Browse Definitions :
Definition

Exim

Exim is an open source mail transfer agent (MTA), which is a program responsible for receiving, routing, and delivering e-mail messages (this type of program is sometimes referred to as an Internet mailer, or a mail server program). MTAs receive e-mail messages and recipient addresses from local users and remote hosts, perform alias creation and forwarding functions, and deliver the messages to their destinations. Exim was developed at the University of Cambridge for the use of UNIX systems connected over the Internet. The software can be installed in place of sendmail, the most common MTA for UNIX and Linux systems; in comparison to sendmail, Exim is said to feature more straightforward configuration and task management.

Exim was developed in 1995, by Philip Hazel, in response to demands created by the growing (and changing) Internet. Early MTAs were usually run as open relays, just routing and delivering mail without applying many rules or security controls. Hazel realized that MTAs had to include more options for controlling mail acceptance. Also, MTAs at that time included support for older technologies (such as UUCP), which made their coding and configuration more complicated than necessary. Exim features include user options for defense against mail bombs and unsolicited junk mail: users can set options to refuse messages from particular senders, hosts, or networks. Exim can be run on any TCP/IP network, in conjunction with any combination of host and user software, and is the default MTA included on some Linux systems.

This was last updated in September 2005

Continue Reading About Exim

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Port Scan

    A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services ...

  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close