By Jack Wallen<br /><br />From the drop-down menu, you can switch from Favorite Applications to Recently Used Applications or Recent Documents.
From the drop down you can switch from Favorite Applications to Recently Used Applications or Recent Documents.
You can use the Filter to search for the application you are wanting to run.
There are actually two different terminals you can use: Gnome Terminal and X Terminal.
Your terminal awaits your command.
The initial Webmin screen gives you basic information about your system.
Don't start the server until your configuration is complete.
In order to use SSL, you will have to have SSL installed.
The defaults will work for many installations.
- Serve Mail Protocols: Protocols you want to use for serving mail.
- Interfaces For IMAP | POP3 Connections:IPv4/v6 or host address to use to listen for mail connections. Note: It's not currently possible to specify multiple addresses.
- Interfaces For IMAP SSL | POP3 SSL Connections: IPv4/v6 or host address to use to listen for SSL mail connections.
This screen contains quite a few configuration options. Like above, I will be sticking with the defaults. Your network/company demands might require you to make changes to these options. Here are descriptions of the options:
- SASL Authentication Realms: A space separated list of realms for Simple Authentication Security Layer (SASL) authentication mechanisms. If you don't want to support multiple realms, you can leave it empty.
- Default Authentication Realm: The default realm (domain) to use if none was specified. This is used for both SASL realms as well as the appending of @domain to a username when using plaintext logins.
- Data Source For Users, Homes And IDs: The type of data source you will use for user data.
- Password Authentication Source: The type of password the users will be required to use. The default is PAM.
- Minimum | Maximum Valid UID: The valid UID range for users. The default is 500 and above. This keeps users from logging in as daemons or system users. Fortunately, Dovecot will not allow users to log in as root.
- Minimum | Maximum Valid Group ID: The valid group ID range for users.
- Additional Granted Secondary Groups: Grant access to these groups for mail processes (i.e., Procmail).
- Chroot Directory For Mail Process: A separated list of directories under which chrooting is allowed for mail processes. Note: chrooting is an operation that changes the root directory. It affects only the current process and its children.
Defaults here are pretty standard.
- Mail File Location: Where the user mail is stored. If you're using SuSE, that location will most likely be /var/mail.
- Interval Between Mail Checks: Specifies the minimum interval in seconds between new mail notifications to client.
- Interval Between Mail Checks When Idle: Same as above, but when using the IDLE command.
- Allow Access To Entire System: Allows full filesystem access to clients. There is no access check other than when the OS checks for the active UID/GID.
- Save E-mail with CRLF Line Endings: Saves mails with CRLF instead of plain LF line endings.
- Handle Mail Changes By Other Programs: Asks if you want Dovecot to deal with mail changes made by other programs. Enabling this will put a hit on your system load.
- Permission umask For New Files: Asks what permissions you want to give new files.
If you are not using SSL, forget about this configuration.
- SSL Certificate File: This is where you house your certificate file.
- SSL Private Key File: This is where you house your private key file.
- Interval Between SSL Parameter Regeneration: This is how often you want to regenerate the SSL parameters file. Note: The generation of the SSL parameters file is a very CPU intensive operation. The value is in hours. 0 disables regeneration entirely.
- Disallow Plaintext Authentication In Non-SSL Mode: You can disable plaintext authentications (unless SSL/TLS is used). Note: 127.*.*.* and IPv6 ::1 addresses are already considered secure. If you connect from the loopback address (127.0.0.1) or an Ipv6 address, that connection will be secure.
Only use this option if you know what you're doing.
You can use the Filter to search for the application you are wanting to run.Press the More Applications button to reveal a new window filled with executable icons.
Related Topics:Open Source Software Security Developer Enterprise Software Innovation
By Jack Wallen
Jack Wallen is an award-winning writer for TechRepublic and Linux.com. He’s an avid promoter of open source and the voice of The Android Expert. For more news about Jack Wallen, visit his website jackwallen.com.