Posts

Showing posts from May, 2023

smtp relay

Assuming you're installing the yum version of Exim on a CentOS server, you'll need to make two configuration changes. The first is to allow the IP of the mailserver to relay through the smarthost. Open the configuration at /etc/exim/exim.conf, find the line referenced below and edit it by adding the relay server IP 109.201.130.65 at the end as shown below. add this in server from where your mail will exit hostlist relay_from_hosts = 127.0.0.1 eg: hostlist relay_from_hosts = 127.0.0.1 : 109.201.130.65 domainlist relay_domains = lsearch;/etc/virtual/domains add domain in the aboe file also in vetacp hostlist relay_from_hosts = 127.0.0.1 : 43.225.53.162 these settings needs to be done on mail server from where mail will realy to another server We might need to make changes on the SPF record. Replace the current server IP address and add the relay IP. eg: v=spf1 a mx ip4:109.201.130.65 ~all Step 3: Configure the MTA On the same page Exim Configuration Editor, click on the Advan

530 Must issue a STARTTLS command error when sending e-mail using a smart host

  Symptoms   When sending an e-mail using a smart host, you may receive the following error:   530 Must issue a STARTTLS command first   Description    This error message indicates that your smart host requires you to issue the starttls command before authenticating. The hosts_avoid_tls configuration option in Exim causes this.   Workaround   Edit your Exim transport and remove the hosts_avoid_tls option using the Exim Advanced Configuration Editor.

cross domain copy past elementor

 Elemtnor > settings> features should match also after copy > go to other site > roght click > copy from other website > ctrl +V press > pres it when this is showing

cyberpanel crate database error 0

 cyberpanel crate database error 0 reset mysql pass UPDATE mysql.user SET authentication_string=PASSWORD('MyNewPass') WHERE User='root' from cat /etc/cyberpanel/mysqlPassword

How to delete e-mails from Postfix Queue

 #!/usr/bin/perl -w # # pfdel - deletes message containing specified address from # Postfix queue. Matches either sender or recipient address. # # Usage: pfdel <email_address> # use strict; # Change these paths if necessary. my $LISTQ = "/usr/sbin/postqueue -p"; my $POSTSUPER = "/usr/sbin/postsuper"; my $email_addr = ""; my $qid = ""; my $euid = $>; if ( @ARGV !=  1 ) {     die "Usage: pfdel <email_address>\n"; } else {     $email_addr = $ARGV[0]; } if ( $euid != 0 ) {         die "You must be root to delete queue files.\n"; } open(QUEUE, "$LISTQ |") ||   die "Can't get pipe to $LISTQ: $!\n"; my $entry = <QUEUE>;    # skip single header line $/ = "";        # Rest of queue entries print on             # multiple lines. while ( $entry = <QUEUE> ) {     if ( $entry =~ / $email_addr$/m ) {         ($qid) = split(/\s+/, $entry, 2);         $qid =~ s/[\*\!]//;         nex

firewalld Whitelist source IP addresses in CentOS 7

  70 I'd accomplish this by adding sources to a zone. First checkout which sources there are for your zone: firewall-cmd --permanent --zone=public --list-sources If there are none, you can start to add them, this is your "whitelist" firewall-cmd --permanent --zone=public --add-source=192.168.100.0/24 firewall-cmd --permanent --zone=public --add-source=192.168.222.123/32 (That adds a whole  /24  and a single IP, just so you have a reference for both a subnet and a single IP) Set the range of ports you'd like open: firewall-cmd --permanent --zone=public --add-port=1-3389/tcp firewall-cmd --permanent --zone=public --add-port=1-3389/udp This just does ports 1 through 22. You can widen this, if you'd like. Now, reload what you've done. firewall-cmd --reload And check your work: firewall-cmd --zone=public --list-all

test postfix mail server

  Steps to Perform Testing the Postfix Mail Service 1. Establish a TCP connection to port 25 which is postfix port : [root@mail ~]# telnet localhost 25 You should receive a 220 response: Trying 127.0.0.1... Connected to localhost. Escape character is '^]'. 220 mail.zimbra.local ESMTP Postfix Postfix is listening and we can communicate with SMTP now. See also    How to Verify the LDAP or slapd Process in Zimbra 2. Next,greet the postfix server. The function is considered same with postman or transport : Helo mail.zimbra.local The postfix mail server should respond as below : 250 mail.zimbra.local 3. Inform the postfix server know who the sender is: MAIL FROM:<admin@zimbra.local> You will get ‘250’ output if the postfix accepts the sender address : 250 2.1.0 Ok 4. Specify the recipient of the email : RCPT TO:<user@zimbra.local> If Postfix accepts the recipient address will returned 250 response : 250 2.1.5 Ok 5. Send the actual Email with subject and body of the email

file put contents permission issues

 didable selinux

anti adblock detector

  Header <link rel="stylesheet" href="./style/abdetector.style.min.css" /> <script src="./js/abdetector.script.min.js"></script> Body <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1037365182586497"      crossorigin="anonymous"></script> <!-- New 1 display --> <ins class="adsbygoogle"      style="display:block"      data-ad-client="ca-pub-1037365182586497"      data-ad-slot="7454304174"      data-ad-format="auto"      data-full-width-responsive="true"></ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); </script> Footer <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-1037365182586497"      crossorigin="anonymous"></script> <!-- New 1 display --> <ins class="ad