Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

ctl_deliver(8) [ultrix man page]

CTL_DELIVER(8)						      System Manager's Manual						    CTL_DELIVER(8)

 *

NAME
ctl_deliver - perform operations on the duplicate delivery database SYNOPSIS
ctl_deliver [ -C config-file ] -d [ -f filename ] DESCRIPTION
Ctl_deliver is used to perform various administrative operations on the duplicate delivery database. Ctl_deliver reads its configuration options out of the imapd.conf(5) file unless specified otherwise by -C. OPTIONS
-C config-file Read configuration options from config-file. -d Dump the contents of the database to standard output in a portable flat-text format. -f filename Use the database specified by filename instead of the default (configdirectory/deliver.db). FILES
/etc/imapd.conf SEE ALSO
imapd.conf(5), cyrmaster(8) CMU
Project Cyrus CTL_DELIVER(8)

Check Out this Related Man Page

CTL_CYRUSDB(8)						      System Manager's Manual						    CTL_CYRUSDB(8)

 *

NAME
ctl_cyrusdb - perform operations common to all Cyrus databases SYNOPSIS
ctl_cyrusdb [ -C config-file ] -r [ -x ] ctl_cyrusdb [ -C config-file ] -c DESCRIPTION
Ctl_cyrusdb is used to perform various administrative operations on the Cyrus databases. Ctl_cyrusdb reads its configuration options out of the imapd.conf(5) file unless specified otherwise by -C. The configdirectory option is used to determine the default location of the Cyrus databases. OPTIONS
-C config-file Read configuration options from config-file. -r Recover the databases after an application or system failure. Also performs database cleanup like removing mailbox reservations (and any associated mailbox files). All mailbox files are also checked to make sure the file format matches the configured database type in imapd.conf. If not, the file is automatically converted using the same logic as cvt_cyrusdb. -x Used with -r to recover the database only. (Prevents database cleanup). -c Checkpoint and archive the databases. Changes to the database which are part of committed transactions are written to disk. Also, a hot backup of the databases is made and inactive log files are removed. FILES
/etc/imapd.conf SEE ALSO
imapd.conf(5), cyrmaster(8) CMU
Project Cyrus CTL_CYRUSDB(8)
Man Page

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

A short history of UNIX by l.madden@ic.ac.uk

<h1>A short history of UNIX</h1> <p>In the late 1960's Ken Thompsom joined the computing-science research group at Bell Laboratories, which is the research arm of the giant American corporation ATT. He and many colleagues had been collaborating with MIT and GE on the development of an... (0 Replies)
Discussion started by: Neo
0 Replies

2. Answers to Frequently Asked Questions

Lost root password / Can't login as root

We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
Discussion started by: Perderabo
0 Replies

3. Programming

How do you detect keystrokes in canonical mode?

I'm writing a command shell, and I want to be able to detect when the user presses an arrow key (otherwise it just prints [[A, [[B, etc.). I know it's relatively easy (although somewhat more time-consuming) to detect keystrokes in noncanonical mode, but I've noticed that the bash shell detects... (4 Replies)
Discussion started by: Ultrix
4 Replies

4. UNIX for Dummies Questions & Answers

Linux (Ubuntu) = Unix (NOT IMPORTANT - NO RUSH)

I'm learning off Linux (Ubuntu) right now. I want to move up to Unix, but I don't want to rush like I did when it came to Windows --> to Linux. What is the best Unix OS that fits in pretty well with Ubuntu. In other words is there kind of an equal Linux with Unix? Also what do I need to... (10 Replies)
Discussion started by: Linux_Guy
10 Replies

5. IP Networking

Can I change my hostname without messing things up?

I noticed my hostname is <my-full-name>s-macbook.local. I'm not sure exactly what information leaves the local network, and whether the hostname is included, but if it is, this would mean people on the Internet can look at my hostname and see who I am. Before anyone says that's not possible,... (4 Replies)
Discussion started by: Ultrix
4 Replies