Exim The Mail Transfer Agent
Author: Philip Hazel
Typical of this approach is the treatment of methods for blocking traffic from bad hosts that attempt to mail to your Exim station. The book runs through alternative techniques--using a public blocking list, blocking hosts explicitly, and so on--in series. Each technique is described in terms of what happens and why, and includes listings of the relevant configuration commands. Other sections, such as those concerned with SMTP configuration, are more reference-like. They contain long lists of commands and options, in which the purpose of each is explained. --David Wall
Topics covered: How to set up, configure, and administer the Exim mail-handling agent. Directors, routers, transports, filters, and the integration of Exim with Perl, shell scripts, and database lookups are covered.
Images and descriptions provided by Amazon