<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Vtrio Sysadmins &#187; Plesk</title>
	<atom:link href="https://sysadmin.vtrio.com/?cat=8&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>https://sysadmin.vtrio.com</link>
	<description></description>
	<lastBuildDate>Fri, 11 May 2018 07:40:10 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Finding spamming in qmail</title>
		<link>https://sysadmin.vtrio.com/?p=31</link>
		<comments>https://sysadmin.vtrio.com/?p=31#comments</comments>
		<pubDate>Tue, 31 Dec 2013 02:39:39 +0000</pubDate>
		<dc:creator><![CDATA[]]></dc:creator>
				<category><![CDATA[Plesk]]></category>

		<guid isPermaLink="false">http://sysadmin.vtrio.com/?p=31</guid>
		<description><![CDATA[Spamming ??? Qmail is said to be secure and as such there are very less chances for spamming. In case of spamming, you can find out the culprit as said in the following example. Try running /var/qmail/bin/qmail-qread. The utility on a server gave the following output. 20 Sep 2007 05:29:32 GMT #96945 24355 &#60;spam@domain.com&#62; bouncing]]></description>
				<content:encoded><![CDATA[<p>Spamming ???</p>
<div></div>
<p>Qmail is said to be secure and as such there are very less chances for spamming. In case of spamming, you can find out the culprit as said in the following example.</p>
<p>Try running /var/qmail/bin/qmail-qread. The utility on a server gave the following output.</p>
<p>20 Sep 2007 05:29:32 GMT #96945 24355 &lt;spam@domain.com&gt; bouncing<br />
done remote giaygoiqua@test.com<br />
done remote giayvietplaza@test1.com<br />
done remote gig@domain123.com<br />
done remote gilbert.marc@abc.com<br />
done remote gillvector@fptnet.com.net<br />
done remote gimmy.vo@azf.com<br />
remote gin@dom.com</p>
<p>This shows that a lot of messages were sent from the address spam@domain.com and that all of them have bounced. <a id="ch-link-9" rel="in|9"></a>In order to find the message content, to make sure it is spam, do the following.</p>
<p># cd /var/qmail/queue/mess<br />
# find . -iname 96945 ( 96945 is the message number which you get from the first line pasted above)</p>
<p>If the message content looks suspicious, you can take immediate action against the domain domain.com.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>https://sysadmin.vtrio.com/?feed=rss2&#038;p=31</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
