1.You see that you now have a new menu named Plug-ins and that on this menu the Send Mail plug-in is available as shown in figure 24.
可以看到,现在有一个新的名为Plug-ins的菜单,在该菜单上,出现了SendMail插件,如图24所示。
2.The sendmail command will respond with a message advising which IDs can be resolved to a mailer command.
这个sendmail命令的响应是一个消息,它指出哪些ID可以解析为mailer命令。
3.Postfix, like Sendmail, does a number of security checks, but Postfix is also designed as a set of modules that minimize privilege.
类似于Sendmail,Postfix会去做很多安全检测,不过,为了最小化特权,Postfix设计为一组模块。
4.For this process to work, on the AIX server side I had to make a couple of changes to my Sendmail configuration.
为了实现这个过程,我必须在AIX服务器端对Sendmail配置做一些修改。
5.The immediate cause of the vulnerability was that one of Sendmail's security checks was flawed, permitting a buffer overflow.
造成这一漏洞的直接原因是,Sendmail的一个安全检测是有缺陷的,可以发生缓冲区溢出。
6.The -bd flag starts Sendmail as a daemon (running in the background) as a Simple Mail Transfer Protocol (SMTP) mail router.
bd标志以守护进程(在后台运行)的形式启动Sendmail,作为SimpleMailTransferProtocol(SMTP)邮件路由器。
7.A mailer table in Sendmail can be used to override routing for particular domains, which are not local host names.
Sendmail中的mailertable用于覆盖某些域的路由,这些域不是本地主机名。
8.Its main claim to fame is as a helper tool for the popular sendmail mailer configuration file.
它的声望主要是由于这是流行的sendmail配置文件所使用的辅助工具。
9.Again, I could use the Sendmail mailertable entry here, but I also needed a way to handle the unusual SMTP port.
这里同样可以使用Sendmailmailertable条目,但是需要有办法处理非默认的SMTP端口。
10.Thus, any flaw in Sendmail can give an attacker immediate control over the entire system.
这样,Sendmail中的任何缺陷都可以让攻击者直接控制整个系统。