webmail second.pdf

Upload: rishabh884

Post on 02-Jun-2018

259 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/10/2019 webmail second.pdf

    1/57

    1

    CHAPTER -1 INTRODUCTION TO ORGANIZATION

    Network Nuts Pvt. Ltd. -- For Linux, for life

    Index

    1. About us

    2. Awards won by us

    3. Red Hat Certifications

    4. Linux training

    5.

    Online training

    1.1 About Us

    Network NUTS offers RHCSA, RHCE, RHCVA, RHCA, Red Hat Storage, Red Hat Cluster and

    Red Hat Cloud certification and many other open source technology training in Delhi. We are the

    Best Red Hat Training Partner in Delhi and North India for last 6 years.

    Network NUTS was established in 2003 as a education organization. We started in North Delhi,

    India and started provided IT certification training on Microsoft & Cisco. Its training has

    reached lacs of professionals in India and worldwide using our classroom based instructor led

    training, online training and videos. Range of professionals from network administrators,

    security administrators to security consultants are sharing and using lessons they learned from

    Network NUTS.

    Network NUTS is the most trusted and loved Red Hat Linux Certification Training Company in

    India.

    Network NUTS is a premium Red Hat Certification Training Partner and our main focus is onopen source training including all the Red Hat Certification Training ranging from RHCSA,

    RHCE, RHCSS, RHCVA, RHCA and Open Stack Cloud training. With our high quality training

    standards we are able to achieve near to 90% pass percentage in Red Hat Certifications.

    Our high standards in Red Hat Linux Certification Training can be proven by the fact that we

    had won Best Red Hat Certified Training Partner award in North India for last 6 years

    consecutively.

  • 8/10/2019 webmail second.pdf

    2/57

    2

    I was fed up with the substandard training provided by the training companies. Being a

    technical trainer myself in my early days, I was told many times by my employers to speed up

    the batch, dont share anything outside the course curriculum etc. I think one of the reasons for

    this behavior might be is because generally employers are not techie; they are investors and

    wanted their ROI in minimum time span. I was determined to change this. I always wanted to

    share more. So started Network NUTS in year 2003, says Alok Srivastava, Founder-CEO

    Network NUTS

    We initially started offering Microsoft and Cisco Certification training like MCSE, CCNA,

    CCNP certifications. Then we realized the potential of opensource and Linux. We started our

    opensource journey with parterning with Novell for SuSE. In the year 2004, we created a ripplein the training sector, in Delhi by offering mentoring maximum SuSE linux professionals.

    Then during 2004-05 we partnered with Red Hat and started offering high quality Red Hat Linux

    training in Delhi. During our first year of partnership with Red Hat. Our hard work and

    dedication towards quality trainings has earned us Most Promising Red Hat Certified

    Training Partneraward. That was a morale booster. Now we are most reputed and loved

    Red Hat Linux Certification training company in India with 6 Red Hat GLS awards and over

    8000+ Red Hat Certified engineers.

    1.2 Awards won by Network NUTS:

    Most Promising Red Hat Certified Partner 2005-06

    Best Red Hat Certified Training Partner, North India 2006-07

    Best Red Hat Certified Training Partner, North India 2007-08

    Best Red Hat Certified Training Partner, North India 2010-11

    Best Red Hat Certified Training Partner, North India 2011-12

    Appreciation Award for Contribution to Red Hat Linux, India & Overseas 2012-13

    Special Appreciation Award for Beyond RHCE training, India & Overseas 2012-13

    Our students comes from names like Novell, Wartsila India Ltd., Canon, St. Patricks

    International College-UK, UNODC, Jindal Steels and Power Limited, Institute of Engineering

    and Technology-Alwar, Hindu College-Sonepat, GVM College-Sonepat, GeoEnpro Petroleum

    Ltd-France, Life Insurance Corporation of India (LIC), National Information Centre (NIC) Govt.

    of India, Indian Air Force-WAC, Indian Air Force-AFCAO, Indian Air Force-CAC, INDIAN

  • 8/10/2019 webmail second.pdf

    3/57

  • 8/10/2019 webmail second.pdf

    4/57

    4

    Fig 1.1: Red Hat Certifications

    1.4 Linux Training:

    Fig 1.2: Linux Training

  • 8/10/2019 webmail second.pdf

    5/57

    5

    1.5 Time to Live, Love, Learn Linux Online:

    Network NUTS is India's most Loved Linux training company and winner of "Best Red Hat

    Certified Training Partner" in North India for 6 years. Conducting maximum number of Red

    Hat Certification examinations in Northern India. Network NUTS offers online Red Hat Linux

    training and generic Linux training on popular certifications like RHCE, RHCVA, Red Hat

    Server Hardening, Red Hat Cloud Storage, OpenStack, OpenLDAP, Linux HA Clustering,

    MySQL, MariaDB, Puppet Fundamentals & VMWare. Online Linux training are delivered using

    trusted Cisco Webex enterprise solution.

    In addition to classroom based training. Network NUTS offers Online RedHat Linux

    Certification Training using Cisco Webex. Get trained by our experienced Linux trainers from

    the comfort of your home / office. Save on travelling, boarding and hotel cost. Further you can

    continue your classes without taking leave from your work. The timings are also flexible,

    specially for USA, Europe students as there is a approximate time difference of 12 hours.

    You can attend Online RHCE, RHCVA, Red Hat Server Hardening, Red Hat Cloud Storage,

    OpenStack, OpenLDAP, Linux HA Clustering, MySQL, MariaDB, Puppet Fundamentals &

    VMWare training.

    The biggest benefit of attending our RedHat Linux online training is, you get secure access to

    recordingsof all your sessions. You can refer recordings any number of times and go through

    your class again, in case of any doubt. Feel free to raise your doubt to your trainer in next class,

    in case you still need his help. You also got opportunity of interacting with all classmates from

    different regions of world. Thus enhancing training experience.

    Why Choose Network NUTS Online Training?

    Best Linux Trainers in the Industry

    Get Recording of All Classes

    Deliverd securely via Cisco Webex

    Save Time and Money on Travelling

    Live Audio Video Session with Trainer

    No Need to Install any Software

  • 8/10/2019 webmail second.pdf

    6/57

    6

    CHAPTER -2 INTRODUCTION TO PROJECT AND PROJECT WORK

    2.1 Prerequisite for project development: Linux

    Linux is, in simplest terms, an operating system. It is the software on a computer that enables

    applications and the computer operator to access the devices on the computer to perform desired

    functions. The operating system (OS) relays instructions from an application to, for instance, the

    computer's processor. The processor performs the instructed task, then sends the results back to

    the application via the operating system.Explained in these terms, Linux is very similar to other operating systems, such as Windows and

    OS X.

    But something sets Linux apart from these operating systems. The Linux operating system

    represented a $25 billion ecosystem in 2008. Since its inception in 1991, Linux has grown to

    become a force in computing, powering everything from the New York Stock Exchange to

    mobile phones to supercomputers to consumer devices.

    As an open operating system, Linux is developed collaboratively, meaning no one company is

    solely responsible for its development or ongoing support. Companies participating in the Linux

    economy share research and development costs with their partners and competitors. This

    spreading of development burden amongst individuals and companies has resulted in a large and

    efficient ecosystem and unheralded software innovation.

    Over 1,000 developers, from at least 100 different companies, contribute to every kernel release.

    In the past two years alone, over 3,200 developers from 200 companies have contributed to the

    kernel--which is just one small piece of a Linux distribution.

    2.2.1 The Birth of Linux

    On August 25, 1991, a Finn computer science student named Linus Torvalds made the following

    announcement to the Usenet group comp.os.minux:

    "I'm doing a (free) operating system (just a hobby, won't be big and professional like gnu) for

    386(486) AT clones. This has been brewing since april, and is starting to get ready. I'd like any

  • 8/10/2019 webmail second.pdf

    7/57

    7

    feedback on things people like/dislike in minix, as my OS resembles it somewhat (same physical

    layout of the file-system (due to practical reasons) (among other things)."

    The Minix Torvalds referred to is a variant of the UNIX operating system, used as a guideline

    for his the free operating system he wanted to run on the x86-based consumer PCs of the day.

    gnu refers to the set of GNU (GNU Is Not Unix) tools first put together by Richard Stallman in

    1983. UNIX, the operating system that started it all, had its origins in the old Bell Labs back in

    the early 60s.

    Torvalds built the core of the Linux operating system, known as the kernel. A kernel alone does

    not make an operating system, but Stallman's GNU tools were from a project to create an

    operating system as well--a project that was missing a kernel to make Stallman's operatingsystem complete. Torvalds' matching of GNU tools with the Linux kernel marked the beginning

    of the Linux operating system as it is known today.

    Linux is in many ways still only at the beginning of its potential, even though it has enjoyed

    tremendous success since Torvalds' first request for help in 1991.

    Linux has gained strong popularity amongst UNIX developers, who like it for its portability to

    many platforms, its similarity to UNIX, and its free software license. Around the turn of the

    century, several commercial developers began to distribute Linux, including VA Linux,

    TurboLinux, Mandrakelinux, Red Hat, and SuSE GMbH. IBM's 2000 decision to invest $2

    billion in Linux development and sales was a significant positive event to the growth of Linux.

    Today, Linux is a multi-billion dollar industry, with companies and governments around the

    world taking advantage of the operating system's security and flexibility. Thousands of

    companies use Linux for day-to-day use, attracted by the lower licensing and support costs.

    Governments around the world are deploying Linux to save money and time, with some

    governments commissioning their own versions of Linux.

    2.1.2 The Kernel

    All operating systems have kernels, built around the architectural metaphor that there must be a

    central set of instructions to direct device hardware, surrounded by various modular layers of

    functionality. The Linux kernel is unique and flexible because it is also modular in nature.

    The kernel of the Window operating system (which few people outside of Microsoft are allowed

    to look at without paying for the privilege) is a solidly connected piece of code, unable to be

  • 8/10/2019 webmail second.pdf

    8/57

    8

    easily broken up into pieces. It is difficult (if not impossible) to pare down the Windows kernel

    to fit on a phone.

    This modularity is significant to the success of Linux. The ability to scale down (or up) to meet

    the needs of a specific platform is a big advantage over other operating systems constrained to

    just a few possible platforms.

    Modularity also effects stability and security as well. If one piece of the kernel code happens to

    fail, the rest of the kernel will not crash. Similarly, an illicit attack on one part of the kernel (or

    the rest of the operating system) might hamper that part of the code, but should not compromise

    the security of the whole device.

    2.1.3 The Operating System

    Developers need special tools (like the compilers and command lines found in GNU) to write

    applications that can talk to the kernel. They also need tools and applications to make it easy for

    outside applications to access the kernel after the application is written and installed.

    This collective set of tools, combined with a kernel, is known as the operating system. It is

    generally the lowest layer of the computer's software that is accessible by the average user.

    General users get to the operating system when they access the command line.

    Linux provides powerful tools with which to write their applications: developer environments,

    editors, and compilers are designed to take a developer's code and convert it to something that

    can access the kernel and get tasks done.

    Like the kernel, the Linux operating system is also modular. Developers can pick and choose the

    operating tools to provide users and developers with a new flavor of Linux designed to meet

    specific tasks.

    2.1.4 The Environments

    The windows, menus, and dialog boxes most people think of as part of the operating system are

    actually separate layers, known as the windowing system and the desktop environment.

    These layers provide the human-oriented graphical user interface (GUI) that enables users to

    easily work with applications in the operating system and third-party applications to be installed

    on the operating system.

  • 8/10/2019 webmail second.pdf

    9/57

    9

    In Linux, there a lot of choices for which windowing system and desktop environment can be

    used, something that Linux allows users to decide. This cannot be done in Windows and it's

    difficult to do in OS X.

    Like the operating system and kernel, there are tools and code libraries available that let

    application developers to more readily work with these environments (e.g., gtk+ for GNOME, Qt

    for KDE).

    2.1.5 Linux Features

    Multitasking: several programs running at the same time.

    Multiuser: several users on the same machine at the same time (and notwo-user licenses!). Multiplatform: runs on many different CPUs, not just Intel.

    Multiprocessor: SMP support is available on the Intel and SPARC platforms (with work

    currently in progress on other platforms), and Linux is used in several loosely-coupled MP

    applications, including Beowulf systems and the Fujitsu AP1000+ SPARC-based

    supercomputer.

    Multithreading: has native kernel support for multiple independent threads of control within a

    single process memory space.

    Runs in protected mode on the 386.

    Has memory protection between processes, so that one program can't bring the whole system

    down.

    Demand loads executable: Linux only reads from disk those parts of a program that are

    actually used.

    Shared copy-on-write pages among executables. This means that multiple process can use the

    same memory to run in. When one tries to write to that memory, that page (4KB piece of

    memory) is copied somewhere else. Copy-on-write has two benefits: increasing speed and

    decreasing memory use.

    Virtual memory using paging (not swapping whole processes) to disk: to a separate partition

    or a file in the file system, or both, with the possibility of adding more swapping areas during

    runtime (yes, they're still called swapping areas). A total of 16 of these 128 MB (2GB in

    recent kernels) swapping areas can be used at the same time, for a theoretical total of 2 GB of

  • 8/10/2019 webmail second.pdf

    10/57

  • 8/10/2019 webmail second.pdf

    11/57

    11

    MS-DOS 6 compressed partitions do not work at this time without a patch (dmsdosfs).

    VFAT (WNT, Windows 95) support and FAT-32 is available in Linux 2.0

    Special file system called UMSDOS which allows Linux to be installed on a DOS file

    system.

    read-only HPFS-2 support for OS/2 2.1

    HFS (Macintosh) file system support is available separately as a module.

    CD-ROM file system which reads all standard formats of CD-ROMs.

    TCP/IP networking, including ftp, telnet, NFS, etc.

    AppleTalk server

    Netware client and server Lan Manager/Windows Native (SMB) client and server

    Many networking protocols: the base protocols available in the latest development kernels

    include TCP, IPv4, IPv6, AX.25, X.25, IPX, DDP (Appletalk), Netrom, and others. Stable

    network protocols included in the stable kernels currently include TCP, IPv4, IPX, DDP, and

    AX.25.

    2.1.6 Hardware Issues

    Minimal configuration

    The following is probably the smallest possible configuration that Linux will work on:

    386SX/16, 1 MB RAM, 1.44 MB or 1.2 MB floppy, any supported video card (+ keyboards,

    monitors, and so on of course). This should allow you to boot and test whether it works at all on

    the machine, but you won't be able to do anything useful. In order to do something, you will

    want some hard disk space as well, 5 to 10 MB should suffice for a very minimal setup (with

    only the most important commands and perhaps one or two small applications installed, like, say,

    a terminal program). This is still very, very limited, and very uncomfortable, as it doesn't leave

    enough room to do just about anything, unless your applications are quite limited. It's generally

    not recommended for anything but testing if things work, and of course to be able to brag about

    small resource requirements.

    Usable configuration

    If you are going to run computationally intensive programs, such as gcc, X, and TeX, you will

    probably want a faster processor than a 386SX/16, but even that should suffice if you are patient.

  • 8/10/2019 webmail second.pdf

    12/57

    12

    In practice, you will want at least 4 MB of RAM if you don't use X, and 8 MB if you do. Also, if

    you want to have several users at a time, or run several large programs (compilations for

    example) at a time, you may want more than 4 MB of memory. It may still work with a smaller

    amount of memory, but it will use virtual memory (using the hard drive as slow memory) and

    that will be so slow as to be unusable. If you use many programs at the same time, 16 MB will

    reduce swapping considerably. If you don't want to swap appreciably under normal load, 32 MB

    will probably suffice for a single user. If you run lots of memory-intensive applications at once,

    64 MB may be necessary to avoid lots of swapping. Of course, if you run memory-hungry

    applications, you may want more.

    Add more memory, more hard disk, a faster processor and other stuff depending on your needs,wishes and budget to go beyond the merely usable. In general, one big difference from DOS is

    that with Linux, adding memory makes a large difference, whereas with DOS, extra memory

    doesn't make that much difference. This of course has something to do with DOS's 640KB limit,

    which is completely nonexistent under Linux.

    Supported hardware

    CPU:

    Anything that runs 386 protected mode programs. All models of 386s 486s, Pentiums, Pentium

    Pros, Pentium IIs, and clones of these chips should work. (286s and below may someday be

    supported on a smaller kernel called ELKS (Embeddable Linux Kernel Subset), but don't expect

    the same capabilities). A version for the 680x0 CPU (for x= 2 with external MMU, 3, 4, and 6)

    which runs on Amigas and Ataris can be found at tsx-11.mit.edu in the 680x0 directory. Many

    DEC Alphas, SPARCs, and PowerPC machines are supported. Ports are also being done to the

    ARM, StrongARM, and MIPS architectures. More details are available elsewhere.

    Architecture:

    PCI, ISA, EISA, and VLB busses. MCA (mostly true blue PS/2s) support is incomplete but

    improving (see above). Linux puts higher demands on hardware than DOS, Windows, and in fact

    most operating systems. This means that some marginal hardware that doesn't fail when running

    less demanding operating system may fail when running Linux. Linux is an excellent memory

    tester...

  • 8/10/2019 webmail second.pdf

    13/57

    13

    RAM:

    Up to 1 GB on Intel; more on 64-bit platforms. Some people (including Linus) have noted that

    adding ram without adding more cache at the same time has slowed down their machine

    extremely, so if you add memory and find your machine slower, try adding more cache. Some

    machines can only cache certain amounts of memory regardless of how much RAM is installed

    (64 MB is the most one popular chipset can cache). Over 64 MB of memory will require a boot-

    time parameter with kernels 2.0.35 and earlier, as the BIOS was originally designed to be unable

    to report more than 64MB. Recent 2.1.x kernels and later are able to detect more memory in a

    system.

    Data storage:Generic AT drives (EIDE, IDE, 16 bit HD controllers with MFM or RLL, or ESDI) are

    supported, as are SCSI hard disks and CD-ROMs, with a supported SCSI adaptor. Generic XT

    controllers (8 bit controllers with MFM or RLL) are also supported. Supported SCSI adaptors:

    Advansys, Adaptec 1542, 1522, 1740, 27xx, and 29xx (with some exceptions) series, Buslogic

    MultiMaster and Flashpoint, NCR53c8xx-based controllers, DPT controllers, Qlogic ISP and

    FAS controllers, Seagate ST-01 and ST-02, Future Domain TMC-88x series (or any board based

    on the TMC950 chip) and TMC1660/1680, Ultrastor 14F, 24F and 34F, Western Digital

    wd7000, and others. SCSI, QIC-02, and some QIC-80 tapes are also supported. Besides IDE and

    SCSU cdroms, several proprietary CD-ROM devices are also supported, including

    Matsushita/Panasonic, Mitsumi, Sony, Soundblaster, Toshiba, ATAPI (EIDE), SCSI, and others.

    For exact models, check the hardware compatibility HOWTO. N.B.These lists are incomplete,

    and always will be. Distribution vendors maintain more up-to-date lists.

    Video:

    VGA, EGA, CGA, or Hercules (and compatibles) work in text mode. For graphics and X, there

    is support for (at least) normal VGA, some super-VGA cards (most of the cards based on Tseng,

    Paradise, and some Trident chipsets), S3, 8514/A, ATI, Matrox, and Hercules. (Linux uses the

    XFree86 X server, so that determines what cards are supported. A full list of supported chipsets

    alone takes over a page.

    Networking:

    Ethernet support includes 3COM 503/509/579/589/595/905 (501/505/507 are supported but not

    recomended), AT&T GIS (ne NCR) WaveLAN, most WD8390-based cards, most WD80x3-

  • 8/10/2019 webmail second.pdf

    14/57

  • 8/10/2019 webmail second.pdf

    15/57

    15

    how does an email message make its way from a sender to a recipient? The answer to that

    question revolves around something called a mail server.

    A mail server is the computerized equivalent of your friendly neighborhood mailman. Every

    email that is sent passes through a series of mail servers along its way to its intended recipient.

    Although it may seem like a message is sent instantly - zipping from one PC to another in the

    blink of an eye - the reality is that a complex series of transfers takes place. Without this series of

    mail servers, you would only be able to send emails to people whose email address domains

    matched your own - i.e., you could only send messages from one example.com account to

    another example.com account.

    Fig 2.1: Mail server

    How can my e-mail program (e-mail client) find right mail server on the Internet?

    When you start your mail program for the first time, you must normally enter e-mail account

    information before you can use the program. You must for example specify the name of a server

    for outgoing e-mail and the name of a server for incoming e-mail. It is here you specify which

    SMTP server and which POP3 server that your mail program will communicate with over the

    Internet. The servers can be located anywhere on the Earth, but usually they are located in same

    country as your client computer.

    Can I use any mail server I want on the Internet?

    No. The Internet service provider (ISP) that you use when you browse the Internet will normally

    have mail servers that you can access for your e-mails (both incoming and outgoing e-mail) but

    you can normally not access mail servers that other Internet service provider own. The reason for

    this is that mail servers only accept certain IP addresses (the IP addresses that the ISPs provides)

    and if your IP address is outside this range you will be denied access to the server.

  • 8/10/2019 webmail second.pdf

    16/57

    16

    There are exceptions, however. In some cases you can download e-mail from POP3 servers

    provided by other ISPs. They will only check that your username and password is correct. And

    there exists also standalone email servers on the Internet that works independently of Internet

    service providers, and through them you can send and receive e-mails if you have access to the

    username and password. Many web hosting services provide this kind of stand-alone mail

    servers.

    How do mail servers find each other on the Internet?

    When you send an e-mail from your local computer to a mail server, your e-mail has just started

    it's journey to your recipient. Perhaps your receiver is on the other side of the world, and then it's

    a very long distance that the e-mail must travel before it arrives to your receivers computer.Before the mail server that your e-mail program communicates with knows where to deliver the

    e-mail message it will examine the e-mail address that you have specified as a receiver of the

    message. The mail server will extract the domain name of the e-mail address and use it to locate

    the mail server (POP3 server) that your receiver's client computer communicates with. The

    domain name is found after the "@" character in an e-mail address. If for example the e-mail

    address is [email protected], the domain name is abc.com. By using this domain name as an

    address the mail server will find which mail server on the Internet to deliver the e-mail message

    to. When the server has been identified and it has responded that it will accept an e-mail

    delivery, the e-mail is sent to this server. And next time your receiver logs on to the POP3 server

    via his/her client computer, your e-mail will be downloaded to the person's e-mail program.

    Normally all this will take just a few seconds, but if the mail servers or Internet have a lot of

    traffic at that moment it can take some more time.

    2.1.2 The Process of Sending an Email

    Now that you know the basics about incoming and outgoing mail servers, it will be easier to

    understand the role that they play in the emailing process. The basic steps of this process are

    outlined below for your convenience.

    Step #1: After composing a message and hitting send, your email client - whether it's Outlook

    Express or Gmail - connects to your domain's SMTP server. This server can be named many

    things; a standard example would be smtp.example.com.

    mailto:[email protected]:[email protected]
  • 8/10/2019 webmail second.pdf

    17/57

    17

    Step #2: Your email client communicates with the SMTP server, giving it your email address,

    the recipient's email address, the message body and any attachments.

    Step #3: The SMTP server processes the recipient's email address - especially its domain. If the

    domain name is the same as the sender's, the message is routed directly over to the domain's

    POP3 or IMAP server - no routing between servers is needed. If the domain is different, though,

    the SMTP server will have to communicate with the other domain's server.

    Step #4: In order to find the recipient's server, the sender's SMTP server has to communicate

    with the DNS, or Domain Name Server. The DNS takes the recipient's email domain name and

    translates it into an IP address. The sender's SMTP server cannot route an email properly with a

    domain name alone; an IP address is a unique number that is assigned to every computer that isconnected to the Internet. By knowing this information, an outgoing mail server can perform its

    work more efficiently.

    Step #5: Now that the SMTP server has the recipient's IP address, it can connect to its SMTP

    server. This isn't usually done directly, though; instead, the message is routed along a series of

    unrelated SMTP servers until it arrives at its destination.

    Step #6: The recipient's SMTP server scans the incoming message. If it recognizes the domain

    and the user name, it forwards the message along to the domain's POP3 or IMAP server. From

    there, it is placed in a sendmail queue until the recipient's email client allows it to be

    downloaded. At that point, the message can be read by the recipient.

  • 8/10/2019 webmail second.pdf

    18/57

    18

    Fig 2.2: Working of Mail Server

    2.3System Analysis

    2.3.1

    SquirrelMail

    SquirrelMail is a standards-based webmail package written in PHP. It includes built-in pure PHP

    support for the IMAP and SMTP protocols, and all pages render in pure HTML 4.0 (with no

    JavaScript required) for maximum compatibility across browsers. It has very few requirements

    and is very easy to configure and install. SquirrelMail has all the functionality you would want

    from an email client, including strong MIME support, address books, and folder manipulation.

    SquirrelMail is a standards-based webmail package written in PHP. It includes built-in pure PHP

    support for the IMAP and SMTP protocols, and all pages render in pure HTML 4.0 (with no

    JavaScript required) for maximum compatibility across browsers. It has few requirements and is

    easy to configure and install. SquirrelMail has all the functionality you would want from an

    email client, including strong MIME support, address books, and folder manipulation.

    This manual supports SquirrelMail 1.4.0 and up. The 1.2.x series has been obsoleted, and is only

    referenced in the upgrading notes of this manual.

    Fig 2.3: SquirrelMail

  • 8/10/2019 webmail second.pdf

    19/57

    19

    Fig 2.3: SquirrelMail

    Stability

    SquirrelMail is stable enough to use in a production system. It is, in fact, already used in several

    production systems around the world, handling thousands of users per system. There might be

    some bugs - no project is perfect - but they are most likely minimal. We test pretty thoroughly

    before releasing a version marked as "stable".

    Server requirements

    There are only two requirements for SquirrelMail:

    A web server with PHP installed. PHP needs to be at least 4.1.0. PHP 4, PHP 5 and PHP 6are all supported.

    Access to an IMAP server which supports IMAP 4 rev 1.

    It doesn't really matter what OS or web server you use, as long as the combination thereof

    supports PHP in a stable way. Read the instructions and suggestions in the PHP documentation

    to see what they recommend.

  • 8/10/2019 webmail second.pdf

    20/57

    20

    If you're building your mail system from scratch, it might be a good idea to install and test all

    components one by one. If you install everything at once and things don't work, the

    troubleshooting will be more complex. If the web server doesn't work there's not much point in

    trying to install PHP, for instance. Make sure that everything is working before trying to install

    SquirrelMail.

    Client requirements

    Cookies must be enabled in your browser.

    It might be hard to use SquirrelMail on a display smaller then 15" and with less resolution

    than 1024 x 768, and some customizations are required to make it usable.

    2.3.2 YUM Server

    YUM (Yellow-dog Updater and Modifier) is another and advanced way of installing the

    packages in Linux distros such as Red-hat, Fedora and Cent OS.

    In RHEL 6 installing packages is a tedious process, sometimes its headache to install all the

    dependencies. So Red-hat come with a solution to overcome this dependencies problem in most

    situations, the solution for this is nothing but YUM implementation. This will resolve this

    dependency issue and other known issues. Here we are going to present some basic way how to

    use YUM utility to install packages locally (there are so many ways to install packages from

    different sources either local or remote such as ftp, http).

    2.3.3 DHCP Server

    DHCP is useful for automatic configuration of client network interfaces. When configuring the

    client system, you can choose DHCP instead of specifying an IP address, netmask, gateway, or

    DNS servers. The client retrieves this information from the DHCP server. DHCP is also useful if

    you want to change the IP addresses of a large number of systems. Instead of reconfiguring all

    the systems, you can just edit one configuration file on the server for the new set of IP addresses.

    If the DNS servers for an organization changes, the changes happen on the DHCP server, not on

    the DHCP clients. When you restart the network or reboot the clients, the changes go into effect.

    Benefits of DHCP

    In Windows Server 2003, the DHCP Server service provides the following benefits:

  • 8/10/2019 webmail second.pdf

    21/57

    21

    Reliable IP address configuration. DHCP minimizes configuration errors caused by

    manual IP address configuration, such as typographical errors, or address conflicts caused by

    the assignment of an IP address to more than one computer at the same time.

    Reduced network administration. DHCP includes the following features to reduce network

    administration:

    o Centralized and automated TCP/IP configuration.

    o The ability to define TCP/IP configurations from a central location.

    o The ability to assign a full range of additional TCP/IP configuration values by means of

    DHCP options.

    o

    The efficient handling of IP address changes for clients that must be updated frequently,such as those for portable computers that move to different locations on a wireless

    network.

    o The forwarding of initial DHCP messages by using a DHCP relay agent, thus

    eliminating the need to have a DHCP server on every subnet.

    Why use DHCP

    Every device on a TCP/IP-based network must have a unique unicast IP address to access the

    network and its resources. Without DHCP, IP addresses must be configured manually for new

    computers or computers that are moved from one subnet to another, and manually reclaimed for

    computers that are removed from the network.

    DHCP enables this entire process to be automated and managed centrally. The DHCP server

    maintains a pool of IP addresses and leases an address to any DHCP-enabled client when it starts

    up on the network. Because the IP addresses are dynamic (leased) rather than static (permanently

    assigned), addresses no longer in use are automatically returned to the pool for reallocation.

    The network administrator establishes DHCP servers that maintain TCP/IP configuration

    information and provide address configuration to DHCP-enabled clients in the form of a lease

    offer. The DHCP server stores the configuration information in a database, which includes:

    Valid TCP/IP configuration parameters for all clients on the network.

    Valid IP addresses, maintained in a pool for assignment to clients, as well as excluded

    addresses.

    Reserved IP addresses associated with particular DHCP clients. This allows consistent

    assignment of a single IP address to a single DHCP client.

  • 8/10/2019 webmail second.pdf

    22/57

    22

    The lease duration, or the length of time for which the IP address can be used before a lease

    renewal is required.

    A DHCP-enabled client, upon accepting a lease offer, receives:

    A valid IP address for the subnet to which it is connecting.

    Requested DHCP options, which are additional parameters that a DHCP server is configured

    to assign to clients. Some examples of DHCP options are Router (default gateway), DNS

    Servers, and DNS Domain Name.

    How DHCP Works

    DHCP provides an automated way to distribute and update IP addresses and other configuration

    information on a network. A DHCP server provides this information to a DHCP client throughthe exchange of a series of messages, known as the DHCP conversation or the DHCP

    transaction. If the DHCP server and DHCP clients are located on different subnets, a DHCP

    relay agent is used to facilitate the conversation.

    Fig 2.4: Working of DHCP

    DHCP Server Responsibilities

    The DHCP servers maintain scopes, reservations, and options as set by the administrator.

  • 8/10/2019 webmail second.pdf

    23/57

    23

    Scopes

    A scope must be properly defined and activated before DHCP clients can use the DHCP server

    for automatic TCP/IP configuration. A DHCP scope is an administrative collection of IP

    addresses and TCP/IP configuration parameters that are available for lease to DHCP clients of a

    specific subnet. The network administrator creates a scope for each subnet.

    A scope has the following properties:

    A scope name, assigned when the scope is created.

    A range of possible IP addresses from which to include or exclude addresses used in DHCP

    lease offers.

    A unique subnet mask, which determines the network ID for an IP address in the scope. Lease duration values.

    Each DHCP scope can have a single continuous range of IP addresses. To use several address

    ranges within a single scope you must first define the entire address range for the scope, and then

    set exclusion ranges.

    Interactions between Client and Server

    DHCP servers and DHCP clients communicate through a series of DHCP messages. To obtain a

    lease, the DHCP client initiates a conversation with a DHCP server using a series of these DHCP

    messages.

    DHCP Messages

    The following list includes the eight types of messages that can be sent between DHCP clients

    and servers.

    DHCPDiscover

    Broadcast by a DHCP client when it first attempts to connect to the network. The

    DHCPDiscover message requests IP address information from a DHCP server.

    DHCPOffer

    Broadcast by each DHCP server that receives the client DHCPDiscover message and has an IP

    address configuration to offer to the client. The DHCPOffer message contains an unleased IP

    address and additional TCP/IP configuration information, such as the subnet mask and default

    gateway. More than one DHCP server can respond with a DHCPOffer message. The client

    accepts the best offer, which for a Windows DHCP client is the first DHCPOffer message that it

    receives.

  • 8/10/2019 webmail second.pdf

    24/57

    24

    DHCPRequest

    Broadcast by a DHCP client after it selects a DHCPOffer. The DHCPRequest message contains

    the IP address from the DHCPOffer that it selected. If the client is renewing or rebinding to a

    previous lease, this packet might be unicast directly to the server.

    DHCPAck

    Broadcast by a DHCP server to a DHCP client acknowledging the DHCPRequest message. At

    this time, the server also forwards any options. Upon receipt of the DHCPAck, the client can use

    the leased IP address to participate in the TCP/IP network and complete its system startup. This

    message is typically broadcast, because the DHCP client does not officially have an IP address

    that it can use at this point. If the DHCPAck is in response to a DHCPInform, then the messageis unicast directly to the host that sent the DHCPInform message.

    Fig 2.5: Messages in DHCP

    2.3.4 DNS Server

    DNS (Domain Name System), also known as a nameserver, is a network system that associates

    hostnames with their respective IP addresses. For users, this has the advantage that they can refer

    to machines on the network by names that are usually easier to remember than the numerical

    network addresses. For system administrators, using the nameserver allows them to change the

  • 8/10/2019 webmail second.pdf

    25/57

    25

    IP address for a host without ever affecting the name-based queries, or to decide which machines

    handle these queries.

    Fig 2.6: DNS in TCP/IP

    DNS Server Functions

    You can set up a DNS server for several different reasons:

    Internet Domain Support: If you have a domain name and you're operating Web, e-mail,

    FTP, or other Internet servers, you'll use a DNS server ro respond to resolution queries so

    others can find and access your server(s). This is a serious undertaking and you'd have to set

    up a minimum of two of them. On this page we'll refer to these types of DNS servers as

    authoritativeDNS servers for reasons you'll see later. However, there are alternatives to

    having your own authoritative DNS server if you have (or want to have) your own domain

    name. You can have someone else host your DNS records for you. Even if someone else is

    taking care of your domain's DNS records you could still set up one of the following types

    of DNS servers.

    Local Name Resolution: Similar to the above scenario, this type of DNS server would

    resolve the hostnames of systems on your LAN. Typically in this scenario there is one DNSserver and it does both jobs. The first being that it receives queries from workstations and

    the second being that it serves as the authoritative source for the responses (this will be more

    clear as we progress). Having this type of DNS server would eliminate the need to have (and

    manually update) a HOSTS file on each system on your LAN. On this page we'll refer to

    these as LANDNS servers.

  • 8/10/2019 webmail second.pdf

    26/57

    26

    During the Debian installation you are asked to supply a domain name. This is an internal

    (private) domain name which is not visible to the outside world so, like the private IP

    address ranges you use on a LAN, it doesn't have to be registered with anyone. A LAN DNS

    server would be authoritative for this internal, private domain. For security reasons, the

    name for this internal domain should notbe the same as any public domain name you have

    registered. Private domain names are not restricted to using one of the established public

    TLD (Top Level Domain) names such as .com or .net. You could use .corp or .inc or

    anything else for your TLD. Since a single DNS server can be authoritative for multiple

    domains, you could use the same DNS server for both your public and private domains.

    However, the server would need to be accessible from both the Internet and the LAN soyou'd need to locate it in a DMZ. Though you want to use different public and private

    domain names, you can use the same name for the second-level domain. For example, my-

    domain.com for the public name and my-domain.inc for the private name.

    Internet Name Resolution: LAN workstations and other desktop PCs need to send Internet

    domain name resolution queries to a DNS server. The DNS server most often used for this is

    the ISP's DNS servers. These are often the DNS servers you specify in your TCP/IP

    configuration. You can have your own DNS server respond to these resolution queries

    instead of using your ISP's DNS servers. My ISP recently had a problem where they would

    intermittently lose connectivity to the network segment that their DNS servers were

    connected to so they couldn't be contacted. It took me about 30 seconds to turn one of my

    Debian systems into this type of DNS server and I was surfing with no problems. On this

    page we'll refer to these as simpleDNS servers. If a simple DNS server fails, you could just

    switch back to using your ISP's DNS servers. As a matter of fact, given that you typically

    specify two DNS servers in the TCP/IP configuration of most desktop PCs, you could have

    one of your ISP's DNS servers listed as the second (fallback) entry and you'd never miss a

    beat if your simple DNS server did go down. Turning your Debian system into a simple

    DNS server is simply a matter of entering a single command.

    DNS Basics

    Finding a single server out of all of the servers on the Internet is like trying to find a single file

    on drive with thousands of files. In both cases it helps to have some hierarchy built into the

  • 8/10/2019 webmail second.pdf

    27/57

    27

    directory to logically group things. The DNS "namespace" is hierarchical in the same type of

    upside-down tree structure seen with file systems. Just as you have the root of a partition or

    drive, the DNS namespace has a root which is signified by a period.

    Fig 2.7: Working of DNS

  • 8/10/2019 webmail second.pdf

    28/57

    28

    2.3.5 Postfix and Dovecot

    Postfix is a Mail Transport Agent (MTA), supporting LDAP, SMTP AUTH (SASL), TLS and

    running in a chroot environment. Postfix is Wietse Venema's mailer that started life as an

    alternative to the widely-used Sendmail program. Postfix attempts to be fast, easy to administer,

    and secure, while at the same time being sendmail compatible enough to not upset existing users.

    Thus, the outside has a sendmail-ish flavor, but the inside is completely different. This software

    was formerly known as VMailer. It was released by the end of 1998 as the IBM Secure Mailer.

    From then on it has lived on as Postfix. This rpm supports LDAP, SMTP AUTH (trough cyrus-

    sasl) and TLS.

    Dovecot is an open source IMAP and POP3 email server for Linux/UNIX-like systems, written

    with security primarily in mind. Dovecot is an excellent choice for both small and large

    installations. It's fast, simple to set up, requires no special administration and it uses very little

    memory.

    Some of the most notable features of Dovecot include:

    Dovecot is among the highest performingIMAP servers while still supporting the standard

    mbox and Maildir formats. The mailboxes are transparently indexed, which gives Dovecot itsgood performance while still providing full compatibility with existing mailbox handling

    tools.

    Dovecot is standards compliant. Dovecot v1.1 passes all IMAP server standard compliancy

    tests while most other servers fail many of them.

    Dovecot's indexes are self-optimizing. They contain exactly what the user's client commonly

    needs, no more and no less.

    Dovecot is self-healing. It tries to fix most of the problems it notices by itself, such as broken

    index files. The problems are however logged so the administrator can later try to figure out

    what caused them.

    Dovecot tries to be admin-friendly. Common error messages are made as easily

    understandable as possible. Any crash, no matter how it happened, is considered a bug that

    will be fixed.

  • 8/10/2019 webmail second.pdf

    29/57

  • 8/10/2019 webmail second.pdf

    30/57

    30

    2.4About webmail

    Webmail applications enable you to check your e-mail accounts by using your web browser.

    You can compose and read e-mail messages, maintain an address book, and perform other

    common tasks. Third-party e-mail client applications, such as Thunderbird and Microsoft

    Outlook Express, generally provide more features than webmail applications, but also require

    more initial configuration.

    2.4.1 How to access webmail

    Accessing webmail is as easy as using your web browser to visit a URL, and then entering your

    account name and password:

    1.

    Use your web browser to go to https://www.example.com:2096,where example.comis your

    domain name. You should always use a URL that starts with https:// (the HTTP Secure

    protocol). This minimizes the possibility of someone intercepting the account's login

    credentials or reading messages.

    If you try to access webmail from behind a firewall that blocks port 2096, the previous URL

    will not work. Instead, you can use one of the following URLs:

    o https://www.example.com/webmail

    o https://webmail.example.com

    However, for shared hosting accounts, your browser will display a warning message that the

    certificate does not match the domain name. As long as the certificate is from a2hosting.com

    (which it should be), you can disregard this warning.

    2. The webmail login page appears

    3. In the Email Address text box, type the e-mail address for the account you want to access.

    4. In the Password text box, type the password for the e-mail account.

    5. Click Log in.

    6.

    Select the webmail application that you want to use. You can click Enable AutoLoad and

    webmail will load the selected application automatically the next time you log in.

    2.4.2 Features of webmail

    Drag & drop messages into folders

    Virtual message lists that don't require page selection

    https://www.example.com/webmailhttps://webmail.example.com/https://webmail.example.com/https://www.example.com/webmail
  • 8/10/2019 webmail second.pdf

    31/57

    31

    Auto-complete for addressing

    Keyboard shortcuts

    Right click items for actions (e.g. rename, mark as unread)

    Save message as draft

    Read receipts

    New message notification

    Quota usage display

    Compose/view messages in separate windows

    Select the page that is displayed on log-in

    Support for various e-mail character sets

    Multi-lingual (English, French, German, Italian, Spanish)

    Print messages

    View message headers

    Change passwords

    View HTML e-mails

    Compose HTML e-mail messages

    Auto Signature

    Sub folders

    Search by subject, content and sender

    Bottom and right side preview mode

    View images attached to a message in a slideshow

    Download source of message

    Personal Contacts

    Personal Calendar

    Contact Groups

  • 8/10/2019 webmail second.pdf

    32/57

    32

    Mailbox redirection

    POP Retrieval

    Spell-checker (multi-lingual)

    Personalization

    Mailbox level spam rules

    Add Recipients as New Contacts After Sending

    Export Contacts

    Send Contact as vCard Attachment

    Spell Check Before Send

    Mailbox, Calendar and Contact sharing

    Edit own directory details from within webmail

    Configure webmail layout per domain

    Configure webmail skin per domain

    2.4.3 ER diagram

    An entity-relationship (ER) diagram is a specialized graphic that illustrates the

    relationships between entities in a database. ER diagrams often use symbols to

    represent three different types of information. Boxes are commonly used to represent

    entities. Diamonds are normally used to represent relationships and ovals are used to

    represent attributes. Entity relationship diagram are also known as E-R Diagram, entity-

    relationship model. There are the three basic elements in E-R diagram:

    Entities are the things about which we can see the information.

    Attributes are the data that we collect about the entities

    Relationships provides the structure needed to draw information from multiple

    entities.

  • 8/10/2019 webmail second.pdf

    33/57

    33

    Fig 2.9: ER diagram symbols

    Fig 2.10: ER diagram

    User Login

    Email-IdSubject

    Body

    Enter

    username

    &

    WebMail

    Drafts

    Compose

    Cancel

    Sent Box

    Send

    Inbox

    Trash

    Wrong

    Ok

  • 8/10/2019 webmail second.pdf

    34/57

    34

    2.4.4 Data Flow Diagram

    A data-flow diagram (DFD) is a graphical representation of the "flow" of data through aninformation system. DFDs can also be used for the visualization of data processing (structured

    design).

    A DFD provides no information about the timing or ordering of processes, or about whether

    processes will operate in sequence or in parallel. When it comes to conveying how information

    data flows through systems (and how that data is transformed in the process), data flow

    diagrams (DFDs) are the method of choice over technical descriptions for three principal

    reasons.

    (1) DFDs are easier to understand by technical and nontechnical audiences.

    (2) DFDs can provide a high level system overview, complete with boundaries and

    connections to other systems.

    (3) DFDs can provide a detailed representation of system components.

    Fig 2.11: DFD

    External entity

    Login

    WebMail server

    Wrong

    Correct

    Request Response

    User Application boundary

  • 8/10/2019 webmail second.pdf

    35/57

    35

    2.4.5 Setting preferences

    From any Squirrel Mail window, you can select "Options" at the top of the screen, to review

    or edit your user preferences.

    Options available are:

    Personal information

    Message highlighting

    Index order

    Display preferences

    Folder preferences

    Personal information

    Name and Address Options (all fields are optional)

    Full Name: Enter your name. This will be used to identify you in outgoing email.

    Email Address: Enter your email address. Email you send will show this address in the

    FROM: line.

    Reply To: Enter the email address you would like people to reply to. Most email clients will

    use this email address instead of the "From" address when replying to mail you send.

    Signature: If you would like to include a short message or "signature" at the bottom of your

    emails, you can type it here.

    Multiple Identities: If you like to have multiple email addresses, signatures or names, you can

    enter them here, or select an already created identity.

    Your Current Timezone: Email usually includes a timestamp that tells the receiver when you

    sent it. If you select your timezone here, the timestamp will be more accurate. If not, the

    server's time zone is used.

    Display Preferences

    General Display Options

    Theme: Different color schemes are available. Themes with "(Changes)" after their name

    may have a different color each time you log in.

    Custom Stylesheet: Select a stylesheet to use a different size font. The administrator may

    install special style sheets that further modify appearance.

    Language: Select a different language to allow the reading and writing of emails in that

    language. For example, to have Japanese emails display properly, one must set this to

  • 8/10/2019 webmail second.pdf

    36/57

    36

    Japanese.

    Use JavaScript

    Autodetect: Detect if the web browser supports JavaScript

    Always: Assume that JavaScript is supported

    Never: Use plain HTML

    Mailbox Display Options

    Number of Messages to Index: The number of message to show per page.

    Enable Alternating Row Colors: Show every other message with a different color.

    Enable Page Selector: Show page numbers that let you go straight to a specific page.

    Maximum Number of Pages to Show: How many page numbers to show. If there are toomany pages then they will be split like this: 1 2 3 4 5 6 7 ... 17 18 19 20.

    Message highlighting

    From almost any window, select "Options" from the menu at top. From the resulting page,

    select "Message Highlighting". (Windows style: Select Options -> Message Highlighting)

    From this window, you can do these things:

    Create a new highlight: Choose a scheme for highlighting messages that match a particular

    pattern (see below).

    1. Choose: Options -> Message Highlighting

    2. Choose: New

    3. Assign a name to your new highlight style

    4. Select a color for your highlight style

    5. Select a criterion for the highlighted message. The criterion matches, if the string is

    contained within the specified field. E.g. highlighting all messages coming from domain

    "foo.bar" would be done by selecting "from" within the combobox and then type

    "@foo.bar" into the pattern field. The match is case-insensitive, and will match a header

    containing the search string anywhere within it - but no wild cards or regular

    expressions.

    Edit an existing highlight: Make changes to a given highlight style.

    Delete an existing hightlight: Remove an existing highlight style from the set.

    Attachment compatibility and size

    SquirrelMail sends your attachments in the industry standard MIME format. However, this

    mailto:@foo.barmailto:@foo.bar
  • 8/10/2019 webmail second.pdf

    37/57

  • 8/10/2019 webmail second.pdf

    38/57

    38

    CHAPTER -3 RESULTS AND DISCUSSIONS

    This project i.e. WebMail is a user friendly mail service like gmail, yahoo, rediff etc. In this mail

    server a user will login with their respective username and password, In this project I have made

    users having their roll number as the username and redhat as the password. User can change their

    respective passwords after logging in their account. Once logged in, user can send a mail to other

    user by composing a mail and can also add an attachment to the mail. Then after clicking send

    button, the user can see the mail in their sent mail box and the mails that are received by them is

    shown in inbox that is the home page when the user log in to the account. While composing amail if user clicks cancel button then the mail gets saved in the drafts folder. In this mailing

    system, we can add contacts by entering their nickname and their respective email id. In this

    project the email ids are in format [email protected] where 3611148 is the roll number

    of the user.

    The user can also change the skin or you can say background color of the users account. The

    user can change his/her password but remember the password must be of critical form and

    greater than or equal to 8 characters. The user can also make folders for the mails related to some

    person or group.

    And I have also added message of the day at the top of the home screen which says Welcome

    back. Happy mailing. .And a user can also search any mail in the inbox and can also delete any

    mail. And if any mail is found spam then it is sent to trash folder. This project is not a live

    project because I have not any working server which will be on all the time and also I have not

    bought any domain name, so the users can send mail to only jmietimail.com users, not to any

    other mail server like Gmail users because doing this will result in blocking our mail server

    because it is not registered.

    mailto:[email protected]:[email protected]
  • 8/10/2019 webmail second.pdf

    39/57

    39

    Fig 3.1: Entering the URL

    Description: In the address bar type the address //http://jmietimail.com/webmail. The

    jmietimail.com is the address that will be used by the users for their email id also. And

    webmail is the specified path for the mailing system. The mail server here is http not https.

    http://jmietimail.com/webmailhttp://jmietimail.com/webmail
  • 8/10/2019 webmail second.pdf

    40/57

    40

    Fig 3.2: Login Page

    Description: This page is the login page where the user will enter the username and password

    for their respective account. Here username is the roll number of the students of the CSE

    final year and password is initially red hat which can be changed after logging in. clicking

    on the login button will redirect user to the inbox of the users account.

  • 8/10/2019 webmail second.pdf

    41/57

    41

    Fig 3.3: Inbox

    Description: This page is the welcome page and inbox also. Here we can see two mails in the

    inbox which is from the root that is the server of this mail server. The mails are the welcome

    mail that is sent to every user. We can delete any mail or mark mail as read or unread. We

    can move to any other folder by the use of dropdown list. We can also forward any mail.

  • 8/10/2019 webmail second.pdf

    42/57

    42

    Fig 3.4: Compose mail

    Description: This page shows that a mail is composed to [email protected] subject

    as pictures and message as Hi Shivani, This is test mail. I have attached the pics of

    yesterdays function.. We can add Cc and Bcc field also and check the spellings also.

    mailto:[email protected]:[email protected]
  • 8/10/2019 webmail second.pdf

    43/57

    43

    Fig 3.5: Add addresses

    Description: This page shows that a new contact is being added with a nickname and their

    email address. Fill the contacts first and last name and if want additional information can also

    be filled like phone number, address etc.

  • 8/10/2019 webmail second.pdf

    44/57

    44

    Fig 3.6: Create folder

    Description: This page shows that a new folder named Study Material is being added and

    we can create subfolders or rename a folder or delete a folder. Check the let this folder

    contain subfolders and then the user can create a sub folder also.

  • 8/10/2019 webmail second.pdf

    45/57

    45

    Fig 3.7: Options available

    Description: This page shows the options that can be performed. A user can edit his/her

    personal information, message highlighting, ordering the index, spellchecker options,

    changing the display preferences, folder preferences, changing password and new mail

    options.

  • 8/10/2019 webmail second.pdf

    46/57

    46

    Fig 3.8: Editing personal information

    Description: This option allows the user to edit the personal information about them like full

    name, email address, reply to, signature, current time zone, reply citation style, user defined

    citation style and many more.

  • 8/10/2019 webmail second.pdf

    47/57

    47

    Fig 3.9: Index order

    Description: This page shows that we can index the order of inbox according to your needs.

    The user can up, down or remove the Checkboxes, from option, Date option, flags and can

    shift up and down only the Subject option because Subject option cannot be deleted.

  • 8/10/2019 webmail second.pdf

    48/57

    48

    Fig 3.10: Spell Check

    Description: This page shows that we can edit our personal dictionary according to our

    needs. And the personal dictionary encryption options are not available. This is the

    squirrelspell options menu.

  • 8/10/2019 webmail second.pdf

    49/57

    49

    Fig 3.12: Display preferences

    Description: This shows that we can change the display options like background color.

  • 8/10/2019 webmail second.pdf

    50/57

  • 8/10/2019 webmail second.pdf

    51/57

    51

    Fig 3.14: Change Password

    Description: This page shows that the user can change its password by first entering the old

    password and then entering the new password and then verifying the new password. But the

    user must ensure that the new password must be critical and should have 8 or greater than 8

    characters.

  • 8/10/2019 webmail second.pdf

    52/57

    52

    Fig 3.15: Sign Out

    Description: This is the sign out page. By clicking on the click here to log in back

    hyperlink, the user will get back to login page.

  • 8/10/2019 webmail second.pdf

    53/57

    53

    CHAPTER-4 CONCLUSIONS AND FUTURE SCOPE

    4.1. Future Scope

    Development of new features and enhancements is concentrated on the development product,

    which, in time, will itself become the stable product. The new webmail will outlines some of the

    features slated for the next developmental release, including:

    A templating system

    A RPC interface for use by other applications as well as AJAX-enabled SquirrelMailtemplate sets (skins)

    A new initialization system

    Faster login times due to improved message header caching

    Security enhancements, such as HTTP Only cookies

    Improved usability/accessibility

    4.2. Conclusion

    Using the Linux package and repository structure as a model, we created a more generic

    system to include other operating systems. This is accomplished by adding additional

    attributes to what typically defines a Linux package.

    We are also able to make downloads more resilient through the network oriented design of

    the repository information.

    Using this new mail server we created clients that are able to use the mail server and send

    and receive mails from other clients.

  • 8/10/2019 webmail second.pdf

    54/57

    54

    APPENDIX

    ~]# vim /etc/yum.repos.d/client.repo

    ~]# vim /etc/sysconfig/network-scripts/ifcfg-eth0

    BOOTPROTO=static

    IPADDR=192.168.0.254

    NETMASK=255.255.255.0

    GATEWAY=192.168.0.254

    DNS1=192.168.0.254

    :wq (save and exit)

    ~] #service network restart

    ~] #chkconfig network on

    ~] #yum install postfix

    ~] #vim /etc/postfix/main.cf

    myhostname = rishabh.jmietimail.com

    mydomain = jmietimail.com

    myorigin = $mydomaininet_interface = all

    :wq!

    ~] #service postfix restart

    ~] #chkconfig postfix on

    ~] #yum install dovecot

    ~] #vim /etc/dovecot/dovecot.conf

    protocols = imap

    ~] #vim /etc/dovecot/conf.d/10-auth.conf

    disable_plaintext_auth = no

    ~] #vim /etc/dovecot/conf.d/10-mail.conf

    mail_location = mbox:~/mail:INBOX=/var/mail/%u

    ~] #yum install bind

    ~] #vim /etc/named.conf

    listen-on port 53 { 127.0.0.1; serverIP; };

  • 8/10/2019 webmail second.pdf

    55/57

    55

    allow-query { localhost; 192.168.0.0/24; };

    ~] #vim /etc/named.rfc1912.zones

    zone "example.com" IN {

    type master;

    file "forward.zone";

    };

    zone "0.168.192.in-addr.arpa" IN {

    type master;

    file "reverse.zone";

    };~] #vim /var/named/forward.zone

    $TTL 1D

    @ IN SOA Rishabh.jmietimail.com. [email protected].(

    0 ;serial

    1D ; refresh

    1H ; retry

    1W ; expire

    3H ; minimum

    NS rishabh.jmietimail.com.

    A 192.168.0.55

    rishabh A 192.168.0.55

    sakshi A 192.168.0.148

    ~] #vim /var/named/reverse.zone

    $TTL 1D

    @ IN SOA rishabh.jmietimail.com. [email protected].(

    0 ;serial

    1D ; refresh

    1H ; retry

    1W ; expire

    3H ; minimum

    NS rishabh.jmietimail.com.

    mailto:[email protected]:[email protected]:[email protected]:[email protected].
  • 8/10/2019 webmail second.pdf

    56/57

    56

    A 192.168.0.55

    rishabh A 192.168.0.55

    55 PTR rishabh.jmietimail.com

    148 PTR sakshi.example.com

    ~] #named-checkzone mail.com forward.zone

    ~] #service named restart

    ~] #nslookup mail.com

    ~] #yum localinstall squirrelmail php-mbstring

    ~] #/usr/share/squirrelmail/config/conf.pl

    ~] #vim /etc/httpd/conf.d/squirrelmail.conf~] #service httpd restart

    ~] #service dovecot restart

    ~] #service postfix restart

    ~] #getsebool a |grep httpd

    ~] #setsebool P httpd_can_network-connect_db on

    ~] #setsebool P httpd_can_network_connect on

  • 8/10/2019 webmail second.pdf

    57/57

    REFERENCES

    The following books are being used to fulfill the requirements of the proposed project and are

    helpful in the understanding, development and the maintenance of the project:

    1. Books

    The Linux Command Line: A Complete Introduction by William E. Shotts Jr.

    A Practical Guide to Linux Commands, Editors, and Shell Programming (3rd Edition) by

    Mark G. Sobell

    Linux Bible by Christopher Negus and Christine Bresnahan

    2.

    URL

    http://www.cs.cmu.edu/~tdumitra/hotswup09/papers/hotswup09_submission_3.pdf

    http://bizsupport1.austin.hp.com/bc/docs/support/SupportManual/c03290635/c0329035.p

    df

    RED HAT portal

    http://www.redhat.com/

    http://www.ipsr.org/redhatcertifications/

    http://www.aptech-education.com/courses-red-hat-course.aspx

    http://www.debian-administration.org/articles/478

    http://computernetworkingnotes.com/network-administrations/yum-server.html

    http://www.cs.cmu.edu/~tdumitra/hotswup09/papers/hotswup09_submission_3.pdfhttp://bizsupport1.austin.hp.com/bc/docs/support/SupportManual/c03290635/c0329035.phttp://www.redhat.com/http://www.ipsr.org/redhatcertifications/http://www.aptech-education.com/courses-red-hat-course.aspxhttp://www.debian-administration.org/articles/478http://computernetworkingnotes.com/network-administrations/yum-server.htmlhttp://computernetworkingnotes.com/network-administrations/yum-server.htmlhttp://www.debian-administration.org/articles/478http://www.aptech-education.com/courses-red-hat-course.aspxhttp://www.ipsr.org/redhatcertifications/http://www.redhat.com/http://bizsupport1.austin.hp.com/bc/docs/support/SupportManual/c03290635/c0329035.phttp://www.cs.cmu.edu/~tdumitra/hotswup09/papers/hotswup09_submission_3.pdf