similar to: Prohibit dots in folder names

Displaying 20 results from an estimated 120 matches similar to: "Prohibit dots in folder names"

2017 Jan 11
2
Prohibit dots in folder names
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Wed, 11 Jan 2017, Aki Tuomi wrote: > On 10.01.2017 17:38, Marek Grondecki wrote: >> Hello Dovecot Community, >> >> I am using Dovecot 2.2.13-12~deb8u1 (Debian Jessie). >> >> separator = / >> listescape plugin is NOT active >> LAYOUT=fs is NOT active >> >> I would like to prohibit a creation
2017 Jan 11
0
Prohibit dots in folder names
On 10.01.2017 17:38, Marek Grondecki wrote: > Hello Dovecot Community, > > I am using Dovecot 2.2.13-12~deb8u1 (Debian Jessie). > > separator = / > listescape plugin is NOT active > LAYOUT=fs is NOT active > > I would like to prohibit a creation of folders with dot "." in the > names - > so creation of a folder "foo.bar" should NOT be possible.
2017 Jan 11
0
Prohibit dots in folder names
On 11.01.2017 11:35, Steffen Kaiser wrote: > On Wed, 11 Jan 2017, Aki Tuomi wrote: > > On 10.01.2017 17:38, Marek Grondecki wrote: > >> Hello Dovecot Community, > >> > >> I am using Dovecot 2.2.13-12~deb8u1 (Debian Jessie). > >> > >> separator = / > >> listescape plugin is NOT active > >> LAYOUT=fs is NOT active > >>
2017 Jan 11
1
Ban dots in folder names
Hello Dovecot Community, I am using Dovecot 2.2.13-12~deb8u1 (Debian Jessie). separator = / listescape plugin is NOT active LAYOUT=fs is NOT active I would like to prohibit/ban the creation of folders with dot "." in the names - so creation of a folder "foo.bar" should NOT be possible. Currently, when I create "foo.bar" in Outlook 2013 it will be created but
2002 Jul 11
2
winehq & winex
'bry I'd like to install (and use ;) both wine forks: winehq and transgaming's winex. Both compiled from cvs sources. Is there any way to do it? What i have to do and why? TIA -- ojciec
2010 May 18
0
[PATCH] btrfs: prohibit a operation of changing acl's mask when noacl mount option used
when used Posix File System Test Suite(pjd-fstest) to test btrfs, some cases about setfacl failed when noacl mount option used. I simplified used commands in pjd-fstest, and the following steps can reproduce it. ------------------------ # cd btrfs-part/ # mkdir aaa # setfacl -m m::rw aaa <- successed, but not expected by pjd-fstest. ------------------------ I checked ext3, a warning
2013 Nov 11
0
[PATCH -tip RFC 0/2] kprobes: introduce NOKPROBE_SYMBOL() and prohibit probing on .entry.text
* Masami Hiramatsu <masami.hiramatsu.pt at hitachi.com> wrote: > Currently the blacklist is maintained by hand in kprobes.c > which is separated from the function definition and is hard > to catch up the kernel update. > To solve this issue, I've tried to implement new > NOKPROBE_SYMBOL() macro for making kprobe blacklist at > build time. Since the NOKPROBE_SYMBOL()
2013 Nov 11
0
[PATCH -tip RFC 0/2] kprobes: introduce NOKPROBE_SYMBOL() and prohibit probing on .entry.text
On Tue, 12 Nov 2013 02:18:53 +0900 Masami Hiramatsu <masami.hiramatsu.pt at hitachi.com> wrote: > > > After that we can convert all the rest, probably as part of this series. > > OK, I'll do. :) > BTW, converting all the __kprobes involves many archs, which > kprobes ported. In that case, which mailing-list would better me > to post the series, linux-arch? I
2013 Nov 15
0
[PATCH -tip RFC v2 01/22] kprobes: Prohibit probing on .entry.text code
On Fri, Nov 15, 2013 at 5:43 PM, Steven Rostedt <rostedt at goodmis.org> wrote: > On Fri, 15 Nov 2013 04:53:18 +0000 > Masami Hiramatsu <masami.hiramatsu.pt at hitachi.com> wrote: > >> .entry.text is a code area which is used for interrupt/syscall >> entries, and there are many sensitive codes. >> Thus, it is better to prohibit probing on all of such codes
2003 Oct 21
0
CallerID Screening Prohibit
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, How can I check if (i.e.) my provider is requesting me to hide the callerid? I.e. (Telco)E1/PRI---Zap(Asterisk1)IAX---IAX(Asterisk2)SIP---EP Now, if a call comes from the Telco with CLI screening prohobited to Asterisk1, where the call is forwarded using Dial() via IAX to Asterisk2 and then (also using Dial()) on to a SIP endpoint, how do I
2006 Oct 12
0
prohibit CallerID presentation
On ISDN lines it's possible to prohibit the presentation of caller id, what if I have a SIP gateway, something like an Audiocodes Mediant 1000. How do I prohibit the caller id presentation on that one? Regards, Kristian -- Kristian Larsson KLL-RIPE Network Engineer Net At Once [AS35706] email: kristian@netatonce.se
2013 Nov 25
1
prohibit deletion of Junk folder
Hi, I have an issue with a sieve_before rule (the script move incoming email to Junk folder when DMARC=fail and policy is quarantine) because one of my user delete his Junk folder : dovecot: lda(myuser at domain.com): Error: sieve: execution of script /etc/dovecot/sieve_before/01-dmarc-fail.sieve failed, but implicit keep was successful: 1 Time(s) dovecot: lda(myuser at domain.com): Error:
2011 Aug 09
1
Prohibit Password Change on specific user
Hi There, Setup: - Debian Squeeze - Samba 3.5.6 - passdb-backend: tdbsam I have some machines running here, which are used by students. There is a "global" account for all of them. I'd like to prevent them from changing the password, so that nobody can make it a exclusive account. Is ther a way to do that? Is it possible to do that with pdbedit? Thanks for help in advance
2013 Nov 15
2
[PATCH -tip RFC v2 01/22] kprobes: Prohibit probing on .entry.text code
On Fri, 15 Nov 2013 04:53:18 +0000 Masami Hiramatsu <masami.hiramatsu.pt at hitachi.com> wrote: > .entry.text is a code area which is used for interrupt/syscall > entries, and there are many sensitive codes. > Thus, it is better to prohibit probing on all of such codes > instead of a part of that. > Since some symbols are already registered on kprobe blacklist, > this also
2013 Nov 15
2
[PATCH -tip RFC v2 01/22] kprobes: Prohibit probing on .entry.text code
On Fri, 15 Nov 2013 04:53:18 +0000 Masami Hiramatsu <masami.hiramatsu.pt at hitachi.com> wrote: > .entry.text is a code area which is used for interrupt/syscall > entries, and there are many sensitive codes. > Thus, it is better to prohibit probing on all of such codes > instead of a part of that. > Since some symbols are already registered on kprobe blacklist, > this also
2014 Nov 25
0
Prohibit transfer to one extension
Hello all, first post, need help. I'm running a complex asterisk 1.8 install with five machines. I inherited it and don't fully understand it, nor the deep mysteries of asterisk either. I would appreciate any insight you might have. I scoured the 'net and the Digium wiki and my Google-Fu has failed me. I've been asked to somehow prohibit transfers to extension 3232. It has to be
2013 Nov 11
2
[PATCH -tip RFC 0/2] kprobes: introduce NOKPROBE_SYMBOL() and prohibit probing on .entry.text
(2013/11/11 20:16), Ingo Molnar wrote: > > * Masami Hiramatsu <masami.hiramatsu.pt at hitachi.com> wrote: > >> Currently the blacklist is maintained by hand in kprobes.c >> which is separated from the function definition and is hard >> to catch up the kernel update. >> To solve this issue, I've tried to implement new >> NOKPROBE_SYMBOL() macro
2013 Nov 11
2
[PATCH -tip RFC 0/2] kprobes: introduce NOKPROBE_SYMBOL() and prohibit probing on .entry.text
(2013/11/11 20:16), Ingo Molnar wrote: > > * Masami Hiramatsu <masami.hiramatsu.pt at hitachi.com> wrote: > >> Currently the blacklist is maintained by hand in kprobes.c >> which is separated from the function definition and is hard >> to catch up the kernel update. >> To solve this issue, I've tried to implement new >> NOKPROBE_SYMBOL() macro
2013 Nov 15
0
[PATCH -tip RFC v2 01/22] kprobes: Prohibit probing on .entry.text code
.entry.text is a code area which is used for interrupt/syscall entries, and there are many sensitive codes. Thus, it is better to prohibit probing on all of such codes instead of a part of that. Since some symbols are already registered on kprobe blacklist, this also removes them from the blacklist. Signed-off-by: Masami Hiramatsu <masami.hiramatsu.pt at hitachi.com> Cc: Thomas Gleixner
2009 Apr 05
2
Prohibit removing INBOX
Hello list, I'm using dovecot 1.1.11 and I'm going to prohibit users to remove their INBOX and some other directories in the mailbox root. I used Access Control Lists (http://wiki.dovecot.org/ACL) to do this: protocol imap { mail_plugins = acl } plugin { # With global ACLs in /etc/dovecot/acls/ directory: acl = vfile:/etc/dovecot/acls } /etc/dovecot/acls/.DEFAULT: owner