[
Top
]
[
Contents
]
[
Index
]
[
?
]
Table of Contents
1. GNU Anubis
2. Overview
3. Glossary of Frequently Used Terms
4. Authentication
4.1 User Database
4.2 Database URL
4.2.1 Plain text databases
4.2.2 Databases in GDBM format
4.2.3 MySQL and PostgreSQL
4.3 Managing the Database
4.3.1 Administrators
4.3.1.1 Creating the Database
4.3.1.2 Listing Database Records
4.3.1.3 Adding New Records
4.3.1.4 Removing Existing Records
4.3.1.5 Modifying Existing Records
4.3.1.6 Summary of All Administrative Commands
4.3.2 Users
5. Configuration
5.1 AUTH Section
5.2 CONTROL Section
5.2.1 Basic Settings
5.2.2 Output Settings
5.2.3 Proxy Settings
5.2.4 ESMTP Authentication Settings
5.2.5 Encryption Settings
5.2.6 Security Settings
5.3 TRANSLATION Section
5.4 GUILE Section
6. The Rule System
6.1 Actions
6.2 Conditional Statements
6.3 Triggers
6.4 Boolean Operators
6.5 Regular Expressions
6.6 Action List
6.6.1 Stop Action
6.6.2 Call Action
6.6.3 Adding Headers or Text
6.6.4 Removing Headers
6.6.5 Modifying Messages
6.6.6 Inserting Files
6.6.7 Mail Encryption
6.6.8 Using an External Processor
6.6.9 Quick Example
6.7 Using Guile Actions
6.7.1 Defining Guile Actions
6.7.2 Invoking Guile Actions
6.7.3 Support for ROT-13
6.7.4 Remailers Type-I
6.7.5 Entire Message Filters
7. Invoking GNU Anubis
8. Sample Beginning
9. Using the TLS/SSL Encryption
10. Using S/MIME Signatures
11. Using Mutt with Anubis
11.1 Using GNU mailutils as an interface to mutt
11.2 Using msg2smtp.pl as an interface to mutt
11.3 Patching mutt
11.4 Comparison of the Three Interface Methods
12. Reporting Bugs
13. Pixie & Dixie
A. GNU Free Documentation License
A.0.1 ADDENDUM: How to use this License for your documents
Concept Index
This document was generated by
Wojciech Polak
on
December, 18 2004
using
texi2html