Useful Exim Commands

Useful Exim Commands

 

Exim is a message transfer agent (MTA) for hosts that are highly comfortable and running in Unix or Linux Operating system. Exim server is developed at the University of Cambridge. We can easily manage and configure in server. In this article Hostdens will explain few executable commands as below.

 

1) Print a count of the messages in the queue, use the following command line : 

root@localhost# exim -bpc

 

2) Print a listing of the messages in the queue (time queued, size, message-id, sender, recipient), use the following command line : 

root@localhost# exim -bp

 

3) Print a summary of messages in the queue (count, volume, oldest, newest, domain, and totals), use the following command line : 

root@localhost# exim -bp | exiqsumm

 

4) Print what Exim is doing right now, use the following command line : 

root@localhost# exiwhat

exim-vps

5) Test how exim will route a given address, use the following command line : 

root@localhost# exim -bt test@ownmyserver.com
user@thishost.com
<– test@ownmyserver.com
router = localuser, transport = local_delivery
root@localhost# exim -bt user@thishost.com
user@thishost.com
router = localuser, transport = local_delivery
root@localhost# exim -bt user@remotehost.com
router = lookuphost, transport = remote_smtp
host mail.remotehost.com [1.2.3.4] MX=0

 

6) Run a pretend SMTP transaction from the command line, as if it were coming from the given IP address. This will display Exim’s checks, ACLs, and filters as they are applied. The message will NOT actually be delivered, use the following command line : 

root@localhost# exim -bh 192.168.11.22

 

7) Display all of Exim’s configuration settings, use the following command line : 

root@localhost# exim -bP

Read More

How to Create a StartSSL Certificate on StartSSL Control Panel

To Create a StartSSL Certificate

In this article Hostdens will give you how you can easily Create a StartSSL  Certificate on StartSSL Control Panel. Follow the steps and create a StartSSL Certificate.

Create a StartSSL Certificate

 

Step 1 : Login to the StartSSL Control Panel.

Step 2 : Select the Validations Wizard tab.

Step 3 : Select Domain Name.

Step 4 : Click on Continue button.

Step 5 : Then enter the top domain name, and select the domain name extension.

Step 6 : Click on Continue button.

Step 7 : Select the email address for verification of domain name.

Step 8 : Click on Continue button.

Step 9 : Then enter the verification code you received by mail into the the field. 

Step 10 : Click on Finish button. 

Step 11 : Select the Certificates Wizard tab.

Step 12 : Select SSL/TLS Server Certificate.

Step 13 : Click on Continue button.

Step 14 : Then enter a password ( at least 10 characters ).

Step 15 : Click on Continue button. 

Step 16 : Save the private key.

Step 17 : Click on Continue button.

Step 18 : Select the domain name from the drop-down box.

Step 19 : Click on Continue button.

Step 20 : Then add a sub domain name.

 Step 21 : Click on Continue button. 

Step 22 : Save the certificate.

Step 23 : Click on Finish button.

Step 24 : Select the Tool Box tab.

Step 25 : Click on Decrypt Private Key.

Step 26 : Then enter the content of the private key and supply the password.

Step 27 : And finally Save the decrypted private key.

 

 

That’s it!

Read More

How to import StartCom CA into Vista

To Import StartCom CA into Vista

In this Article Hostdens will explain how to import StartCom CA into Vista. Please follow the instruction and import StartCom CA.

Step 1 : Using IE click on the appropriate certificate.

Step 2 : You can download the cert and double click on it.

Step 3 : In the security warning box, click on Open button.

Step 4 : Click on Install Certificate button.

Step 5 : You will see Certificate Import Wizad windo, Click on Next button.

Step 6 : Then, Choose the radio button for Place all certificates in the following store.

Step 7 : Then click on Browse.

Step 8 : Select the certificate store you wont to use, Choose Trusted Root Certification Authorities.

Step 9 : Then click on OK button.

Step 10 : Click on Next button.

Step 11 : Then, click on Finish button.

Step 12 : There might be a warning, which you should approve.
That’s it!

Read More

How to Install SSL Certificate in Microsoft IIS 7

To install the primary SSL certificate, you must complete the pending request, and then bind the certificate to your website, Please follow the steps and  Install an Certificate in Microsoft IIS 7.

Microsoft IIS 7

Step 1: Click Start.

Step 2: Then click Run.

Step 3: Type mmc.

Step 4: Then click OK.

The Microsoft Management Console (Console) window opens.

Step 5: Click the File menu, in the Console1 window, and Select Add/Remove Snap-in.

Step 6: Select Certificates, in the Add or Remove Snap-in window, and click Add.

Step 7: Select Computer Account, in the Certificates snap-in window, and then click Next.

Step 8: Select Local Computer, in the Select Computer window, and then click Finish.

Step 9: Click OK.

Step 10: In the Console1 window, click + to expand the folder.

Step 11: Right-click Intermediate Certification Authorities, mouse-over All Tasks.

Step 12: Then click Import.

Step 13: In the Certificate Import Wizard window, click Next.

Step 14: Click Browse to find the intermediate certificate file.

Step 15: Change the file extension filter to PKCS #7 Certificates (*.spc;*.p7b), select the *_iis_intermediates.p7b file

Step 16: Then click Open.

Note : Do not install your Leaf Certificate in this area. Doing so removes your certificate from the list, and you must reinstall to correct the problem.

Step 17: Click Next, in the Certificate Import Wizard window.

Step 18: Select Place all certificates in the following store. 

Step 19: Then click Browse.

Step 20: In the Select Certificate Store window, select Intermediate Certification Authorities, and then click OK.

Step 21: In the Certificate Import Wizard window, click Next.

Step 22: Click Finish.

Step 23: Click OK.

Step 24: Close the Console 1 window.

Step 25: Then click No to remove the console settings.

That’s it!

Read More