TLS_PRUNE(8) System Manager's Manual TLS_PRUNE(8)
*
NAME
tls_prune - prune expired sessions from the TLS sessions database
SYNOPSIS
tls_prune [ -C config-file ]
DESCRIPTION
Tls_prune is used to prune expired sessions from the TLS sessions database. The lifetime of a TLS session is determined by the tls_ses-
sion_timeout configuration option.
Tls_prune reads its configuration options out of the imapd.conf(5) file unless specified otherwise by -C.
OPTIONS -C config-file
Read configuration options from config-file.
FILES
/etc/imapd.conf
SEE ALSO imapd.conf(5), cyrmaster(8)CMU Project Cyrus TLS_PRUNE(8)
Check Out this Related Man Page
CTL_CYRUSDB(8) System Manager's Manual CTL_CYRUSDB(8)
*
NAME
ctl_cyrusdb - perform operations common to all Cyrus databases
SYNOPSIS
ctl_cyrusdb [ -C config-file ] -r [ -x ]
ctl_cyrusdb [ -C config-file ] -c
DESCRIPTION
Ctl_cyrusdb is used to perform various administrative operations on the Cyrus databases.
Ctl_cyrusdb reads its configuration options out of the imapd.conf(5) file unless specified otherwise by -C. The configdirectory option is
used to determine the default location of the Cyrus databases.
OPTIONS -C config-file
Read configuration options from config-file.
-r Recover the databases after an application or system failure. Also performs database cleanup like removing mailbox reservations
(and any associated mailbox files).
All mailbox files are also checked to make sure the file format matches the configured database type in imapd.conf. If not, the
file is automatically converted using the same logic as cvt_cyrusdb.
-x Used with -r to recover the database only. (Prevents database cleanup).
-c Checkpoint and archive the databases. Changes to the database which are part of committed transactions are written to disk. Also,
a hot backup of the databases is made and inactive log files are removed.
FILES
/etc/imapd.conf
SEE ALSO imapd.conf(5), cyrmaster(8)CMU Project Cyrus CTL_CYRUSDB(8)
<h1>A short history of UNIX</h1>
<p>In the late 1960's Ken Thompsom joined the computing-science research group at Bell
Laboratories, which is the research arm of the giant American corporation ATT. He and many
colleagues had been collaborating with MIT and GE on the development of an... (0 Replies)
We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
I'm writing a command shell, and I want to be able to detect when the user presses an arrow key (otherwise it just prints [[A, [[B, etc.). I know it's relatively easy (although somewhat more time-consuming) to detect keystrokes in noncanonical mode, but I've noticed that the bash shell detects... (4 Replies)
I'm learning off Linux (Ubuntu) right now. I want to move up to Unix, but I don't want to rush like I did when it came to Windows --> to Linux. What is the best Unix OS that fits in pretty well with Ubuntu.
In other words is there kind of an equal Linux with Unix?
Also what do I need to... (10 Replies)
I noticed my hostname is <my-full-name>s-macbook.local. I'm not sure exactly what information leaves the local network, and whether the hostname is included, but if it is, this would mean people on the Internet can look at my hostname and see who I am. Before anyone says that's not possible,... (4 Replies)