 3COM, HP Proliant DL380, HP ML570, and others. Computer assembly and i. ii. Maintenance,......

Words: 697 - Pages: 3

Lab #4 – Assessment Worksheet

...compromise (attack and exploit the known vulnerabilities) using the Metasploit Framework application), and conducted post-attack activities by recommending specific countermeasures for remediating the vulnerabilities and eliminating the possible exploits. Lab Assessment Questions & Answers 1. What are the five steps of ethical hacking? reconnaissance, scanning,enumeration, compromise, post-attack activities: recommended countermeasures for remediation. 2. During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those ports? There were several Ports, I will list onl a few POrts, 21,3306,22,53,445,111,25, all running TCP: the services running were Linux telneted, smtp Postfix, Apache Tomcat/Coyote JSP 3. What step in the hacking attack process uses Zenmap? Reconnaissance 4. What step in the hacking attack process identifies known vulnerabilities? Enumeration 5. During the vulnerability scan, you identified a vulnerable service in the Linux victim system. What was the name of the vulnerable service? I believe that this is the telnet service. Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual 2 | Lab #4 Using Ethical Hacking Techniques to Exploit a Vulnerable Microsoft Workstation 6. If you are a member of a security penetration testing team, and you identify vulnerabilities and exploits,......

Words: 285 - Pages: 2

1s3110

...select which of the seven domains of a typical IT infrastructure is primarily impacted by the risk, threat, or vulnerability. Risk – Threat – Vulnerability | Primary Domain Impacted | Unauthorized access from pubic Internet | LAN/WAN Domain | User destroys data in application and deletesall files | User Domain | Hacker penetrates your IT infrastructureand gains access to your internal network | LAN/WAN Domain | Fire destroys primary data center | System/Application Domain | Communication circuit outages | Remote Access Domain | Workstation OS has a known software vulnerability | Workstation Domain | Unauthorized access to organization owned Workstations | Workstation Domain | Denial of service attack on organization e-mailServer | System/Application Domain | Remote communications from home office | Remote Access Domain | LAN server OS has a known software vulnerability | LAN Domain | User downloads an unknown e –mail attachment | User Domain | Workstation browser has software vulnerability | Workstation Domain | Service provider has a major network outage | WAN Domain | User inserts CDs and USB hard driveswith personal photos, music, and videos onorganization owned computers | User Domain | VPN tunneling between remote computer and ingress/egress router | Remote Access Domain | WLAN access points are needed for LAN connectivity within a warehouse | LAN/WAN Domain | Given the scenario of a healthcare organization, answer the following......

Words: 546 - Pages: 3

Bible

...count the repetitions •       Sentinel-controlled repetition •       Indefinite repetition •       Used when the number of repetitions is not known Sentinel value indicates "end-of-data * Two types of conversions: * Widening conversion: * Convert from one type to another type with larger number of bits * From int to double * Narrowing conversion: * Converting from a data type to a smaller type * From double to int * Some information may be lost * Increment (++): * Adds 1 to its operand * Prefix increment: ++a * Postfix increment: a++ * ++a; is the same as a++; is the same as a = a+1; * Decrement (--): * Subtracts 1 from its operand * Prefix decrement: --a; * Postfix decrement: a- -; --a; is the same as a--; is the same as a = a- * The postfix and prefix are different only when they are used in an assignment statement * x = a++; is not the same as x = ++a; * x = ++a increments a before its value is assigned to x * x = a++ increments a after its value is assigned to x Generating Random Numbers * Math.random() is used to generate a random double value between 0.0 and 1.0 excluding 1.0 * To generate an integer between 0 and 9 int num = (int) (Math.random() * 10) * To generate an integer between 0 and 100 int num = (int) (Math.random Random Question * Given the following declaration, how would you get: Random......

Words: 1905 - Pages: 8

Smart Networks

...standard that defined PoE is IEEE 802.3af. The standard was enhanced in 2009 and give the new standard name 802.3af PoE+. 5.1.3 Standard | Cabling | Maximum Length | 10BASE5 | Coaxial (thicknet) | 500m | 10BASE2 | Coaxial(thinnet) | 200m | 10BASE-T | UTP (cat3, 5, 5e, 6) | 100-150m | 100BASE-FX | Fiber optic | 400m | 100BASE-T | UTP or optical fiber | 100m | 100BASE-T4 | UTP (cat3, 5, 5e, 6) | 100m | 100BASE-TX | UTP (cat3, 5, 5e, 6) | 100m | 1000BASE-LX | MM Fiber optic | 550m | 1000BASE-SX | MM Fiber optic | 220m or 550m (depends upon fiber thickness) | 1000BASE-ZX | SM fiber optic | 100km | 1000BASE-T | UTP (Cat5) | 100m | 5.1.4 The numeric prefix before BASE in the Ethernet standards defines the transmission speed. The postfix –T implies twisted pair. 5.2.1 A MAC address must be unique for every NIC produced because switches forward frames based on their destination MAC address and if more than one NIC in the same LAN were to have the same MAC address (including the last 24 bits in the MAC address) then the switches would be confused as to which NIC would get the frame. 5.2.2 Connection-specific DNS Suffix: att.net Description: Dell Wireless 1705 802.11b/g/n (2.4GHZ) Physical Address: ‎64-5A-04-CE-E2-44 DHCP Enabled: Yes IPv4 Address: 192.168.1.73 IPv4 Subnet Mask: 255.255.255.0 Lease Obtained: Wednesday, July 23, 2014 1:59:29 AM Lease Expires: Thursday, July 24, 2014 10:47:21 AM IPv4 Default Gateway: 192.168.1.254 IPv4 DHCP Server:......

Words: 349 - Pages: 2