How To Configure Exim Mail Server In Redhat Enterprice Linux
In This Tutorial We Are Going To Learn How To Configure Exim Mail Server In Linux Rhel-4&5
Before Configuring Exim Server Or Any Other Server You Must Have Configured Yum Server In Your Linux System
Now How To Configure Exim Server
Here Is The Command Of Configuring Exim Server
First We Have To Create At Least 2 User In Linux To Send Or Receive The mail
So How To Create User
[spu popup=”1530″]YOUR TEXT OR IMG HERE[/spu]
#useradd linux #passwd linux {After Then Press Enter And Give The Password To The User} #useradd ccna #passwd ccna {After Then Press Enter And Give The Password To The User}
Here You Can See This Picture Also How I Am Creating The User In Linux
Now The Configuration Of Exim server Is Start See This Coding
#yum install exim* -y #alternatives --config mta #service exim restart
Now Go To The 2 Terminal And Send The Mail To Another User
Here Is The Command To send The mail To The User
[spu popup=”1530″]YOUR TEXT OR IMG HERE[/spu]
#mail -s "Subject" linux {linux Is The Name Of Another User Where We Have To Send The Mail}
Now Go To The 3 Terminal And And Login With The User Linux And Check The Mail Which Is Send By User 1 Which Is ccna
Now How To Check Mail Send By Another User Here Is The Command To Check
# Mailx {To Check The Mail Which Is Send By Another User}
This Is All How We Have To Configure Exim Mail Server In Redhat Enterprise Linux
Just Follow These Simple Codings And Configure Exim Mail Server In Linux
If you learn something from this post then make sure you please like this tutorial and follow my this beautiful website to learn more intresting topic on kali linux and windows,Ethical Hacking, Redhat linux,cryptography and much more intresting topics.
If you want to learn about cyber security in detail and if you want practical training of cyber security with detail notes so by scrolling down the page check this product it will give you the best knowledge with practical training.
https://atomic-temporary-150512636.wpcomstaging.com/product/cyber-security-training-notes/
Categories