All,
I have several remote users in a country well known to inject spam mail.
These users are connected via dialup links to our backend Exchange
Server and they are able to send email. The Exchange Server relays all
email to the front end mail server running Red Hat Enterprise Linux AS 4
and
Hello fellow anti-spam advocates.
After getting a rather large logwatch report, I went hunting in my logs
to get to the root of the problem. I noticed a very big spike in the
number of occurences of the following line in the /var/log/maillog file:
Milter add: header: Content-Type:
@spamassassin.apache.org
Subject: Re: Can anyone explain this Milter add:... spike in my logs
by spamd!
At 20:19 06-06-2007, Anthony Kamau wrote:
After getting a rather large logwatch report, I went hunting in my logs
to get to the root of the problem. I noticed a very big spike in the
number of occurences
-Original Message-
From: Andrew Beverley [mailto:[EMAIL PROTECTED]
Sent: Sunday, 11 February 2007 0:33
To: tkb2766
Cc: 'LARTC'
Subject: RE: [LARTC] Problems with HTB. Help!
I still doubt it's a kernel issue to be honest.
I updated to IPTABLES ver 1.3.7 and now I can
February 2007 4:18
To: Anthony Kamau
Cc: 'LARTC'
Subject: RE: [LARTC] Problems with HTB. Help!
tc filter add dev ifb0 parent 1:0 prio 0 protocol ip handle 10 fw \
flowid 1:10
I'm getting out of my depth here so may be wrong, but as I understand it
'handle' is the MARK, flowid is what
Hello list.
I've configured a very simple script to slow down packets coming from a
particular IP Address. I've used IPTABLES to mark traffic coming from this
IP Address, but it does not appear to be working as expected. Let me first
describe my system as maybe what I'm doing is beyond what
101 - 106 of 106 matches
Mail list logo