Solved

Setting POP3 service...

Posted on 1998-09-02
4
218 Views
Last Modified: 2013-12-15
Hi!

How can I set the POP3 service on Linux Debian v 1.3 OS?

Thanks a lot.
0
Comment
Question by:vali
  • 2
4 Comments
 
LVL 5

Expert Comment

by:JBURGHARDT
ID: 1630559
Go to www.linux.org and then to support and howto you will find howto on popserver you will need to follow it step by step.
0
 

Author Comment

by:vali
ID: 1630560
Thank you JBURGHARDT, but I am not satisfied with your answer.
0
 
LVL 4

Accepted Solution

by:
jlms earned 30 total points
ID: 1630561
1.- Get a popserver (search in the web, there are several around).
2.- You have to add a line in the /etc/services to declare the port that is been used by the pop server. It could be something similar to this:

pop2            109/tcp
pop3            110/tcp

3,- You have to modify the /etc/inetd.conf file adding a line describing how to start the popserver. Something like this could be necessary:

pop3  stream  tcp  nowait  root  /usr/local/bin/ipop3d  ipop3d

  Check your documentation, the sintaxis could be different.

4.- Ask inetd to reread this file (kill -1 <pid of inetd>) or restart your machine.

5.- You have to be sure now that the e-mail of each user goes to the place were the pop3 server is expecting to find it (usually in any of the default places).

  To make sure the service is working you can telnet to the popserver (telnet <machine running server> 110) and it will be evident if the server is responding or not.

  Usually all the popservers come with this explanation specifiacally for the server you are getting and the OS you are using.


0
 

Author Comment

by:vali
ID: 1630562
Thans jlms, the answer is EXCELENT.

Vali,
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Network Interface Card (NIC) bonding, also known as link aggregation, NIC teaming and trunking, is an important concept to understand and implement in any environment where high availability is of concern. Using this feature, a server administrator …
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now