Solved

Receiving mime messages with attachments

Posted on 1998-12-08
7
357 Views
Last Modified: 2010-04-21
At this moment i'm using filter to filter out some messages from my mailbox and process the data in it. However, at this moment people, sending me this data, do still have to put their data in the text itself, because when they send it as attachments, i receive a mime-message.
How can i automatically extract the data from such a mime message ? We do have metamail and mimencode on our box.
0
Comment
Question by:c827433
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
7 Comments
 

Author Comment

by:c827433
ID: 2008256
Adjusted points to 80
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 2008257
does following not work?

   cat mail.text | metatmail
0
 

Author Comment

by:c827433
ID: 2008258
"cat mail.text | metamail" doesn't work if i'm using filter. Metamail becomes then interactive. I've found i can specify an option to make it extract the files automatically.
I now specify "cat mail.txt | metamail -w -x -B". In advance i set the variable METAMAIL_TMPDIR to a temporary directory to write the extracted files to.
This seems to work !
0
Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

 
LVL 51

Expert Comment

by:ahoffmann
ID: 2008259
so, did my suggestion point you to a solution?
0
 

Author Comment

by:c827433
ID: 2008260
No, actually i found it myself, but you can have the points if you like !
0
 
LVL 51

Accepted Solution

by:
ahoffmann earned 80 total points
ID: 2008261
it was a half-hearted answer, but you got to solve your problem.
So we have a PAQ now, nice.
0
 

Author Comment

by:c827433
ID: 2008262

Thank you for your support !
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Java performance on Solaris - Managing CPUs There are various resource controls in operating system which directly/indirectly influence the performance of application. one of the most important resource controls is "CPU".   In a multithreaded…
Why Shell Scripting? Shell scripting is a powerful method of accessing UNIX systems and it is very flexible. Shell scripts are required when we want to execute a sequence of commands in Unix flavored operating systems. “Shell” is the command line i…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question