A Database-based System
|
|
|
- George Harrington
- 10 years ago
- Views:
Transcription
1 Rukma Prabhu Verlekar Neela Sawant Meghana Kshirsagar Computer Science and Engineering IIT Bombay Oct 31, 2004
2 A Bird s Eye View of our System Goal To build a database-based -system. Motivation: Short-comings in existing -systems Most -systems have a File-system at the back-end. No authentication system while sending mail. No support for searching attachments. Our system aims at improving on these. Database system at back-end. Authentication of users even when accepting send requests. Support for user-defined labels,searching attachments,search on labels.
3 A Bird s Eye View of our System Goal To build a database-based -system. Motivation: Short-comings in existing -systems Most -systems have a File-system at the back-end. No authentication system while sending mail. No support for searching attachments. Our system aims at improving on these. Database system at back-end. Authentication of users even when accepting send requests. Support for user-defined labels,searching attachments,search on labels.
4 A Bird s Eye View of our System Goal To build a database-based -system. Motivation: Short-comings in existing -systems Most -systems have a File-system at the back-end. No authentication system while sending mail. No support for searching attachments. Our system aims at improving on these. Database system at back-end. Authentication of users even when accepting send requests. Support for user-defined labels,searching attachments,search on labels.
5 A Bird s Eye View of our System Goal To build a database-based -system. Motivation: Short-comings in existing -systems Most -systems have a File-system at the back-end. No authentication system while sending mail. No support for searching attachments. Our system aims at improving on these. Database system at back-end. Authentication of users even when accepting send requests. Support for user-defined labels,searching attachments,search on labels.
6 A Bird s Eye View of our System Goal To build a database-based -system. Motivation: Short-comings in existing -systems Most -systems have a File-system at the back-end. No authentication system while sending mail. No support for searching attachments. Our system aims at improving on these. Database system at back-end. Authentication of users even when accepting send requests. Support for user-defined labels,searching attachments,search on labels.
7 A Bird s Eye View of our System Goal To build a database-based -system. Motivation: Short-comings in existing -systems Most -systems have a File-system at the back-end. No authentication system while sending mail. No support for searching attachments. Our system aims at improving on these. Database system at back-end. Authentication of users even when accepting send requests. Support for user-defined labels,searching attachments,search on labels.
8 Our System A Bird s Eye View of our System Components of our System: An server. An directory server for authentication of users. A Database at the back end.
9 Our System A Bird s Eye View of our System Components of our System: An server. An directory server for authentication of users. A Database at the back end.
10 Our System A Bird s Eye View of our System Components of our System: An server. An directory server for authentication of users. A Database at the back end.
11 Bird s Eye View of our System A Bird s Eye View of our System IMAP Server Mail Client Data Base Server Server
12 - An Control Flow Diagram of the Mailing process Processes Control Flow Diagram for Local Mail processing What is? The Simple Mail Transfer Protocol () is Internet s standard host-to-host mail transport protocol. It is a server-server protocol. commands: EHLO MAIL FRM: RCPT TO: DATA VRFY EXPN
13 - An Control Flow Diagram of the Mailing process Processes Control Flow Diagram for Local Mail processing What is? The Simple Mail Transfer Protocol () is Internet s standard host-to-host mail transport protocol. It is a server-server protocol. commands: EHLO MAIL FRM: RCPT TO: DATA VRFY EXPN
14 - An Control Flow Diagram of the Mailing process Processes Control Flow Diagram for Local Mail processing Control Flow Diagram of the Mailing process
15 Processes - An Control Flow Diagram of the Mailing process Processes Control Flow Diagram for Local Mail processing Check If non-mail request.(i.e if VRFY or EXPN) Call Non-mail-Request(). Else If Mail-request Call Mail-Request(). Else Error. Non-mail-Request() If ( command = VRFY or command = EXPN ) Contact server to retrieve the requested information. (i.e information about user or mailing-list)
16 Processes Contd... - An Control Flow Diagram of the Mailing process Processes Control Flow Diagram for Local Mail processing Mail-Request() Check the mail-format. If not proper bounce it. If ( From belongs to my domain) it should be a send request from a local client. Call Authenticate(). Else Queue it. Authenticate() If valid user, prompt for password. Contact server for verifying password. If authentication succeeds, Queue the request. Else Error.
17 Processes...contd - An Control Flow Diagram of the Mailing process Processes Control Flow Diagram for Local Mail processing Address Resolver If ( To belongs to my domain) it is an incoming mail for my client. Call LocalMailProcessing(). Else If ( From my domain) it is a send request to external destination. Call SendMail(). Else it is a relay request. Call CheckIfAuthorized(). CheckIfAuthorized() Check if the requested relay-destination is in the list of authorized-relay-destinations. If Yes Call SendMail(). Else Reject it.
18 Processes Contd... - An Control Flow Diagram of the Mailing process Processes Control Flow Diagram for Local Mail processing SendMail() Do DNSLookup Select the DNS-MX record with highest priority for the To domain. Send the mail. Deferred Queue If the Mail couldnt be sent successfully it is put into the deferred queue and the daemon tries to send it later.
19 - An Control Flow Diagram of the Mailing process Processes Control Flow Diagram for Local Mail processing Control Flow Diagram for Local Mail processing
20 Local Processing - An Control Flow Diagram of the Mailing process Processes Control Flow Diagram for Local Mail processing Verifier Contacts the server,verifies if recipient exists on this domain. The recipient could either be one/more users (or) a mailing-list. Parse and Fragment Mail Parse and fragment the mail to extract the header fields, body, attachments. All attachments are also seperated. Apply Filters Contact the FILTERS table and apply the filters defined by each recipient. A filter is applied by executing the SIEVE code corresponding to it. The filter determines which of the labels defined by the user to apply to the mail.
21 Why a Database? Schema Stored Procedures Advantages A single copy of mails received for mailing-lists is stored. An optimized design of the database makes searching,faster retrieval of mails on different search keys such as subject, sender, header, body and so on. Efficient storage by stripping each mail into its components and storing them in a backend database. Easy maintenance of information and faster search through standard database techniques.
22 Why a Database? Schema Stored Procedures Advantages A single copy of mails received for mailing-lists is stored. An optimized design of the database makes searching,faster retrieval of mails on different search keys such as subject, sender, header, body and so on. Efficient storage by stripping each mail into its components and storing them in a backend database. Easy maintenance of information and faster search through standard database techniques.
23 Why a Database? Schema Stored Procedures Advantages A single copy of mails received for mailing-lists is stored. An optimized design of the database makes searching,faster retrieval of mails on different search keys such as subject, sender, header, body and so on. Efficient storage by stripping each mail into its components and storing them in a backend database. Easy maintenance of information and faster search through standard database techniques.
24 Why a Database? Schema Stored Procedures Advantages A single copy of mails received for mailing-lists is stored. An optimized design of the database makes searching,faster retrieval of mails on different search keys such as subject, sender, header, body and so on. Efficient storage by stripping each mail into its components and storing them in a backend database. Easy maintenance of information and faster search through standard database techniques.
25 Database Schema - Tables Schema Stored Procedures MAIL MESSAGE Table Metadata FIELD DATA TYPE NULL DESCRIPTION MESSAGE ID NUMBER NOT NULL Primary key. Message-id associated with a mail. POINTER TO BODY INTEGER NOT NULL Points to location where body is stored in file-system. SUBJECT VARCHAR(15) NULL Subject field of mail. DATE DATE NOT NULL Date when mail received. COUNT INTEGER NOT NULL Number of mailboxes sharing the mail.(should be atleast one) ATTACHMENT FLAG BOOLEAN NULL Flag to indicate if this mail has an attachment too. SIZE INTEGER NOT NULL Total size of mail.
26 More Tables Schema Stored Procedures FROM Table Metadata FIELD DATA TYPE NULL DESCRIPTION MESSAGE ID NUMBER NOT NULL Foreign key of table MAIL MESSAGE. FROM VARCHAR(15) NOT NULL Value associated with above field. TO Table Metadata FIELD DATA TYPE NULL DESCRIPTION MESSAGE ID NUMBER NOT NULL Foreign key of table MAIL MESSAGE. TO VARCHAR(15) NOT NULL Value associated with above field. CC Table Metadata FIELD DATA TYPE NULL DESCRIPTION MESSAGE ID NUMBER NOT NULL Foreign key of table MAIL MESSAGE. CC VARCHAR(15) NOT NULL Value associated with above field.
27 Tables Contd... Schema Stored Procedures USER Table Metadata FIELD DATA TYPE NULL DESCRIPTION MAIL BOX ID INTEGER NOT NULL Unique id of each user mailbox. USER ID INTEGER NOT NULL Userid of user. MESSAGE LABEL Table Metadata FIELD DATA TYPE NULL DESCRIPTION MAIL BOX ID INTEGER NOT NULL Mail-box-id of user. Foreign key to user table. MESSAGE ID INTEGER NOT NULL Message-id of mail. FK to MAIL MESSAGE TABLE. LABEL ID INTEGER NOT NULL FK to LABEL TABLE. Will be different for each user and each mail. FLAG BOOLEAN NULL Deleted, Draft, Seen/unseen,Flagged, Recent, Unsent, Labelled, Answered.
28 Tables Contd... Schema Stored Procedures SEQUENCES Table Metadata FIELD DATA TYPE NULL DESCRIPTION SEQUENCE NAME VARCHAR(5) (NOT NULL) Name of the Sequence. Primary key. CURRENT VALUE INTEGER NOT NULL Current value of the sequence. ATTACHMENTS Table Metadata FIELD DATA TYPE NULL DESCRIPTION ATTACHMENT ID VARCHAR(15) NOT NULL Identifier associated with attachment. (attribute#1 of composite key) MESSAGE ID NUMBER NOT NULL Message-id of the mail. (attribute#2 of composite key) POINTER INTEGER NULL Points to Attachment in the file system. SIZE INTEGER NULL Size of attachment. NAME VARCHAR(15) NULL Name of attachment.
29 Tables Contd... Schema Stored Procedures USER LABEL Table Metadata FIELD DATA TYPE NULL DESCRIPTION MAIL BOX ID INTEGER NOT NULL Mail-box-id of user. Foreign Key to USER TABLE LABEL ID INTEGER NOT NULL Identifier associated with this label. LABEL VARCHAR(15) NOT NULL Label name. FILTER Table Metadata FIELD DATA TYPE NULL DESCRIPTION MAIL BOX ID INTEGER NOT NULL Mail-box-id of user. Foreign Key to USER TABLE. FILTER ID INTEGER NOT NULL Id associated with a particular filter. Primary key. SIEVE CODEPTR VARCHAR(15) NOT NULL Pointer to the sieve-code.
30 Stored Procedures Schema Stored Procedures Input Headers, Pointer to Body, Pointer(s) to Attachments, Names/Sizes of attachments, Count Headers: *From, *To, *CC, Subject, Message-ID, Date ( * indicates that multiple values are possible) Pointer to Body: Points to location of body on the file-system. Body stored on file-system includes headers. Pointer(s) to Attachments: Points to location of attachments on the file-system. Count: Number of values in (To + CC + From) fields. Indicates how many users have received the same mail.
31 Tasks Performed Schema Stored Procedures Generate IDs from sequences for BODY-ID, ATTACHMENT-ID (if there are attachments) Insertions: Row: (Message-ID, From) Table: FROM Row: (Message-ID, To) Table: TO Row: (Message-ID, CC) Table: CC Row: (Attachment-ID, Message-ID, Pointer-to-Attachment, Size, Name) Table: ATTACHMENTS table. Row: (Message-ID, POINTER to BODY, Subject, Date, Count, Attachment-flag, Size) Table: MAIL MESSAGE
32 - An An Advantages of Directory Structure and Entries or Light-weight Directory Access Protocol is a TCP-IP based protocol for accessing a directory service. It has a client-server model. Used to store descriptive, attribute-based information. The information is arranged in a hierarchical structure. The data is optimised for reading. The slapd (Stand Alone daemon) daemon. Has two parts: A Front-end that handles protocol communication with clients. A Backend that handles database operations. Backends supported: LDBM, Shell, PASSWD.
33 Advantages of over Databases An Advantages of Directory Structure and Entries Why for Authentication? directories are limited but specialized databases. Compared to databases, directories are. Optimized for queries Flexible Easier to scale Simpler and cheaper to maintain.
34 Advantages of over Databases An Advantages of Directory Structure and Entries Why for Authentication? directories are limited but specialized databases. Compared to databases, directories are. Optimized for queries Flexible Easier to scale Simpler and cheaper to maintain.
35 Advantages of over Databases An Advantages of Directory Structure and Entries Why for Authentication? directories are limited but specialized databases. Compared to databases, directories are. Optimized for queries Flexible Easier to scale Simpler and cheaper to maintain.
36 Advantages of over Databases An Advantages of Directory Structure and Entries Why for Authentication? directories are limited but specialized databases. Compared to databases, directories are. Optimized for queries Flexible Easier to scale Simpler and cheaper to maintain.
37 Advantages of over Databases An Advantages of Directory Structure and Entries Why for Authentication? directories are limited but specialized databases. Compared to databases, directories are. Optimized for queries Flexible Easier to scale Simpler and cheaper to maintain.
38 Advantages of over Databases An Advantages of Directory Structure and Entries Why for Authentication? directories are limited but specialized databases. Compared to databases, directories are. Optimized for queries Flexible Easier to scale Simpler and cheaper to maintain.
39 Directory Structure An Advantages of Directory Structure and Entries
40 An Advantages of Directory Structure and Entries Definition of entries Defining the user entry Distinguished Name: uid= userid,ou=users,ou=cse,dc=iitb,dc=ac,dc=in objectclass: top account inetorgperson organizationalperson attributes: uid mail cn givenname postaladdress phone mailforwardingaddress forwardstatus (TRUE or FALSE) deliverymode Example: uid=neela,ou=users,ou=cse,dc=iitb,dc=ac,dc=in
41 Definition of entries An Advantages of Directory Structure and Entries Definition of the mailing-list entry: Distinguished Name: cn= ListName,ou=MailingLists,dc=iitb,dc=ac,dc=in (for mailing lists) objectclass: top groupofuniquenames attributes: creationdate modifieddate Distinguished Name: uid=userid,cn= ListName,ou=MailingLists,dc=iitb,dc=ac,dc=in objectclass: top person organizationalperson Example: cn=mtech1,ou=mailinglists,dc=iitb,dc=ac,dc=in
42 Example: Sending Mail An Advantages of Directory Structure and Entries
43 Example: Mail Relay An Advantages of Directory Structure and Entries
44 Advantages of our system An Advantages of Directory Structure and Entries Advantages: Faster retrieval of data. Savings in storage. Faster search. Only authorized users allowed to send mail. Mailing-list support.
45 Advantages of our system An Advantages of Directory Structure and Entries Advantages: Faster retrieval of data. Savings in storage. Faster search. Only authorized users allowed to send mail. Mailing-list support.
46 Advantages of our system An Advantages of Directory Structure and Entries Advantages: Faster retrieval of data. Savings in storage. Faster search. Only authorized users allowed to send mail. Mailing-list support.
47 Advantages of our system An Advantages of Directory Structure and Entries Advantages: Faster retrieval of data. Savings in storage. Faster search. Only authorized users allowed to send mail. Mailing-list support.
48 Advantages of our system An Advantages of Directory Structure and Entries Advantages: Faster retrieval of data. Savings in storage. Faster search. Only authorized users allowed to send mail. Mailing-list support.
49 References An Advantages of Directory Structure and Entries dirsvcs
50 An Advantages of Directory Structure and Entries Graph: Database based sytem Vs File system Based system
51 The End An Advantages of Directory Structure and Entries THANK YOU
Mail system components. Electronic Mail MRA MUA MSA MAA. David Byers
Electronic Mail PRINCIPLES DNS ARCHITECTURES SPAM Mail system components () () David Byers MRA [email protected] IDA/ADIT/IISLAB Mail User Agent Reads and writes e-mail Writes e-mail to using (usually)
How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (
GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
Mail agents. Introduction to Internet Mail. Message format (2) Authenticating senders
Mail agents Introduction to Internet Mail Philip Hazel University of Cambridge MUA = Mail User Agent Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom, Mulberry,
Steps to setup authentication and enrolment through LDAP protocol
Steps to setup authentication and enrolment through LDAP protocol Step 1: Authentication The web user try to get inside Moodle. Moodle will recognize him/her only if his credentials are found inside Accounts
Getting Started Guide
Getting Started Guide Mulberry IMAP Internet Mail Client Versions 3.0 & 3.1 Cyrusoft International, Inc. Suite 780 The Design Center 5001 Baum Blvd. Pittsburgh PA 15213 USA Tel: +1 412 605 0499 Fax: +1
Mail Avenger. David Mazières New York University
Mail Avenger David Mazières New York University Early design goals for email Work over weakly connected networks - E.g., early Internet, UUCP, etc. - Move mail closer to recipient whenever you can... -
POP3 Connector for Exchange - Configuration
Eclarsys PopGrabber POP3 Connector for Exchange - Configuration PopGrabber is an excellent replacement for the POP3 connector included in Windows SBS 2000 and 2003. It also works, of course, with Exchange
Email Configuration Network Management Card-2
Email Configuration Network Management Card-2 AP9630, AP9631 and 2GrPDUs(AP8XXX) Email Overview The NMC can be configured to send email to up to four recipients when it encounters a problem or event selected
SMTP Servers. Determine if an email message should be sent to another machine and automatically send it to that machine using SMTP.
SMTP Servers SMTP: Simple Mail Transfer Protocol (TCP Port 25) The Simple Mail Transfer Protocol (SMTP) is an Internet standard for transferring electronic mail between computers. UNIX systems implement
QMAIL & SMTP: A Secure Application for an Unsecure Protocol. Orr Dunkelman. [email protected]. January 27, 2004 SMTP and QMAIL Slide 1
QMAIL & SMTP: A Secure Application for an Unsecure Protocol Orr Dunkelman January 27, 2004 SMTP and QMAIL Slide 1 SMTP, MUA and MTA Speak English Whenever we deal with protocols we (=Internet geeks) like
Practical LDAP on Linux
Practical LDAP on Linux A practical guide to integrating LDAP directory services on Linux Michael Clark http://gort.metaparadigm.com/ldap/ Aug-23-02 1 Presentation Overview The
BillMax Ticketing Installation and Usage Guide
BillMax Billing Solutions The ispark Group, Inc. PO Box 1947 Colleyville, TX, 76034 USA 877.245.5629 817.446.7776 Fax 817.446.7773 BillMax Documentation Copyright 1994-2014 The ispark Group, Inc. Documentation
Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server.
Collax Mail Server Howto This howto describes the setup of a Collax server as mail server. Requirements Collax Business Server Collax Groupware Suite Collax Platform Server including Collax Communication
Peer-to-Peer Support for Distributed Mail Transfer Mechanism. Abstract
Peer-to-Peer Support for Distributed Mail Transfer Mechanism Kai-Hsiang Yang, Jenq-Haur Wang, Chi-Chien Pan, and Tzao-Lin Lee Department of Computer Science and Information Engineering, National Taiwan
GFI Product Guide. GFI MailArchiver Archive Assistant
GFI Product Guide GFI MailArchiver Archive Assistant The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either
Simple Mail Transfer Protocol
Page 1 of 6 Home : Network Programming Simple Mail Transfer Protocol Contents What is SMTP? Basics of SMTP SMTP Commands Relaying of Messages Time Stamps and Return Path in Message Header Mail Exchangers
Configuring and Using the TMM with LDAP / Active Directory
Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring
Integrated Migration Tool
IceWarp Unified Communications Integrated Migration Tool Version 10.4 Printed on 16 April, 2012 Contents Integrated Migration Tool 1 How It Works... 2 Performing Migration... 3 Set up the Domain in IceWarp
Email Electronic Mail
Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing
Applications and Services. DNS (Domain Name System)
Applications and Services DNS (Domain Name Service) File Transfer Protocol (FTP) Simple Mail Transfer Protocol (SMTP) Malathi Veeraraghavan Distributed database used to: DNS (Domain Name System) map between
Emacs SMTP Library. An Emacs package for sending mail via SMTP. Simon Josefsson, Alex Schroeder
Emacs SMTP Library An Emacs package for sending mail via SMTP Simon Josefsson, Alex Schroeder Copyright c 2003, 2004 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify
Configuring MDaemon for Centralized Spam Blocking and Filtering
Configuring MDaemon for Centralized Spam Blocking and Filtering Alt-N Technologies, Ltd 2201 East Lamar Blvd, Suite 270 Arlington, TX 76006 (817) 525-2005 http://www.altn.com July 26, 2004 Contents A Centralized
Chapter 3 Authenticating Users
Chapter 3 Authenticating Users Remote users connecting to the SSL VPN Concentrator must be authenticated before being allowed to access the network. The login window presented to the user requires three
Cryoserver Archive Lotus Notes Configuration
Lotus Notes Configuration Version 1.0 December 2007 Forensic & Compliance Systems Ltd +44 (0)800 280 0525 [email protected] www.cryoserver.com Contents INTRODUCTION... 3 SMTP ROUTING TO CRYOSERVER...
Libra Esva. Whitepaper. Glossary. How Email Really Works. Email Security Virtual Appliance. May, 2010. It's So Simple...or Is It?
Libra Esva Email Security Virtual Appliance Whitepaper May, 2010 How Email Really Works Glossary 1 2 SMTP is a protocol for sending email messages between servers. DNS (Domain Name System) is an internet
Guardian Digital Secure Mail Suite Quick Start Guide
Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................
User Management Resource Administrator. Managing LDAP directory services with UMRA
User Management Resource Administrator Managing LDAP directory services with UMRA Copyright 2005, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted
GFI Product Manual. GFI MailArchiver Outlook Addon
GFI Product Manual GFI MailArchiver Outlook Addon The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
How To Upgrade To Symantec Mail Security Appliance 7.5.5
Release notes Information Foundation 2007 Symantec Mail Security Appliance 7.5 Copyright 1999-2007 Symantec Corporation. All rights reserved. Before installing or upgrading: Migration issues If you are
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory
Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory May 21, 2014 This edition of this document applies to Piston OpenStack 3.0. To send us your comments about this document, e-mail [email protected].
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
Implementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
SpamPanel Email Level Manual Version 1 Last update: March 21, 2014 SpamPanel
SpamPanel Email Level Manual Version 1 Last update: March 21, 2014 SpamPanel Table of Contents Incoming... 1 Incoming Spam Quarantine... 2 Incoming Log Search... 4 Delivery Queue... 7 Report Non-Spam...
2014-10-07. Email security
Email security Simple Mail Transfer Protocol First defined in RFC821 (1982), later updated in RFC 2821 (2001) and most recently in RFC5321 (Oct 2008) Communication involves two hosts SMTP Client SMTP Server
Technical Bulletin 005 Revised 2010/12/10
sitesecuresoftware.com Site-Secure Facility & Security Management Software Technical Bulletin 005 Revised 2010/12/10 Search Active Directory from SQL Server 2000-2005 Table of Contents Introduction...
The Integration of LDAP into the Messaging Infrastructure at CERN
The Integration of LDAP into the Messaging Infrastructure at CERN Ray Jackson CERN / IT-IS Group 29 Nov 2000 16:00 CERN IT Auditorium, bldg. 31, 3-005 A bit about me Technical Student Sep 1997-1998 in
Internet Technology 2/13/2013
Internet Technology 03r. Application layer protocols: email Email: Paul Krzyzanowski Rutgers University Spring 2013 1 2 Simple Mail Transfer Protocol () Defined in RFC 2821 (April 2001) Original definition
SQL Server An Overview
SQL Server An Overview SQL Server Microsoft SQL Server is designed to work effectively in a number of environments: As a two-tier or multi-tier client/server database system As a desktop database system
Lesson Plans Configuring Exchange Server 2007
Lesson Plans Configuring Exchange Server 2007 (Exam 70-236) Version 2.1 Table of Contents Course Overview... 2 Section 1.1: Server-based Messaging... 4 Section 1.2: Exchange Versions... 5 Section 1.3:
Configuring Security for SMTP Traffic
4 Configuring Security for SMTP Traffic Securing SMTP traffic Creating a security profile for SMTP traffic Configuring a local traffic SMTP profile Assigning an SMTP security profile to a local traffic
LDAP and Active Directory Guide
LDAP and Active Directory Guide Contents LDAP and Active Directory Guide...2 Overview...2 Configuring for LDAP During Setup...2 Deciding How to Use Data from LDAP... 2 Starting the Setup Tool... 3 Configuring
Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.
Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform
SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel
SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel Table of Contents Domains... 1 Add Domain... 2 MX verification Tool... 4 Overview... 5 Incoming... 6 Incoming Bandwidth Overview...
Articles Fighting SPAM in Lotus Domino
Page 1 of 5 Articles Fighting SPAM in Lotus Domino For many e-mail administrators these days, the number one complaint from the users and managers is unsolicited emails flooding the system, commonly called
CS 164 Winter 2009 Term Project Writing an SMTP server and an SMTP client (Receiver-SMTP and Sender-SMTP) Due & Demo Date (Friday, March 13th)
CS 164 Winter 2009 Term Project Writing an SMTP server and an SMTP client (Receiver-SMTP and Sender-SMTP) Due & Demo Date (Friday, March 13th) YOUR ASSIGNMENT Your assignment is to write an SMTP (Simple
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist.
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Outline 1. What is authentication? a. General Informations 2. Authentication Systems in Linux a. Local
MOC 5047B: Intro to Installing & Managing Microsoft Exchange Server 2007 SP1
MOC 5047B: Intro to Installing & Managing Microsoft Exchange Server 2007 SP1 Course Number: 5047B Course Length: 3 Days Certification Exam This course will help you prepare for the following Microsoft
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
Deploying ModusGate with Exchange Server. (Version 4.0+)
Deploying ModusGate with Exchange Server (Version 4.0+) Active Directory and LDAP: Overview... 3 ModusGate/Exchange Server Deployment Strategies... 4 Basic Requirements for ModusGate & Exchange Server
E-mail Listeners. E-mail Formats. Free Form. Formatted
E-mail Listeners 6 E-mail Formats You use the E-mail Listeners application to receive and process Service Requests and other types of tickets through e-mail in the form of e-mail messages. Using E- mail
Internet infrastructure. Prof. dr. ir. André Mariën
Internet infrastructure Prof. dr. ir. André Mariën 1 Lightweight Directory Access Protocol 2 Object Identifier Representation: dotted decimal OID not intended for end-users Universally unique Example:
Integration Client Guide
Integration Client Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
CISNTWK-492e. Microsoft Exchange Server 2003 Administration. Chapter Five Managing Addresses
CISNTWK-492e Microsoft Exchange Server 2003 Administration Chapter Five Managing Addresses 1 Objectives Understand and create the different types of address lists that are used within Exchange Server 2003
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
Email, SNMP, Securing the Web: SSL
Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan
LISTSERV LDAP Documentation
LISTSERV LDAP Documentation L Soft Sweden AB 2007 28 November 2007 Overview LISTSERV version 15.5 can interface to LDAP servers to authenticate user logins, to insert LDAP attributes in mail merge distributions
GFI Product Guide. Archive Assistant
GFI Product Guide Archive Assistant The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied,
Networking Applications
Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Electronic Mail 1 Outline Introduction SMTP MIME Mail Access
Cloud. Hosted Exchange Administration Manual
Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...
What is a Mail Gateway?... 1 Mail Gateway Setup... 2. Peering... 3 Domain Forwarding... 4 External Address Verification... 4
Contents CHAPTER 1 IMail Secure Server as a Mail Gateway What is a Mail Gateway?... 1 Mail Gateway Setup... 2 CHAPTER 2 Possible Mail Gateway Configurations Peering... 3 Domain Forwarding... 4 External
Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started
Webmail User Manual Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Chapter 2 MAILENABLE KEY FEATURES OVERVIEW...
Chakchai So-In, Ph.D.
Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon
Technology Primer. OPS Manager, Release 7.4. Integrating Your Directory Server with our Directory Service Solution
Technology Primer OPS Manager, Release 7.4 Integrating Your Directory Server with our Directory Service Solution The Mitel Integrated Directory Services (IDS) application synchronizes the telephone directory
MailStore Server 5.0 Documentation
MailStore Server 5.0 Documentation 2010 deepinvent Software GmbH 24. May 2011 Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners.
SMTP-32 Library. Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows. Version 5.2
SMTP-32 Library Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows Version 5.2 Copyright 1994-2003 by Distinct Corporation All rights reserved Table of Contents 1 Overview... 5 1.1
Outlook Live Basics. for Students
Outlook Live Basics for Students 2 Outlook Live for Support Staff Outlook Live for Support Staff 3 Getting Started... 6 Signing into your Outlook Account... 6 Migrating your Account... 8 Address Book...
Technical Note. FORTIMAIL Configuration For Enterprise Deployment. Rev 2.1
Technical Note FORTIMAIL Configuration For Enterprise Deployment Rev 2.1 April 7, 2009 Table of Contents 1 Introduction... 3 1.1 Objective... 3 1.2 Network deployment... 3 1.3 Convention... 3 2 System
Using Outlook Web App
Using Outlook Web App About Outlook Web App Using a web browser and the Internet, Outlook Web App (OWA) provides access to your Exchange mailbox from anywhere in the world at any time. Outlook Web App
Geodatabase Programming with SQL
DevSummit DC February 11, 2015 Washington, DC Geodatabase Programming with SQL Craig Gillgrass Assumptions Basic knowledge of SQL and relational databases Basic knowledge of the Geodatabase We ll hold
Administrator Quick Start Guide
Administrator Quick Start Guide - Index 1. Cloud Email Firewall Introduction 2. Licensing model 3. Initial Cloud Email Firewall configuration 3.1 Cloud Email Firewall Inbound email filtering 3.1.1 Domain
Email. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Email Daniel Zappala CS 460 Computer Networking Brigham Young University How Email Works 3/25 Major Components user agents POP, IMAP, or HTTP to exchange mail mail transfer agents (MTAs) mailbox to hold
Your Question. Article: 00065 Question: How do I Configure LDAP with Net Report?
Your Question Article: 00065 Question: How do I Configure LDAP with Net Report? Net Report Answer Introduction This Article explains how to create either an Internal LDAP Server Connection or a Microsoft
Installing GFI MailArchiver
Installing GFI MailArchiver Introduction This chapter highlights important points you should take into consideration before installing GFI MailArchiver on your network, so that you can make the best decisions
Appendix. Web Command Error Codes. Web Command Error Codes
Appendix Web Command s Error codes marked with * are received in responses from the FTP server, and then returned as the result of FTP command execution. -501 Incorrect parameter type -502 Error getting
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
Protected Trust Directory Sync Guide
Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide 2 Overview Protected Trust Directory Sync enables your organization to synchronize the users and distribution lists in Active Directory
Configure a Mail Server
SECTION 3 Configure a Mail Server In this section of the workbook, you learn how to do the following: Send Mail to root on 3-3 In this exercise, you send an email to user root using the mail command and
How To Block Ndr Spam
How to block NDR spam Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory
HYPER MEDIA MESSAGING
Email based document interchange known as messaging service and contribute to corporate productivity in following ways 1. it strengthens the automation of documentation life cycle 2. It allows document
Change is Coming: z/os Mail Overview and Futures
Change is Coming: z/os Mail Overview and Futures (Including Motivations and Considerations for migrating from SMTPD/Sendmail to CSSMTP) Kim Bailey ([email protected]) IBM, Enterprise Networking Solutions
Remote login (Telnet):
SFWR 4C03: Computer Networks and Computer Security Feb 23-26 2004 Lecturer: Kartik Krishnan Lectures 19-21 Remote login (Telnet): Telnet permits a user to connect to an account on a remote machine. A client
Cannot send Autosupport e-mail, error message: Unknown User
Cannot send Autosupport e-mail, error message: Unknown User Symptoms Unable to send Autosupport e-mails and the following error message is reported: asup.smtp.fail http://now.netapp.com/eservice/ems?emsaction=details&eventid=200573&software=ontap&em
DB2 - DATABASE SECURITY
DB2 - DATABASE SECURITY http://www.tutorialspoint.com/db2/db2_database_security.htm Copyright tutorialspoint.com This chapter describes database security. Introduction DB2 database and functions can be
RFC 821 SIMPLE MAIL TRANSFER PROTOCOL. Jonathan B. Postel. August 1982
RFC 821 SIMPLE MAIL TRANSFER PROTOCOL Jonathan B. August 1982 Information Sciences Institute University of Southern California 4676 Admiralty Way Marina del Rey, California 90291 (213) 822-1511 RFC 821
PageScope Router. Version 1.5. Configuration Guide
PageScope Router Version 1.5 Configuration Guide Table of Contents TABLE OF CONTENTS... 2 1. Introduction...3 1.1 IP Address and Domain Name...3 2. Sending Files to PageScope Router...4 2.1 MFP Device
How To Use The Policy Patrol Archiver Server
POLICY PATROL ARCHIVER FOR ADMINISTRATORS Manual MANUAL Policy Patrol Archiver For Administrators This manual, and the software described in this manual, are copyrighted. No part of this manual or the
Introduction... 1. Installing and Configuring the LDAP Server... 3. Configuring Yealink IP Phones... 30. Using LDAP Phonebook...
Introduction... 1 Installing and Configuring the LDAP Server... 3 OpenLDAP... 3 Installing the OpenLDAP Server... 3 Configuring the OpenLDAP Server... 4 Configuring the LDAPExploreTool2... 8 Microsoft
New SMTP client for sending Internet mail
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server New SMTP client for sending Internet mail z/os Communications Server Development, Raleigh, North Carolina This presentation
