Поиск по:itpm.msu.su -
Поискать по всем серверам
На этой странице приведены все страницы сервера itpm.msu.su ,которые мы индексируем. Показаны документы 801 - 820 из 982.
Упорядочить по:
URL
|
дате изменения
801. Where to Get the Code
Next: Maintaining Your System Up: Networking Previous: Different Streaks of Development . The latest version of the network code can be obtained by anonymous FTP from various sites. The official FTP site for Net-3 is sunacm.swan.ac.uk, mirrored by sunsite . The latest Net-2e patch kit and binaries are available from ftp.aris.com. Matthias Urlichs' BSD-derived networking code can be gotten from here . ... Andrew Anderson . Thu Mar 7 23:22:06 EST 1996 ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node19.html -- 2.3 Кб -- 18.04.1999
Похожие документы
Похожие документы
802. How does Mail Routing Work?
... The process of directing a message to the recipient's host is called routing . ... There is a big difference between the way a UUCP site handles routing, and the way an Internet site does. On the Internet, the main job of directing data to the recipient host (once it is known by it's IP-address) is done by the IP networking layer, while in the UUCP zone, the route has to be supplied by the user, or generated by the mail transfer agent. Mail Routing on the Internet . ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node190.html -- 2.6 Кб -- 18.04.1999
Похожие документы
Похожие документы
803. Mail Routing on the Internet
Next: Mail Routing in the Up: How does Mail Routing Previous: How does Mail Routing . Mail Routing on the Internet On the Internet, it depends entirely on the destination host whether any specific mail routing is performed at all. ... MX records also have a preference associated with them. ... They will then have an MX record like this in the DNS database: foobar.com IN MX 5 mailhub.foobar.com This announces mailhub.foobar.com as a mail exchanger for foobar.com with a preference value of 5. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node191.html -- 4.3 Кб -- 18.04.1999
Похожие документы
Похожие документы
804. Mail Routing in the UUCP World
Next: Mixing UUCP and RFC-822 Up: How does Mail Routing Previous: Mail Routing on the . ... In earlier times, all mail had to be addressed using bang paths. ... Therefore, only a number of major hosts use the complete UUCP world maps to build their paths file. Most sites only maintain routing information for sites in their neighborhood, and send any mail to sites they don't find in their databases to a smarter host with more complete routing information. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node192.html -- 5.4 Кб -- 18.04.1999
Похожие документы
Похожие документы
805. Mixing UUCP and RFC-822
... The best cure against the problems of mail routing in UUCP networks so far is the adoption of the domain name system in UUCP networks. Of course, you can't query a name server over UUCP. ... The hierarchical organization of the domain name space allows mail servers to mix more specific routes with less specific ones. ... The main benefit of using domain names in a UUCP environment, however, is that compliance with RFC-822 permits easy gatewaying between UUCP networks and the Internet. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node193.html -- 6.1 Кб -- 18.04.1999
Похожие документы
Похожие документы
806. Pathalias and Map File Format
... The pathalias database provides the main routing information in UUCP-based networks. A typical entry looks like this (site name and path are separated by TABs): moria.orcnet.org ernie!bert!moria!%s moria ernie!bert!moria!%s This makes any message to moria be delivered via ernie and bert. Both moria's fully qualified name and its UUCP name have to be given if the mailer does not have a separate way to map between these name spaces. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node194.html -- 6.6 Кб -- 18.04.1999
Похожие документы
Похожие документы
807. Command Execution
Next: File Transfers Up: The Do's and Dont's Previous: The Do's and Dont's . UUCP's task is to copy files from one system to another, and to request execution of certain commands on remote hosts. ... By default, the only commands Taylor UUCP allows other systems to execute on your machine are rmail and rnews, which are commonly used to to exchange email and Usent news over UUCP. ... For instance, you may want to allow system pablo to execute the rsmtp command in addition to rmail and rnews: . ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node171.html -- 2.8 Кб -- 18.04.1999
Похожие документы
Похожие документы
808. File Transfers
... Taylor UUCP also allows you to fine-tune file transfers in great detail. ... Usually, you will want to restrict access from remote systems to a single directory hierarchy, but still allow your users to send files from their home directory. Commonly, remote users will be allowed to receive files only from the public UUCP directory, /var/spool/uucppublic. ... One of the biggest problems with file transfers using UUCP is that will only receive files to directories that are world-writable. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node172.html -- 4.3 Кб -- 18.04.1999
Похожие документы
Похожие документы
809. Forwarding
Next: Setting up your System Up: The Do's and Dont's Previous: File Transfers . ... For instance, this allows you to make seci retrieve a file from uchile for you, and send it to your system. ... For instance, the UUCP administrator of seci would have to add the following lines to the sys file to allow pablo to request files from uchile: . ... This entry uses a variation of the forward command that permits uchile only to send files to pablo through seci; not the other way round. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node173.html -- 3.1 Кб -- 18.04.1999
Похожие документы
Похожие документы
810. http://itpm.msu.su/LDP/nag/node174.html
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node174.html -- 2.4 Кб -- 18.04.1999
[ Сохраненная копия ] Ссылки http://itpm.msu.su/metro.html -- 1.1 Кб -- 14.05.1999
[ Сохраненная копия ] Ссылки http://itpm.msu.su/metroa.html -- 1.1 Кб -- 25.05.1999
Похожие документы
[ Сохраненная копия ] Ссылки http://itpm.msu.su/metro.html -- 1.1 Кб -- 14.05.1999
[ Сохраненная копия ] Ссылки http://itpm.msu.su/metroa.html -- 1.1 Кб -- 25.05.1999
Похожие документы
811. Setting up getty
... If you want to use a serial line as a dial-in port, you have to enable a getty process on this port. However, some getty implementations aren't really suitable for this, because you usually want to use a serial port for dialing in and out. You therefore have to make sure to use a getty that is able to share the line with other programs like uucico, or minicom. One program that does this is uugetty from the getty_ps package. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node175.html -- 2.7 Кб -- 18.04.1999
Похожие документы
Похожие документы
812. Providing UUCP Accounts
Next: Protecting Yourself Against Swindlers Up: Setting up your System Previous: Setting up getty . Next, you have to set up user accounts that let remote sites log into your system and establish a UUCP connection. Generally, you will provide a separate login name to each system that polls you. ... For systems that dial in through the serial port, you usually have to add these accounts to the system password file, /etc/passwd. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node176.html -- 5.4 Кб -- 18.04.1999
Похожие документы
Похожие документы
813. Protecting Yourself Against Swindlers
Next: Be Paranoid-- Call Sequence Up: Setting up your System Previous: Providing UUCP Accounts . uucp.security.called-loginProtecting Yourself Against Swindlers . One of the biggest problems about UUCP is that the calling system can lie about its name; it announces its name to the called system after logging in, but the server doesn't have a way to check this. ... You should make it a habit to add the called-login command to every system entry you add to your sys file. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node177.html -- 3.2 Кб -- 18.04.1999
Похожие документы
Похожие документы
814. Anonymous UUCP
Next: UUCP Low-Level Protocols Up: Setting up your System Previous: Be Paranoid-- Call Sequence . If you want to provide anonymous UUCP access to your system, you first have to set up a special account for it as described above. ... In addition, you have to set a few of the security options for unknown systems. ... The last two lines permit unknown systems to execute rmail; but the command path specified makes uucico look for the rmail command in a private directory named anon-bin only. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node179.html -- 3.3 Кб -- 18.04.1999
Похожие документы
Похожие документы
815. Different Streaks of Development
... In the meanwhile, Fred continued development, going on to Net-2e, which features a much revised design of the networking layer. ... Most notable about Net-2e is the incorporation of DDI, the Device Driver Interface . ... For this, he integrated some of the BSD networking code in the kernel. ... This only applies to commands that deal with kernel internals rather closely; applications and common networking commands such as rlogin or telnet run on either of them. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node18.html -- 3.4 Кб -- 18.04.1999
Похожие документы
Похожие документы
816. UUCP Low-Level Protocols
Next: Protocol Overview Up: Managing Taylor UUCP Previous: Anonymous UUCP . ... This is often referred to as the high-level protocol. During the initialization phase and the hangup phase these are simply sent across as strings. However, during the real transfer phase, an additional low-level protocol is employed which is mostly transparent to the higher levels. ... Protocol Overview . Tuning the Transmission Protocol . ... Andrew Anderson . Thu Mar 7 23:22:06 EST 1996 ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node180.html -- 2.5 Кб -- 18.04.1999
Похожие документы
Похожие документы
817. Protocol Overview
Next: Tuning the Transmission Protocol Up: UUCP Low-Level Protocols Previous: UUCP Low-Level Protocols . As UUCP is used over different types of connections, such as serial lines or TCP, or even X.25, specific low-level protocols are needed. ... Sometimes, sending eight-bit characters over a serial connection is impossible, for instance if the connection goes through a stupid terminal server. ... This is the case for all TCP connections, as well as for most modem connections. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node181.html -- 4.2 Кб -- 18.04.1999
Похожие документы
Похожие документы
818. Tuning the Transmission Protocol
Next: Selecting Specific Protocols Up: UUCP Low-Level Protocols Previous: Protocol Overview . All protocols allow for some variation in packet sizes, timeouts, and the like. ... The g protocol, for instance, uses window sizes from 1 to 7, and packet sizes in powers of 2 ranging from 64 through 4096. ... On the other hand, on very good telephone lines the protocol overhead of sending ACKs for every 128 bytes may prove wasteful, so that you might increase the packet size to 512 or even 1024. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node182.html -- 2.9 Кб -- 18.04.1999
Похожие документы
Похожие документы
819. Telephone Number
... If the remote system is to be reached over a telephone line, the phone field specifies the number the modem should dial. ... For instance, some telephone installations will choke when you don't pause between dialing the prefix code and telephone number. Don't know the proper English term for this-- you know, something like a company's private internal installation where you have to dial a 0 or 9 to get a line to the outside.] ... Any such string is translated to a dialcode using the dialcode file. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node161.html -- 2.7 Кб -- 18.04.1999
Похожие документы
Похожие документы
820. Port and Speed
... The port and speed options are used to select the device used for calling the remote system, and the maximum speed to which the device should be set. A system entry may use either option alone, or both options in conjunction. ... If you have several modems attached to your systems, you still often don't want to name a particular port, because if uucico finds that there are several matches, it tries each device in turn until it finds an unused one. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node162.html -- 2.6 Кб -- 18.04.1999
Похожие документы
Похожие документы