Solved

Sendmail-----Serial three(4): sendmail.cf setting

Posted on 2001-07-05
2
227 Views
Last Modified: 2010-03-18
  i want to know more detailed menu to explain almost eve
ry SETTING & FUNCTION in /etc/sendmail.cf (especially with
the "Options" settings). i've searched it on www.sendmail.
org,but i am not very satisfied with what i found,maybe,y
ou can give me a good place to find the docs,thanks.
0
Comment
Question by:wingboad
2 Comments
 
LVL 5

Accepted Solution

by:
vsamtani earned 10 total points
ID: 6259355
The sendmail operations and installation guide is a very useful online resource. It's probably been installed with your sendmail, but if you want to read an html version, look here:

http://uwsg.ucs.indiana.edu/usail/mail/op/op.html

And the definitive resource is the Sendmail book

Sendmail, by Costales B and Allman E. Published by O'Reilly and associates, ISBN 1565922220

0
 

Author Comment

by:wingboad
ID: 6263468
ok,thanks,but i don't know what you said "It's probably been installed with your sendmail " means,i find nothing in
my system with docs or any guide about sendmail.
   i will accept your answer,thanks again
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question