[Top] [Contents] [Index] [ ? ]

Footnotes

(1)

It is not a serious restriction, however. The user may install Anubis on his machine for the sole purpose of SMTP authentication, as Pixie-Dixie suggests.

(2)

See http://www.mysql.com.

(3)

See http://www.postgres.org.

(4)

Make sure to run anubisusr in background, so it does not slow down your normal login sequence

(5)

This escape is not supported by Anubis 4.0

(6)

versions 1.4.1 and 1.5.3

(7)

Sergey Poznyakoff, blame it on him:^)

(8)

The scheme implemented currently is a bit different. First, the config-sender program issues an EXAMINE command that fetches the contents of the user configuration file from the server. Then, it compares it with the local copy kept on the client machine. If the copies differ, config-sender issues UPLOAD and thus updates the configuration on the server.

(9)

This is already possible, See section Call Action.

(10)

Note that the code section could have modified the Content-Type header and, particularly, its encoding part, therefore it is not necessary that the resulting part is encoded using the same method as the original one

(11)

Byte-for-byte comparison


[Top] [Contents] [Index] [ ? ]

This document was generated by Sergey Poznyakoff on December, 20 2008 using texi2html 1.78.