Storing SpamAssassin User Data in a SQL Database Michael Parker. [ Start Slide ] Welcome, thanks for coming out today.
|
|
|
- Bernard Pierce
- 9 years ago
- Views:
Transcription
1 Storing SpamAssassin User Data in a SQL Database Michael Parker [ Start Slide ] Welcome, thanks for coming out today. [ Intro Slide ] Like most open source software, heck software in general, SpamAssassin has grown up over time. This means that sometimes we get really cool features that may or may not work and play well with others. Three of these features are SQL user preferences, auto whitelist and bayes. Using these features you can move practically all of your user stored data off the disk and into a database. Well, I know it's most likely still on a disk if you're using SQL storage, when I say disk I mean local disk, and when I say local disk I mean user home directories or virtual config directories. In some setups, managing that information is a nightmare, and that's what I'd like to try and get rid of. [ General Database Setup Slide ] Before we get into each feature, I'd like to talk a little bit about general database setup. Each of these features makes use of perl's DBI database access module. This means that you need to install the appropriate driver (DBD) module for whatever database you choose to use. For more information see the DBI/DBD documentation, O'Reilly DBI book, DBI mailing lists, etc Honestly, there are so many different database setups it would be nearly impossible to cover them all. For consistencies sake I'm going to talk in terms of MySQL for most of my examples. That in no shape or form means that things aren't supported in other database engines. There are some cases where certain database engines may not work well. I will cover those and the reasons why. If you have strong feelings about a particular database engine and find that it doesn't work well with SpamAssassin I encourage you to work with the developers to help make it better. We've only got so much time and so much access to systems to work on the things. When setting up your database connection in SpamAssassin you basically need three pieces of information, the data source definition and assuming your database requires them a username and password. [ Determine your DSN Slide ] The data source, or DSN, tells DBI what database driver to load and provides connection
2 information to that driver. You should read the documentation for your particular driver to determine the proper information needed. Here are some examples. Obviously it's important to get this part right, otherwise everything just won't work correctly. [ Database Architecture Slide ] Whole sessions, heck whole conferences, can be spent on how to properly architect your database, so I'm not going to get into it much here. However, there are some considerations you can take into account. If you're architecting for a high traffic site then you might consider several options to help alleviate the load. One option, is to use multiple databases. This gives you lots of options on how to handle the data. You can put database files on separate disks, give different permissions or make them different types. Another option, once you've split up your databases, is putting the databases on separate physical machines. This gives you tons of options. One drastic option is different database engines all together. You can put your user preferences database on PostgreSQL, your auto whitelist on SQLite and bayes on MySQL. Obviously, this would be odd, but you could do it if you wanted to. [ Basic Setup Slide ] Here is the basic setup for a MySQL and PostgreSQL database. This sets up a single database, spamassassin, with access for a single user, sauser. MySQL mysql u <adminusername> p mysql Enter password: <adminpassword> mysql> create database spamassassin; mysql> grant all on spamassassin.* to sauser@localhost identified by 'spamki11er'; PostgreSQL psql U <adminusername> template1 template1=# CREATE USER sauser PASSWORD 'spamki11er'; template1=# CREATE DATABASE spamassassin OWNER = sauser; [ User Preferences Intro Slide ]
3 Storing of user preferences in a database is a fairly simplistic process. Configuration options are stored in the database in key/value pairs, or more correctly preference/value pairs. These pairs are selected based on username, more on that in a minute, and feed into the config parser. One thing that can be very confusing, depending on your setup, is how the username is determined by SpamAssassin, and in this case spamd. Simply put, it uses whatever username is passed in via the spamd protocol. If you use spamc, you can either specify the username on the command line (via u) or let it figure out the username on it's own by looking up the passwd information for the effective uid currently running spamc. Other systems are responsible for using the User header in the spamd protocol to send the username. [ User Preferences Database Setup Slide ] User preferences setup is pretty easy. In theory you've already created the database and user so you can go ahead and create the userpref table: CREATE TABLE userpref ( username varchar(100) NOT NULL default '', preference varchar(30) NOT NULL default '', value varchar(100) NOT NULL default '', prefid int(11) NOT NULL auto_increment, PRIMARY KEY (prefid), KEY username (username) ) TYPE=MyISAM; You can either enter the create table command directly or use the supplied definitions in the sql directory and run them using your database command line tool, for example: mysql u<adminusername> p spamassassin < userpref_mysql.sql Enter password: <adminpassword> [ User Preferences Configuration slide ] You then just need to setup the proper config options, setting the DSN for your database and then username and password, if required. user_scores_dsn user_scores_sql_username user_scores_sql_password dbi:mysql:spamassassin sauser spamki11er [ spamd startup/debug slide ]
4 Once that is done, you can restart spamd, this time using the q or Q command line parameters and you are all set. In addition, you will need too run with x to keep spamd from attempting to look up user_prefs files. /usr/bin/spamd x q If you run spamd in debug mode, with D, then you will be able to see where it attempts to find the user prefs in the database when a message is sent to be scanned. logmsg: connection from localhost [ ] at port debug: Conf::SQL: executing SQL: select preference, value... debug: retrieving prefs for [email protected] from SQL server debug: user has changed If you have any problems you can plug the SQL statement from the debug into your database and see what sort of information is returned and then adjust your database accordingly. [ Populating userpref Table slide ] Populating your database is very simple, for each user and config option you just need to insert a row into the database. insert into userpref (username, preference, value) VALUES ('@GLOBAL', 'required_score', '10.0'); insert into userpref (username, preference, value) VALUES ('@GLOBAL', 'whitelist_from', '*@apache.org'); insert into userpref (username, preference, value) VALUES ('[email protected]', 'required_score', '5.5'); insert into userpref (username, preference, value) VALUES ('[email protected]', 'whitelist_from', '[email protected]'); insert into userpref (username, preference, value) VALUES ('[email protected]', 'blacklist_from', '*@spamking.com'); When scanning a message for [email protected] then the global score of 10 will be overridden by the user specific 5.5. The address [email protected] is added the global whitelist_from list of *@apache.org. Finally, *@spamking.com is added to the users blacklist_from.
5 [ GUI Frontends Slide ] Obviously for large installations you aren't going to be manually inserting rows into the database. There are several different GUI front ends to help in this manner. Honestly, I don't have much experience with them and can not recommend any. There are a collection of links available on the SpamAssassin wiki: I would encourage you to experiment and find the one that works best for you. This may also be something that building your own becomes feasible since the interface is so simple and 9 times out of 10 you'll want to heavily customize the offering anyway. [ Creating a Custom SQL Query Slide ] There are many cases where you might not want to operate in the default configuration. Maybe you need to change the table name to match with an external system, or maybe you would like to join with another table to get some additional information. Creating a custom SQL query is the way to do that. The default query is pretty simple, select everything from the table where the username matches the given username and order by the username. This gives you the ability to have global user preferences than can be overridden by the the individual users preferences. Really, the sky is the limit here. The feature after all is to help handle all of the cases where you might want to use SpamAssassin that we can't think of and don't want to have to add special handler code for. Some ideas that you might be interested in. Maybe, just changing the name of the user preferences table, or maybe you want to change how global preferences are sorted so they override the individual user preferences. It is also a method for providing domain based global preferences. [ Custom SQL Query Variables Slide ] Here we see the _USERNAME_ variable which corresponds to the current users username, as determined by SpamAssassin or passed into spamd. _DOMAIN_ is the portion of the username that comes after (at sign). In the case that the username doesn't have (at sign) then the _DOMAIN_ value will be blank. Other variables available are _MAILBOX_ which is the part of the username before (at sign). If you happen to compare the docs to this slide then you'll notice that the _TABLE_ variable is missing. To tell the truth, _TABLE_ is next to worthless, there is no way to change what table name gets inserted there, it will always be userpref. So if you need to
6 change it you just hard code the table name in your query. [ Auto Whitelist Intro slide ] We all know that the majority of development in open source software is based on someone scratching an itch. That is exactly how I started working on storing autowhitelist and bayes data in a SQL database. I figured, if I can store user preferences in the database, why not other data and why hadn't someone already thought about it. Sure enough, I checked Bugzilla there already was a bug. When I started looking into the possibilities it became obvious that the task would be easy on one hand, and somewhat difficult on the other. The easy part came about because several subsystems in SpamAssassin make use of storage APIs, so it would be easy enough to code up a SQL based module and simply plug it in. The hard part was that bayes had a storage API that was highly geared towards DBM based databases. With auto whitelist having the cleanest storage API, it was easy to get going quickly, so we'll start with that. Plus, setup and use is really simplistic, it really takes care of itself once it is up an running. The auto whitelist API is dead simple, get an entry, add score to an entry and remove an entry. I had an implementation in a day or so, although it took a week or so for me to get up enough nerve to actually put it into production. Once I did, I never looked back. [ Auto Whitelist Database Setup ] Setting up auto whitelist for SQL is fairly straight forward. The first thing you need to do is create your table space. Setup is very similar to the userpref table, assuming you've already created the database and user login, you can either cut and paste the create table command directly or run the create sql file located in the sql directory. CREATE TABLE awl ( username varchar(100) NOT NULL default '', varchar(200) NOT NULL default '', ip varchar(10) NOT NULL default '', count int(11) default '0', totscore float default '0', PRIMARY KEY (username, ,ip) ) TYPE=MyISAM; mysql u<adminusername> p spamassassin < awl_mysql.sql Enter password: <adminpassword> [ Auto Whitelist Configuration slide ]
7 Unlike user preferences, auto whitelist does not require spamd to use the SQL based storage. Once turned on and configured you can use it via spamd, spamassassin or the SpamAssassin API. By default, auto whitelist is turned on in 3.0. You can control the behavior with the use_auto_whitelist config option. You then have to setup the auto whitelist specific DSN, username and password: user_awl_dsn user_awl_sql_username user_awl_sql_password dbi:mysql:spamassassin sauser spamki11er You specify the specific storage back end using the auto_whitelist_factory config option. This option takes the name of a module that implements the Address List API. In this case, Mail::SpamAssassin::SQLBasedAddrList or: auto_whitelist_factory Mail::SpamAssassin::SQLBasedAddrList [ Your Mother Doesn't Live Here. Clean up Your Own Mess slide ] With auto whitelist, there is very little maintenance, it just works. One issue with auto whitelist in general is that there is no expiration. This is something that developers are aware of and plan to fix in a future release. With SQL you have some options to solve this problem on your own. There is certainly more than one solution. I've worked around this by adding a lastupdate column to the database with a TIMESTAMP type in MySQL. This causes the column to get updated with the latest time whenever the row is updated. You can then perform all sorts of queries to expire your auto whitelist data. CREATE TABLE awl ( username varchar(100) NOT NULL default '', varchar(200) NOT NULL default '', ip varchar(10) NOT NULL default '', count int(11) default '0', totscore float default '0', lastupdate timestamp(14) NOT NULL, PRIMARY KEY (username, ,ip) ) TYPE=MyISAM; [ Roll Your Own Expiration slide ] Here are a couple of examples, obviously, MySQL specific:
8 For instance, if you want to delete all auto whitelist data that has not been updated in the last six months: DELETE FROM awl WHERE lastupdate <= DATE_SUB(SYSDATE(), INTERVAL 6 MONTH); Or just get rid of all the single count (ie only one message received) entries that haven't been updated in the last 30 days: DELETE FROM awl WHERE count = 1 AND lastupdate <= DATE_SUB(SYSDATE(), INTERVAL 30 DAY); Delete possibly statistically insignificant tokens: DELETE FROM awl WHERE totscore/count <.1 AND totscore/count >.1; [ Bayes Intro Slide ] To me, especially in a virtual user environment, moving bayes data into SQL just makes sense, but I might be a little biased. And if you're doing bayes sitewide, I think it is totally worth it. You'll no longer have to worry about odd permission or ownership problems of you bayes files. After getting the auto whitelist SQL back end done, I turned my attention to bayes. It turned out to be a much larger chore than I first envisioned. The bayes storage API was VERY, and I mean VERY, DBM specific, in some aspects it still is. The first task was to do my best to extract out the best possible storage API, either pushing functions down into a specific DBM module or pulling them out into a high level BayesStore module. Once I had that done and a decent SQL implementation we were all set. [ Bayes Database Setup Slide ] The bayes tables are slightly more complicated than user preferences and auto whitelist. The setup consists of 6 different tables required for operation. mysql u <adminusername> p spamassassin < bayes_mysql.sql Enter password: <adminpassword> [ Bayes Config Slide ] The bayes config options are very similar to the other subsystems bayes_store_module bayes_sql_dsn Mail::SpamAssassin::BayesStore::SQL dbi:mysql:spamassassin
9 bayes_sql_username bayes_sql_password bayes_sql_override_username sauser spamki11er sitewideuser [ Converting from DBM to SQL ] If you are looking to convert your Bayes database from DBM to SQL then you will want to use the backup and restore sa learn options. First off, if you haven't yet upgraded to 3.0 then do that and follow the procedure in UPGRADE to get your bayes database upgraded to the new format. Once you are up and running under 3.0 the procedure is very simple: 1) run sa learn backup > backup.txt 1a) You can optionally run sa learn clear here to remove the old DBM based files. 2) Switch your local.cf config to use SQL based bayes 3) run sa learn restore backup.txt [ Bayes using Postgres ]... [ Future Directions Slide ] Obviously, SpamAssassin is always evolving and you have got to keep an eye on the future. Here are a few future related items you might be interested in. I will say, as with any open source project, if you would like to dive in and implement one of these items, patches are more than welcome. o Learning Support for spamd In a virtual user environment it can be somewhat of a burden to have to run sa learn from the command line to populate the bayes database. By adding learning support to the spamd protocol you'll be able to learn from anywhere and any client. That way you can build learning directly into your mail client rather than jumping through hoops with shared IMAP mailboxes or forwarding aliases. o Persistent Database Connections
10 Part by necessity, you can after all choose to use just 1 or all of these subsystems together, and part because they all came about at different times the subsystems do not share database connections. That means that if you use SQL for user preferences, autowhitelist and Bayes storage then you will open up 3 (possibly more) separate database connections per message. With MySQL, where it is very cheap to create a new connection this works out ok, but for other systems it can cause a problem. The goal is to basically create a pool of database connections per child that can be reused for each connection. You might be able to simulate this behavior using DBD::Proxy. o Better PostgreSQL Support Perhaps I should say, better non MySQL support, but lets not split hairs. As we saw, PostgreSQL just does not perform well. I really don't know how well other database engines perform, mostly because I haven't been able to test and benchmark them. If you have a favorite database (other than MySQL and PostgreSQL) feel free to contact me, I'll be happy to help you get setup and running and we'll see about doing some benchmarks. o Journal Like Support One advantage that DBM based storage has over SQL is its use of a journal file for token updates. SQL has to update the token information directly in the database. Several options exist and I started exploring several of them but the code got to the point that scanning was actually faster than DBM (even with the journal active) so I stopped. However, it could possibly help speed up learning so it is something I would like to address in the future.
My Secure Backup: How to reduce your backup size
My Secure Backup: How to reduce your backup size As time passes, we find our backups getting bigger and bigger, causing increased space charges. This paper takes a few Newsletter and other articles I've
Simple Disaster Recovery
Simple Disaster Recovery OVERVIEW NetHelpDesk is unlike most products in the market in so many ways. One of the most notable is the simple disaster recovery (DR) procedure that you can follow, to ensure
Module 6.3 Client Catcher The Sequence (Already Buying Leads)
Module 6.3 Client Catcher The Sequence (Already Buying Leads) Welcome to Module 6.3 of the Client Catcher entitled The Sequence. I recently pulled over 300 of the local lead generation explosion members
mylittleadmin for MS SQL Server 2005 from a Webhosting Perspective Anthony Wilko President, Infuseweb LLC
mylittleadmin for MS SQL Server 2005 from a Webhosting Perspective Anthony Wilko President, Infuseweb LLC April 2008 Introduction f there's one thing constant in the IT and hosting industries, it's that
Getting Started with WebSite Tonight
Getting Started with WebSite Tonight WebSite Tonight Getting Started Guide Version 3.0 (12.2010) Copyright 2010. All rights reserved. Distribution of this work or derivative of this work is prohibited
IceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
Troubleshooting / FAQ
Troubleshooting / FAQ Routers / Firewalls I can't connect to my server from outside of my internal network. The server's IP is 10.0.1.23, but I can't use that IP from a friend's computer. How do I get
Using ODBC with MDaemon 6.5
Using ODBC with MDaemon 6.5 Alt-N Technologies, Ltd 1179 Corporate Drive West, #103 Arlington, TX 76006 Tel: (817) 652-0204 2002 Alt-N Technologies. All rights reserved. Other product and company names
Fasthosts Internet Parallels Plesk 10 Manual
Fasthosts Internet Parallels Plesk 10 Manual Introduction... 2 Before you begin... 2 Logging in to the Plesk control panel... 2 Securing access to the Plesk 10 control panel... 3 Configuring your new server...
Android Programming Family Fun Day using AppInventor
Android Programming Family Fun Day using AppInventor Table of Contents A step-by-step guide to making a simple app...2 Getting your app running on the emulator...9 Getting your app onto your phone or tablet...10
Next Generation Tech-Talk. Cloud Based Business Collaboration with Cisco Spark
Next Generation Tech-Talk Cloud Based Business Collaboration with Cisco Spark 2 [music] 00:06 Phil Calzadilla: Hello, hello! Welcome. This is Phil Calzadilla founder and CEO of NextNet Partners, and I'd
DARMADI KOMO: Hello, everyone. This is Darmadi Komo, senior technical product manager from SQL Server marketing.
Microsoft SQL Server 2012 for Private cloud (Part 1) Darmadi Komo - Senior Technical Product Manager DARMADI KOMO: Hello, everyone. This is Darmadi Komo, senior technical product manager from SQL Server
Kerberos planning, and then we're going to take a deep dive look at how we actually configure Kerberos for the relational database engine.
Configuring and Securing Complex BI Applications in a SharePoint 2010 Environment with SQL Server 2012 Tom Wisnowski - Architect, Microsoft Consulting Service Hello. Welcome to Configuring and Securing
AliOffice 2.0 Installation Guide
January 25, 2012 AliOffice 2.0 Installation Guide Overview This document contains instructions for installing AliOffice and readying the application for the completion and submission of compliance evaluations.
Introduction to Open Atrium s workflow
Okay welcome everybody! Thanks for attending the webinar today, my name is Mike Potter and we're going to be doing a demonstration today of some really exciting new features in open atrium 2 for handling
10 Tips & Tricks to Using Open Atrium
10 Tips & Tricks to Using Open Atrium Welcome to ten tips and tricks for getting the most out of Open Atrium. I m Karen Borchert, I m the EVP of strategy at Phase2 and I serve as the product lead for Open
Frequently Asked Questions: Cisco Jabber 9.x for Android
Frequently Asked Questions Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions (FAQs) 2 Setup 2 Basics 4 Connectivity 8 Calls 9 Contacts and Directory Search 14 Voicemail
This manual will also describe how to get Photo Supreme SQLServer up and running with an existing instance of SQLServer.
1 Installation Manual SQL Server 2012 Photo Supreme Introduction Important note up front: this manual describes the installation of Photo Supreme with SQLServer. There is a free SQLServer version called
Pine Exchange mini HOWTO
Pine Exchange mini HOWTO Alexandru Roman v1.0, 2002 03 28 Revision History Revision 1.0 2002 03 28 Revised by: ar Submitted to the LDP for publication. Revision 0.3 2002 03 25 Revised
Plesk 11 Manual. Fasthosts Customer Support
Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...
CentovaCast 3 - Broadcasting With VirtualDJ
CentovaCast 3 - Broadcasting With VirtualDJ In this tutorial we are going to be taking a look at how to broadcast to our premium service running under CentovaCast 3 using VirtualDJ. Differences Between
Introduction. Just So You Know... PCI Can Be Difficult
Introduction For some organizations, the prospect of managing servers is daunting. Fortunately, traditional hosting companies offer an affordable alternative. Picking the right vendor and package is critial
Enterprise Remote Control 5.6 Manual
Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Contents Release Notes... ... 3 System Requirements... ... 4 Administering Jive for Office... ... 5
Jive for Office TOC 2 Contents Release Notes...3 System Requirements... 4 Administering Jive for Office... 5 Getting Set Up...5 Installing the Extended API JAR File... 5 Updating Client Binaries...5 Client
SMTPSWITCH MAILER V6 FEATURES
SMTPSWITCH MAILER V6 FEATURES 22 Powerful Features Packed in a Single Email Marketing/Bulk Mailing Program! Easy and Advanced WYSIWYG/HTML Editing SMTPSwitch Mailer has a powerful built-in WYSIWYG editor
Outlook Connector Installation & Configuration groupwaresolution.net Hosted MS Exchange Alternative On Linux
Outlook Connector Installation & Configuration groupwaresolution.net Hosted MS Exchange Alternative On Linux Page 1 of 5 DOWNLOAD Please download the connector installer msi file and save it to your computer.
SQL Server Instance-Level Benchmarks with DVDStore
SQL Server Instance-Level Benchmarks with DVDStore Dell developed a synthetic benchmark tool back that can run benchmark tests against SQL Server, Oracle, MySQL, and PostgreSQL installations. It is open-sourced
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
SQL Tuning and Maintenance for the Altiris Deployment Server express database.
Article ID: 22953 SQL Tuning and Maintenance for the Altiris Deployment Server express database. Question Now Deployment Server is installed how do I manage the express database? Topics that will be covered
Microsoft Exchange ActiveSync Administrator s Guide
Microsoft Exchange ActiveSync Administrator s Guide Copyright 2005 palmone, Inc. All rights reserved. palmone, HotSync, Treo, VersaMail, and Palm OS are among the trademarks or registered trademarks owned
Intro to Databases. ACM Webmonkeys 2011
Intro to Databases ACM Webmonkeys 2011 Motivation Computer programs that deal with the real world often need to store a large amount of data. E.g.: Weather in US cities by month for the past 10 years List
Install Moodle with RollCall 2013 PowerVista Software, Inc.
Install Moodle with RollCall Note: To change the product logo for your ow n print manual or PDF, click "Tools > Manual Designer" and modify the print manual template. Title page 1 Use this page to introduce
LDAP and Active Directory Guide
LDAP and Active Directory Guide Contents LDAP and Active Directory Guide...2 Overview...2 Configuring for LDAP During Setup...2 Deciding How to Use Data from LDAP... 2 Starting the Setup Tool... 3 Configuring
Magic Submitter Questions and Answers
Magic Submitter Questions and Answers Contents Troubleshooting... 3 1. Where can I found educational materials on how to use Magic Submitter?... 3 2. Problems with Magic Submitter registration... 3 3.
Acano solution. Acano Manager R1.1 FAQs. Acano. December 2014 76-1039-02-G
Acano solution Acano Manager R1.1 FAQs Acano December 2014 76-1039-02-G Contents Contents 1 Installation... 3 How do I set up the two components of Acano Manager on different servers?... 3 Am I going to
SharePoint Integration Framework Developers Cookbook
Sitecore CMS 6.3 to 6.6 and SIP 3.2 SharePoint Integration Framework Developers Cookbook Rev: 2013-11-28 Sitecore CMS 6.3 to 6.6 and SIP 3.2 SharePoint Integration Framework Developers Cookbook A Guide
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
The Power Loader GUI
The Power Loader GUI (212) 405.1010 [email protected] Follow: @1010data www.1010data.com The Power Loader GUI Contents 2 Contents Pre-Load To-Do List... 3 Login to Power Loader... 4 Upload Data Files to
Solving the Rubik's Revenge (4x4x4) Home Pre-Solution Stuff Step 1 Step 2 Step 3 Solution Moves Lists
Solving your Rubik's Revenge (4x4x4) 07/16/2007 12:59 AM Solving the Rubik's Revenge (4x4x4) Home Pre-Solution Stuff Step 1 Step 2 Step 3 Solution Moves Lists Turn this... Into THIS! To solve the Rubik's
MS Outlook to Unix Mailbox Conversion mini HOWTO
Table of Contents MS Outlook to Unix Mailbox Conversion mini HOWTO...1 Greg Lindahl, [email protected] 1. Introduction...1 2. Converting using Mozilla Mail...1 3. Converting using IMAP...1 1. Introduction...1
Installing Booked scheduler on CentOS 6.5
Installing Booked scheduler on CentOS 6.5 This guide will assume that you already have CentOS 6.x installed on your computer, I did a plain vanilla Desktop install into a Virtual Box VM for this test,
The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.
Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...
ICE for Eclipse. Release 9.0.1
ICE for Eclipse Release 9.0.1 Disclaimer This document is for informational purposes only and is subject to change without notice. This document and its contents, including the viewpoints, dates and functional
Railo Installation on CentOS Linux 6 Best Practices
Railo Installation on CentOS Linux 6 Best Practices Purpose: This document is intended for system administrators who want to deploy their Mura CMS, Railo, Tomcat, and JRE stack in a secure but easy to
Install MS SQL Server 2012 Express Edition
Install MS SQL Server 2012 Express Edition Sohodox now works with SQL Server Express Edition. Earlier versions of Sohodox created and used a MS Access based database for storing indexing data and other
As you ask them and if not, you have things to question, we can answer, we can give advice to you by email within 24 hours.
Thanks for your patience and welcome to the CDI MobyMax Interactive Webinar this afternoon. We appreciate you joining us. I now have with me most of you are. Certainly, we'll do our best to make today's
Websense SQL Queries. David Buyer June 2009 [email protected]
Websense SQL Queries David Buyer June 2009 [email protected] Introduction The SQL queries that are listed here I have been using for a number of years now. I use them almost exclusively as an alternative to
BILLINGTRACKER MULTI-USER SETUP AND TROUBLESHOOTING GUIDE INSTRUCTIONS FOR SETTING UP BILLINGTRACKER PRO IN MULTI-USER MODE:
BILLINGTRACKER MULTI-USER SETUP AND TROUBLESHOOTING GUIDE Part 1: Setup Part 2: Troubleshooting Part 1: Setup INSTRUCTIONS FOR SETTING UP BILLINGTRACKER PRO IN MULTI-USER MODE: *First*: Download BillingTracker
Alteryx Predictive Analytics for Oracle R
Alteryx Predictive Analytics for Oracle R I. Software Installation In order to be able to use Alteryx s predictive analytics tools with an Oracle Database connection, your client machine must be configured
Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
Live@edu User Guide. Please visit the Helpdesk website for more information: http://www.smu.edu.sg/iits/helpdesk_support/index.asp
IITS Main Office SINGAPORE MANAGEMENT UNIVERSITY Administration Building, Level 11 81, Victoria Street Singapore 188065 Phone: 65-6828 1930 Email: [email protected] Please visit the Helpdesk website for
MPP Manager Users Guide
MPP Manager Users Guide Spam Quarantine and Email Archive Administration \ August, 2008 MPP Mable of Contents 1 About This Guide 4 1.1 MPP Manager Overview 4 1.2 Other Documentation 4 2 Mppserver MPP Manager
Install SQL Server 2014 Express Edition
How To Install SQL Server 2014 Express Edition Updated: 2/4/2016 2016 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders.
Hive Interview Questions
HADOOPEXAM LEARNING RESOURCES Hive Interview Questions www.hadoopexam.com Please visit www.hadoopexam.com for various resources for BigData/Hadoop/Cassandra/MongoDB/Node.js/Scala etc. 1 Professional Training
WebPanel Manual DRAFT
WebPanel Manual DRAFT 1 Untitled Chapter 1.1 Configure web server prior to installing WebsitePanel Agent 4 1.2 Install the WebsitePanel Server Agent to a Server 20 1.3 Configuring Firewall Settings for
An Email Newsletter Using ASP Smart Mailer and Advanced HTML Editor
An Email Newsletter Using ASP Smart Mailer and Advanced HTML Editor This tutorial is going to take you through creating a mailing list application to send out a newsletter for your site. We'll be using
Smart Card Authentication. Administrator's Guide
Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5
ADMINISTRATOR GUIDE VERSION
ADMINISTRATOR GUIDE VERSION 4.0 2014 Copyright 2008 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means electronic or mechanical, for any purpose
Vector HelpDesk - Administrator s Guide
Vector HelpDesk - Administrator s Guide Vector HelpDesk - Administrator s Guide Configuring and Maintaining Vector HelpDesk version 5.6 Vector HelpDesk - Administrator s Guide Copyright Vector Networks
DbSchema Tutorial with Introduction in SQL Databases
DbSchema Tutorial with Introduction in SQL Databases Contents Connect to the Database and Create First Tables... 2 Create Foreign Keys... 7 Create Indexes... 9 Generate Random Data... 11 Relational Data
1 Download & Installation... 4. 1 Usernames and... Passwords
Contents I Table of Contents Part I Document Overview 2 Part II Document Details 3 Part III EventSentry Setup 4 1 Download & Installation... 4 Part IV Configuration 4 1 Usernames and... Passwords 5 2 Network...
IceWarp Server Windows Installation Guide
IceWarp Unified Communications IceWarp Server Windows Installation Guide Version 11.3 Published on 2/6/2015 Contents IceWarp Server Windows... 4 Pre-requisites... 5 Launch Installer Wizard... 6 Select
User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved.
Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved. Table of Contents Getting Started... 4 New Features... 4 System Requirements... 4 Configuring Microsoft Internet Explorer... 4 Configuring
Tivoli Endpoint Manager BigFix Dashboard
Tivoli Endpoint Manager BigFix Dashboard Helping you monitor and control your Deployment. By Daniel Heth Moran Version 1.1.0 http://bigfix.me/dashboard 1 Copyright Stuff This edition first published in
Upgrading from Windows XP to Windows 7
We highly recommend that you print this tutorial. Your PC will restart during the Windows 7 installation process, so having a printed copy will help you follow the steps if you're unable to return to this
Written by: Johan Strand, Reviewed by: Chafic Nassif, Date: 2006-04-26. Getting an ipath server running on Linux
Getting an ipath server running on Linux Table of Contents Table of Contents... 2 1.0. Introduction... 3 2.0. Overview... 3 3.0. Installing Linux... 3 4.0. Installing software that ipath requires... 3
The SkySQL Administration Console
www.skysql.com The SkySQL Administration Console Version 1.1 Draft Documentation Overview The SkySQL Administration Console is a web based application for the administration and monitoring of MySQL 1 databases.
ShoutCast v2 - Broadcasting with Winamp & ShoutCast DSP Plugin
ShoutCast v2 - Broadcasting with Winamp & ShoutCast DSP Plugin In this tutorial we are going to explain how to broadcast using the ShoutCast DSP Plugin with Winamp to our ShoutCast v2 running under CentovaCast
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
Data Migration from Magento 1 to Magento 2 Including ParadoxLabs Authorize.Net CIM Plugin Last Updated Jan 4, 2016
Data Migration from Magento 1 to Magento 2 Including ParadoxLabs Authorize.Net CIM Plugin Last Updated Jan 4, 2016 This guide was contributed by a community developer for your benefit. Background Magento
Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.
Emerald Network Collector Version 4.0 Emerald Management Suite IEA Software, Inc. Table Of Contents Purpose... 3 Overview... 3 Modules... 3 Installation... 3 Configuration... 3 Filter Definitions... 4
Using the Push Notifications Extension Part 1: Certificates and Setup
// tutorial Using the Push Notifications Extension Part 1: Certificates and Setup Version 1.0 This tutorial is the second part of our tutorials covering setting up and running the Push Notifications Native
Microsoft Business Intelligence 2012 Single Server Install Guide
Microsoft Business Intelligence 2012 Single Server Install Guide Howard Morgenstern Business Intelligence Expert Microsoft Canada 1 Table of Contents Microsoft Business Intelligence 2012 Single Server
Jive Connects for Openfire
Jive Connects for Openfire Contents Jive Connects for Openfire...2 System Requirements... 2 Setting Up Openfire Integration... 2 Configuring Openfire Integration...2 Viewing the Openfire Admin Console...3
Customer admin guide. UC Management Centre
Customer admin guide UC Management Centre June 2013 Contents 1. Introduction 1.1 Logging into the UC Management Centre 1.2 Language Options 1.3 Navigating Around the UC Management Centre 4 4 5 5 2. Customers
The manual contains complete instructions on 'converting' your data to version 4.21.
1 of 7 2/15/2012 10:02 AM Upgrading Authentication Pre-Installation Steps: SQL Server Installation Oracle Installation Upgrading You can only convert data from versions 3.60, 4.00, 4.01, 4.10 or 4.20 to
1 Accessing E-mail accounts on the Axxess Mail Server
1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server
Synchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property
Pcounter Mobile Guide
Pcounter Mobile Guide Pcounter Mobile Guide 2012.06.22 Page 1 of 19 1. Overview... 3 2. Pre-requisites and Requirements... 4 2.1 Gateway server requirements... 4 2.2 Mobile device requirements... 4 2.3
UNDERSTANDING CHASSIS ADJUSTMENTS
UNDERSTANDING CHASSIS ADJUSTMENTS There was once a time not so long ago when the "average" racer could arrive at the track with his "average" set-up and with minor adjustments, he could run competitively.
Kaseya 2. Installation guide. Version 7.0. English
Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
Jet Data Manager 2012 User Guide
Jet Data Manager 2012 User Guide Welcome This documentation provides descriptions of the concepts and features of the Jet Data Manager and how to use with them. With the Jet Data Manager you can transform
Toad for Data Analysts, Tips n Tricks
Toad for Data Analysts, Tips n Tricks or Things Everyone Should Know about TDA Just what is Toad for Data Analysts? Toad is a brand at Quest. We have several tools that have been built explicitly for developers
Grapevine Mail User Guide
Grapevine Mail User Guide Table of Contents Accessing Grapevine Mail...2 How to access the Mail portal... 2 How to login... 2 Grapevine Mail user guide... 5 Copying your contacts to the new Grapevine Mail
Getting an ipath server running on Linux
Getting an ipath server running on Linux Table of Contents Table of Contents... 2 1.0. Introduction... 3 2.0. Overview... 3 3.0. Installing Linux... 3 4.0. Installing software that ipath requires... 3
Eylean server deployment guide
Eylean server deployment guide Contents 1 Minimum software and hardware requirements... 2 2 Setting up the server using Eylean.Server.Setup.exe wizard... 2 3 Manual setup with Windows authentication -
Parallels Plesk Automation
Parallels Plesk Automation Contents Get Started 3 Infrastructure Configuration... 4 Network Configuration... 6 Installing Parallels Plesk Automation 7 Deploying Infrastructure 9 Installing License Keys
Page 18. Using Software To Make More Money With Surveys. Visit us on the web at: www.takesurveysforcash.com
Page 18 Page 1 Using Software To Make More Money With Surveys by Jason White Page 2 Introduction So you re off and running with making money by taking surveys online, good for you! The problem, as you
The $200 A Day Cash Machine System
The $200 A Day Cash Machine System Make Big Profits Selling This Opportunity From Home! This is a free ebook from Frank Jones. You should not have paid for it. COPYRIGHT Frank Jones. All Rights Reserved:
EVENT LOG MANAGEMENT...
Event Log Management EVENT LOG MANAGEMENT... 1 Overview... 1 Application Event Logs... 3 Security Event Logs... 3 System Event Logs... 3 Other Event Logs... 4 Windows Update Event Logs... 6 Syslog... 6
Budget Main Window (Single Bank Account) Budget Main Window (Multiple Bank Accounts)
Budget Main Window (Single Bank Account) Budget Main Window (Multiple Bank Accounts) Page 1 of 136 Using Budget Help Budget has extensive help features. To get help use Budget's Help > Budget Help menu
Deployment Guide: Unidesk and Hyper- V
TECHNICAL WHITE PAPER Deployment Guide: Unidesk and Hyper- V This document provides a high level overview of Unidesk 3.x and Remote Desktop Services. It covers how Unidesk works, an architectural overview
Discovery Guide. Secret Server. Table of Contents
Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...
Earn Money Sharing YouTube Videos
Earn Money Sharing YouTube Videos Get Started FREE! Make money every time you share a video, also make money every time the videos you have shared get watched! Unleash The Viral Power of Social Media To
Installing GFI MailEssentials
Installing GFI MailEssentials Introduction to installing GFI MailEssentials This chapter shows you how to install and configure GFI MailEssentials. GFI MailEssentials can be installed in two ways: Installation
ConnectMail Mobile Email Configuration
ConnectMail Mobile Email Configuration Introduction/Utility ConnectMail allows you to use your mobile phone to access information in your account. This includes e mail messages, calendar, and contacts.
