-
exempi-2.2.1-1.fc19.armv6hl
Exempi provides a library for easy parsing of XMP metadata. It is a port of
Adobe XMP SDK to work on UNIX and to be build with GNU automake.
It includes XMPCore and XMPFiles.
Located in
LBN
/
…
/
Core Linux
/
BastionLinux 19
-
exempi-2.2.1-1.fc19.x86_64
Exempi provides a library for easy parsing of XMP metadata. It is a port of
Adobe XMP SDK to work on UNIX and to be build with GNU automake.
It includes XMPCore and XMPFiles.
Located in
LBN
/
…
/
Core Linux
/
BastionLinux 19
-
exempi-2.5.1-4.lbn25.x86_64
Exempi provides a library for easy parsing of XMP metadata. It is a port of
Adobe XMP SDK to work on UNIX and to be build with GNU automake.
It includes XMPCore and XMPFiles.
Located in
LBN
/
…
/
Core Linux
/
BastionLinux 25
-
exempi-2.6.0-0.2.20211007gite23c213.fc36.x86_64
Exempi provides a library for easy parsing of XMP metadata. It is a port of
Adobe XMP SDK to work on UNIX and to be build with GNU automake.
It includes XMPCore and XMPFiles.
Located in
LBN
/
…
/
Core Linux
/
BastionLinux 36
-
exfatprogs-1.1.3-2.fc36.x86_64
Utilities for formatting and repairing exFAT filesystems.
Located in
LBN
/
…
/
Core Linux
/
BastionLinux 36
-
exim-4.76-1.lbn13.x86_64
Exim is a message transfer agent (MTA) developed at the University of
Cambridge for use on Unix systems connected to the Internet. It is
freely available under the terms of the GNU General Public Licence. In
style it is similar to Smail 3, but its facilities are more
general. There is a great deal of flexibility in the way mail can be
routed, and there are extensive facilities for checking incoming
mail. Exim can be installed in place of sendmail, although the
configuration of exim is quite different to that of sendmail.
Located in
LBN
/
…
/
Core Linux
/
BastionLinux 13
-
exim-4.80.1-1.fc18.1302272146kf.armv6hl
Exim is a message transfer agent (MTA) developed at the University of
Cambridge for use on Unix systems connected to the Internet. It is
freely available under the terms of the GNU General Public Licence. In
style it is similar to Smail 3, but its facilities are more
general. There is a great deal of flexibility in the way mail can be
routed, and there are extensive facilities for checking incoming
mail. Exim can be installed in place of sendmail, although the
configuration of exim is quite different to that of sendmail.
Located in
LBN
/
…
/
Core Linux
/
BastionLinux 13
-
exim-clamav-4.76-1.lbn13.x86_64
This package contains configuration files which invoke a copy of the
clamav dæmon for use with Exim. It can be activated by adding (or
uncommenting)
av_scanner = clamd:/var/run/clamd.exim/clamd.sock
in your exim.conf, and using the 'malware' condition in the DATA ACL,
as follows:
deny message = This message contains malware ($malware_name)
malware = *
For further details of Exim content scanning, see chapter 41 of the Exim
specification:
http://www.exim.org/exim-html-4.76/doc/html/spec_html/ch41.html
Located in
LBN
/
…
/
Core Linux
/
BastionLinux 13
-
exim-clamav-4.80.1-1.fc18.1302272146kf.armv6hl
This package contains configuration files which invoke a copy of the
clamav dæmon for use with Exim. It can be activated by adding (or
uncommenting)
av_scanner = clamd:/var/run/clamd.exim/clamd.sock
in your exim.conf, and using the 'malware' condition in the DATA ACL,
as follows:
deny message = This message contains malware ($malware_name)
malware = *
For further details of Exim content scanning, see chapter 41 of the Exim
specification:
http://www.exim.org/exim-html-4.80.1/doc/html/spec_html/ch41.html
Located in
LBN
/
…
/
Core Linux
/
BastionLinux 13
-
exim-greylist-4.76-1.lbn13.x86_64
This package contains a simple example of how to do greylisting in Exim's
ACL configuration. It contains a cron job to remove old entries from the
greylisting database, and an ACL subroutine which needs to be included
from the main exim.conf file.
To enable greylisting, install this package and then uncomment the lines
in Exim's configuration /etc/exim.conf which enable it. You need to
uncomment at least two lines -- the '.include' directive which includes
the new ACL subroutine, and the line which invokes the new subroutine.
By default, this implementation only greylists mails which appears
'suspicious' in some way. During normal processing of the ACLs we collect
a list of 'offended' which it's committed, which may include having
SpamAssassin points, lacking a Message-ID: header, coming from a blacklisted
host, etc. There are examples of these in the default configuration file,
mostly commented out. These should be sufficient for you to you trigger
greylisting for whatever 'offences' you can dream of, or even to make
greylisting unconditional.
Located in
LBN
/
…
/
Core Linux
/
BastionLinux 13