GenerationIP

Just for you

  • Increase font size
  • Default font size
  • Decrease font size
Welcome to the Frontpage

how to install sqlgrey for the limitation of spam

Type : System
Operating System
: Redhat,Fedora,Centos

In this how to, i want to present you sqlgrey a very simple greylisting solution for the limitation of your spam.

How it works from wikipedia explanation :

Typically, a server employing greylisting will record the three pieces of data known as a "triplet" for each incoming mail message:

  • The IP address of the connecting host
  • The envelope sender address
  • The envelope recipient address

This is checked against the mail server's internal database. If this triplet has not been seen before (within some configurable period), the email is greylisted for a short time (also configurable), and it is refused with a temporary rejection. The assumption is that since temporary failures are built into the RFC specifications for email delivery, a legitimate server will attempt to connect again later on to deliver the email.

In practice, most greylisting systems do not require an exact match on the IP address and the sender address. Because large senders often have a pool of machines that can send (and resend) email, IP addresses that have the most-significant 24 bits (/24) the same are treated as equivalent, or in some cases SPF records are used to determine the sending pool. Similarly, with mailing lists which use unique per-message return-paths (via variable envelope return path or VERP), if an exact match on the sender address is required, each post from such a mailing list will be delayed. Instead, some greylisting systems try to eliminate the variable parts of the VERP by using only the sender domain and the beginning of the local-part of the sender address.

Greylisting is effective because many mass email tools used by spammers will not bother to retry a failed delivery, so the spam is never delivered. When a spammer does retry a delivery after the waiting period has expired, however, it will likely be after a number of automated honeypots have detected the spam source and listed both the source and the particular message in their databases. Thus, these subsequent attempts are more likely to be detected as spam by other mechanisms than they were at first.

Last Updated on Saturday, 30 January 2010 22:31 Read more...
 

how to use mysql command line for management

Type : System
Operating System : Linux like, windows, BSD

 

Mysql is one of the major opensource database and used in the enterprise solution. Mysql provide "master slave" replication solution or a cluster solution.

With mysql, you have a lot of engine definition for your table, like memory,innodb,myisam and BerkeleyDB. The last engine and one of the most interresting is the ndbcluster but this engine can be use only in a mysql cluster. In mysql 6 you can use falcon, this engine is created to replace innodb and improve the transaction methode for a database.

But here i want to show you a list of important command line for mysql.

Last Updated on Saturday, 30 January 2010 22:44 Read more...
 

Howto create Loop Device on REDHAT, CENTOS or FEDORA

Type : System
Operating System : Redhat,Fedora,Centos

This mini howto explain how to create more loop device on your operating system.

You need to create more loop device in some case like encrypted file system or HVM xen virtualization.

By default there are 7 devices available, named /dev/loop0 through to /dev/loop7 .

Last Updated on Saturday, 30 January 2010 22:31 Read more...
 

Bonding or Teaming for redhat Server

Type : System
Operating System
: Redhat,Fedora,Centos

This Howto explain how to install the Bonding or the Teaming solution on a RedHat distribution. One of the goal of the teaming and bonding solution is to use all networks interfaces for backup or round robin solution.

The bonding need to work with a minimum of 2 NIC to have real goal.

The concept of NIC Bonding (or sometimes called NIC Teaming) is that you have two NICs bonded together to create only one physical device.

 

Last Updated on Saturday, 30 January 2010 22:44 Read more...
 

IPV6 Configuration on REDHAT CENTOS FEDORA

Type : System
Operating System
: Redhat,Fedora,Centos

This Howto explain how to install IPV6 on a RedHat distribution. In a near futur, ipV6 will be used on each server or in all others equipments, which need network.

In this documentation, you can find the classical configuration and the tunnel V6toV4.

At the end of this article you can find  some tips or tools for ipv6

 

Last Updated on Saturday, 30 January 2010 22:43 Read more...
 


Page 10 of 13