Solved

How to install courier-imap in Redhat Fedora 6?

Posted on 2006-11-15
4
924 Views
Last Modified: 2008-01-09
How to install courier-imap in Redhat Fedora 6?
0
Comment
Question by:kennycpu
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 14

Expert Comment

by:pablouruguay
ID: 17948687
you try
yum install courier-imap ?
0
 
LVL 43

Expert Comment

by:ravenpl
ID: 17954096
FC6 has no native support for courier-imap - Yum will not work.
You propably have to download sources, recompile and install manually.
The sources have install instructions, and here as well http://www.courier-mta.org/imap/documentation.html
0
 

Author Comment

by:kennycpu
ID: 17954521
Courier-IMAP need special method to install, I can't install throught the documents so that why I post it in expert-exchange.
0
 
LVL 43

Accepted Solution

by:
ravenpl earned 100 total points
ID: 17954565
What You mean by 'speacial method' I installed it few times from sources, and haven't encountered anything special?
Maybe except it needs http://www.courier-mta.org/authlib/ to be installed first.
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question