Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

timsieved(8) [ultrix man page]

TIMSIEVED(8)						      System Manager's Manual						      TIMSIEVED(8)

 *

NAME
timsieved - CMU hack for getting sieve scripts onto the server SYNOPSIS
timsieved [ -C config-file ] DESCRIPTION
timsieved is a server that allows users to remotely manage their sieve scripts kept on the server. It accepts commands on its standard input and responds on its standard output. It MUST be invoked by master(8) with those descriptors attached to a remote client connection. Cyrus admins that authenticate and authorize as themselves (e.g. don't proxy) manage global scripts. Timsieved reads its configuration options out of the imapd.conf(5) file unless specified otherwise by -C. OPTIONS
-C config-file Read configuration options from config-file. FILES
/etc/imapd.conf SEE ALSO
imapd.conf(5), cyrmaster(8) CMU
Project Cyrus TIMSIEVED(8)

Check Out this Related Man Page

LMTPD(8)						      System Manager's Manual							  LMTPD(8)

 *

NAME
lmtpd - LMTP server process SYNOPSIS
lmtpd [ -C config-file ] [ -U uses ] [ -T timeout ] [ -D ] [ -a ] DESCRIPTION
Lmtpd is an LMTP server used to deliver mail to the IMAP mailstore. It accepts commands on its standard input and responds on its standard output. It MUST be invoked by cyrmaster(8) with those descriptors attached to a remote client connection. Lmtpd reads its configuration options out of the imapd.conf(5) file unless specified otherwise by -C. OPTIONS
-C config-file Read configuration options from config-file. -U uses The maximum number of times that the process should be used for new connections before shutting down. The default is 250. -T timeout The number of seconds that the process will wait for a new connection before shutting down. Note that a value of 0 (zero) will dis- able the timeout. The default is 60. -D Run external debugger specified in debug_command. -a Preauthorize connections initiated on an internet socket, instead of requiring LMTP AUTH. This should only be used for connections coming from trusted hosts. FILES
/etc/imapd.conf SEE ALSO
imapd.conf(5), cyrmaster(8) CMU
Project Cyrus LMTPD(8)
Man Page

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

A short history of UNIX by l.madden@ic.ac.uk

<h1>A short history of UNIX</h1> <p>In the late 1960's Ken Thompsom joined the computing-science research group at Bell Laboratories, which is the research arm of the giant American corporation ATT. He and many colleagues had been collaborating with MIT and GE on the development of an... (0 Replies)
Discussion started by: Neo
0 Replies

2. Answers to Frequently Asked Questions

Lost root password / Can't login as root

We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
Discussion started by: Perderabo
0 Replies

3. Programming

How do you detect keystrokes in canonical mode?

I'm writing a command shell, and I want to be able to detect when the user presses an arrow key (otherwise it just prints [[A, [[B, etc.). I know it's relatively easy (although somewhat more time-consuming) to detect keystrokes in noncanonical mode, but I've noticed that the bash shell detects... (4 Replies)
Discussion started by: Ultrix
4 Replies

4. UNIX for Dummies Questions & Answers

Linux (Ubuntu) = Unix (NOT IMPORTANT - NO RUSH)

I'm learning off Linux (Ubuntu) right now. I want to move up to Unix, but I don't want to rush like I did when it came to Windows --> to Linux. What is the best Unix OS that fits in pretty well with Ubuntu. In other words is there kind of an equal Linux with Unix? Also what do I need to... (10 Replies)
Discussion started by: Linux_Guy
10 Replies

5. IP Networking

Can I change my hostname without messing things up?

I noticed my hostname is <my-full-name>s-macbook.local. I'm not sure exactly what information leaves the local network, and whether the hostname is included, but if it is, this would mean people on the Internet can look at my hostname and see who I am. Before anyone says that's not possible,... (4 Replies)
Discussion started by: Ultrix
4 Replies